ts | title | url |
---|
ts | title | url |
---|
ts | cve_id | title | url | cve_detail |
---|---|---|---|---|
20220114T22:01:52Z | CVE-2021-32648 | Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648 | https://github.com/Immersive-Labs-Sec/CVE-2021-32648 | |
20220114T21:54:38Z | CVE-2021-35211 | Null | https://github.com/BishopFox/CVE-2021-35211 | |
20220114T21:45:58Z | CVE-2021-46080 | CVE-2021-46080 - A Cross Site Request Forgery (CSRF) vulnerability exists in Vehicle Service Management System 1.0. An successful CSRF attacks leads to Stored Cross Site Scripting Vulnerability. | https://github.com/plsanu/CVE-2021-46080 | |
20220114T21:26:02Z | CVE-2021-46079 | CVE-2021-46079 - An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to Html Injection. | https://github.com/plsanu/CVE-2021-46079 | |
20220114T20:49:42Z | CVE-2021-46078 | CVE-2021-46078 - An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to a Stored Cross-Site Scripting vulnerability. | https://github.com/plsanu/CVE-2021-46078 | |
20220114T20:28:01Z | CVE-2021-46076 | CVE-2021-46076 - Sourcecodester Vehicle Service Management System 1.0 is vulnerable to File upload. An attacker can upload a malicious php file in multiple endpoints it leading to Code Execution. | https://github.com/plsanu/CVE-2021-46076 | |
20220114T20:15:28Z | CVE-2021-46075 | CVE-2021-46075 - A Privilege Escalation vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. Staff account users can access the admin resources and perform CRUD Operations. | https://github.com/plsanu/CVE-2021-46075 | |
20220114T20:01:50Z | CVE-2021-46074 | CVE-2021-46074 - A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the Settings Section in login panel. | https://github.com/plsanu/CVE-2021-46074 | |
20220114T19:49:07Z | CVE-2021-46073 | CVE-2021-46073 - A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the User List Section in login panel. | https://github.com/plsanu/CVE-2021-46073 | |
20220114T19:34:50Z | CVE-2021-46072 | CVE-2021-46072 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service List Section in login panel. | https://github.com/plsanu/CVE-2021-46072 |
ts | title | url | stars | forks |
---|---|---|---|---|
20220114T15:46:42Z | Collection of Kicad 6.0 symbols, footprints and 3D models useful in keyboard creation | https://github.com/crides/kleeb | 10 | 0 |
20220114T11:27:46Z | 芫荽,基於 Klee One 改造的學習用台灣繁體字型 | https://github.com/ButTaiwan/iansui | 96 | 1 |
20220114T11:09:20Z | Config files for my GitHub profile. | https://github.com/Kleex123/Kleex123 | 0 | 0 |
20220114T06:55:08Z | KLEE Symbolic Execution Engine | https://github.com/klee/klee | 1869 | 530 |
20220114T01:29:37Z | woo | https://github.com/xinrachel30/kleex | 0 | 0 |
ts | title | url | stars | forks |
---|---|---|---|---|
20220114T09:33:59Z | Null | https://github.com/software-testing-bootcamp/S2E1-selenium4-java-testng-allure | 1 | 0 |
20220114T07:28:34Z | Spacecraft Simulation Environment Core codes | https://github.com/ut-issl/s2e-core | 5 | 0 |
ts | title | url | stars | forks |
---|---|---|---|---|
20220114T23:52:35Z | Writeups for my personal CTF exploits | https://github.com/MooseTheGoose/ctf-writeups | 0 | 0 |
20220114T23:32:42Z | HatCon 2022 HatSploit exploit modules | https://github.com/enty8080/HatCon-2022 | 0 | 0 |
20220114T23:24:33Z | iReady is awful. It%s the worst education tool anyone could ever use. This program is designed to skip through iReady lessons/quizzes/time requirements or whatever. | https://github.com/cupiditys/iReady-Overload | 34 | 25 |
20220114T23:14:45Z | GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢ | https://github.com/hugsy/gef | 4263 | 573 |
20220114T23:10:52Z | Microsoft » Windows 10 : Security Vulnerabilities | https://github.com/nu11secur1ty/Windows10Exploits | 385 | 118 |
20220114T22:29:07Z | exploit databases | https://github.com/woounnan/exploits | 1 | 0 |
20220114T22:07:51Z | PoC exploits that works on fivem windows servers! | https://github.com/miraf202/Fivem-Exploits | 0 | 0 |
20220114T13:58:24Z | a simple exploit POC for https://promon.co/security-news/strandhogg/ which can steal username and password from targeted android package process | https://github.com/tripoloski1337/android-task-hijacking | 0 | 0 |
20220114T13:53:05Z | Null | https://github.com/PainNonsense/PainExploit-Scripts | 0 | 0 |
20220114T13:52:00Z | Created Home Page | https://github.com/PainNonsense/PainExploit-Home | 0 | 0 |
ts | title | url | stars | forks |
---|---|---|---|---|
20220114T21:12:03Z | Null | https://github.com/jaackkiscool/Backdoor-Scanner-v1.1 | 1 | 0 |
20220114T08:44:55Z | Null | https://github.com/quantization-backdoor/quantization-backdoor | 1 | 0 |
20220114T03:16:46Z | simple app to delete Beast (RAT) and Slackbot | https://github.com/trisyatalia/clean-backdoor-java | 0 | 0 |
20220114T03:14:49Z | A simple remote tool in C#. | https://github.com/qwqdanchun/DcRat | 522 | 187 |
ts | title | url | stars | forks |
---|---|---|---|---|
20220114T06:55:08Z | KLEE Symbolic Execution Engine | https://github.com/klee/klee | 1869 | 530 |
ts | title | url | stars | forks |
---|---|---|---|---|
20220114T17:43:23Z | An implementation of Brick, anonymized for the NDSS 2020 paper submission | https://github.com/ndss2020-brick-submission/brick | 1 | 1 |
ts | title | url | stars | forks |
---|---|---|---|---|
20220114T23:54:12Z | Rust fuzzer | https://github.com/actuallyexeon/chocofuzz | 0 | 0 |
20220114T22:19:59Z | A university project showcasing the power of a fuzzy logic inference system. | https://github.com/iwoplaza/fuzzy-plane | 0 | 0 |
20220114T20:20:46Z | Null | https://github.com/rayhaneh/go-fuzz | 0 | 0 |
20220114T20:12:06Z | Penetration-List is the supplement for Tester. It contains Every single type of vulnerabilities Material used during Penetration Testing. The list includes Pyaloads, dorks, Fuzzing Materials, and many more. And We also provide theory Sections about every vulnerability in deep, So More Information about our theory sections, Visit our Medium profile. | https://github.com/AlbusSec/Penetration-List | 0 | 0 |
20220114T18:31:09Z | The project uses fuzzy logic to calculate the intensity of watering. | https://github.com/kfaracik/Watering-the-Fuzzy-Driver | 0 | 0 |
20220114T17:06:19Z | Open-source RESTful API built with Laravel framework for our project %Fuzzle% | https://github.com/PAXANDDOS/fuzzle-api | 0 | 0 |
20220114T13:34:01Z | Null | https://github.com/xsalonx/fuzzyLogic | 0 | 0 |
20220114T13:33:11Z | OSS-Fuzz - continuous fuzzing for open source software. | https://github.com/google/oss-fuzz | 7014 | 1473 |
20220114T12:43:18Z | A fuzzy min max classifier introducing the concept of fuzzy neural networks. | https://github.com/Cartmanishere/fuzzy-min-max-classifier | 24 | 16 |
20220114T12:15:01Z | POC%s and stuff | https://github.com/Duran-Cole/fuzzy-waffle | 0 | 0 |