ts | title | url |
---|
ts | title | url |
---|
ts | title | url |
---|---|---|
20210209 | 全球高级持续性威胁(APT)2020年度报告 | https://ti.qianxin.com/uploads/2021/02/08/dd941ecf98c7cb9bf0111a8416131aa1.pdf |
20210209 | 2020年勒索软件分析 | https://mp.weixin.qq.com/s/yrtU2_VxEt94DWF4eQWujA |
20210209 | 云安全架构连载之二-Azure云平台威胁检测详解 | https://mp.weixin.qq.com/s/Dffk-_TSCaR2SWVAIMCQUA |
20210209 | 基于威胁情报周期模型的APT木马剖析 | https://mp.weixin.qq.com/s/CYxGbdRGDfXGY8wupnGbrw |
20210209 | 邮件钓鱼入门到入土 | https://mp.weixin.qq.com/s/hhBs3wryDCum1DrD6CxeRw |
ts | cve_id | title | url | cve_detail |
---|---|---|---|---|
20210209T23:22:34Z | CVE-2020-5844 | Null | https://github.com/TheCyberGeek/CVE-2020-5844 | index.php?sec=godmode/extensions&sec2=extensions/files_repo in Pandora FMS v7.0 NG allows authenticated administrators to upload malicious PHP scripts, and execute them via base64 decoding of the file location. This affects v7.0NG.742_FIX_PERL2020. |
20210209T22:31:49Z | CVE-2021-3156 | PoC for CVE-2021-3156 (sudo heap overflow) | https://github.com/stong/CVE-2021-3156 | Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via %sudoedit -s% and a command-line argument that ends with a single backslash character. |
20210209T21:31:38Z | cve-2020-8554 | Null | https://github.com/alebedev87/gatekeeper-cve-2020-8554 | 未查询到CVE信息 |
20210209T21:09:29Z | CVE-2020-8835 | Null | https://github.com/ret2hell/CVE-2020-8835 | In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel memory. The vulnerability also affects the Linux 5.4 stable series, starting with v5.4.7, as the introducing commit was backported to that branch. This vulnerability was fixed in 5.6.1, 5.5.14, and 5.4.29. (issue is aka ZDI-CAN-10780) |
20210209T18:48:13Z | CVE-2020-1350 | HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019. | https://github.com/ZephrFish/CVE-2020-1350 | A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka %Windows DNS Server Remote Code Execution Vulnerability%. |
20210209T14:41:20Z | cve-2020-17523 | shiro-cve-2020-17523 漏洞的两种绕过姿势分析(带漏洞环境) | https://github.com/jweny/shiro-cve-2020-17523 | 未查询到CVE信息 |
20210209T07:22:16Z | cve-2021-3156 | 보안취약점 확인 | https://github.com/gmldbd94/cve-2021-3156 | 未查询到CVE信息 |
20210209T03:15:11Z | CVE-2020-17527 | Null | https://github.com/forse01/CVE-2020-17527-Tomcat | While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests. |
20210209T03:14:51Z | CVE-2020-25213 | Null | https://github.com/forse01/CVE-2020-25213-Wordpress | |
20210209T01:27:49Z | CVE-2020-5902 | simple bash script of F5 BIG-IP CVE-2020-5902 checker | https://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner | In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages. |
ts | title | url | stars | forks |
---|---|---|---|---|
20210209T20:52:24Z | Spring 2021 Geography 817 work folder | https://github.com/klee12/klee12.github.io | 0 | 0 |
20210209T13:55:52Z | An open-source Chinese font derived from Fontworks% Klee One. 一款基于 FONTWORKS 的 Klee One 的开源中文字体。 | https://github.com/lxgw/LxgwWenKai | 32 | 1 |
20210209T12:21:24Z | Null | https://github.com/fontworks-fonts/Klee | 357 | 9 |
ts | title | url | stars | forks |
---|
ts | title | url | stars | forks |
---|---|---|---|---|
20210209T23:20:53Z | This bash script will help you to hack remote hosts | https://github.com/FabioDefilippo/linuxallremote | 4 | 1 |
20210209T21:36:07Z | Explorations and exploitations of the UWP platform | https://github.com/alexpisquared/UWP | 0 | 0 |
20210209T21:34:28Z | Web Server with exploitable code. DO NOT USE THIS FOR A SERVER | https://github.com/hmm-ship-it/Stinky-Server-Socks | 1 | 0 |
20210209T21:29:35Z | Null | https://github.com/Raycodex/Exploiting | 0 | 0 |
20210209T20:52:28Z | KDMapper is a simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memory | https://github.com/TheCruZ/kdmapper | 147 | 69 |
20210209T20:13:34Z | Null | https://github.com/roExploit/roExploit | 0 | 0 |
20210209T19:52:49Z | Automates searching CVEs in the Metasploit database of exploits. | https://github.com/ferdinandmudjialim/metasploit-cve-search | 0 | 0 |
20210209T19:19:32Z | Vulnerabilities% Risk of Exploitation | https://github.com/thiagofigcosta/V-REx | 0 | 0 |
20210209T18:31:20Z | Various techniques for exploiting Windows | https://github.com/billchaison/Windows-Trix | 5 | 0 |
20210209T18:11:07Z | Development of code to exploit LSST and VISTA imaging | https://github.com/lsst-uk/lsst-ir-fusion | 0 | 0 |
ts | title | url | stars | forks |
---|---|---|---|---|
20210209T23:27:42Z | RATata is a simple python RAT to setup and use ! | https://github.com/loTus04/RATata | 0 | 0 |
20210209T22:09:29Z | PyHoox | https://github.com/dorian9007/PyHoox | 0 | 0 |
20210209T20:39:28Z | Backdoor para Windows e Linux | https://github.com/medn1c/reverse-shell | 2 | 0 |
20210209T20:28:58Z | A commandline backdoor accessible from the windows login and lock screen to manipulate files and directories. | https://github.com/KabueMurage/Windows-Backdoor | 10 | 2 |
20210209T19:03:00Z | A sample app to demonstrate how to create Xamarin UITests using the Page Object architecture, Backdoor Methods and App Links (aka Deep Linking) | https://github.com/brminnick/UITestSampleApp | 32 | 25 |
20210209T18:25:23Z | Null | https://github.com/EjHvorSerDuVildUdJim/backdoor | 0 | 0 |
20210209T17:19:34Z | Null | https://github.com/Shahtr1/reverse_backdoor | 0 | 0 |
20210209T15:03:05Z | Null | https://github.com/mikkelskov1/backdoor2 | 0 | 0 |
20210209T11:24:26Z | FUD cross-platform python2 backdoor with C2 | https://github.com/7h3w4lk3r/pyback | 16 | 5 |
20210209T11:13:42Z | The official backdoor of the Bane Project for Android | https://github.com/datteroandrea/banedroid | 1 | 1 |
ts | title | url | stars | forks |
---|---|---|---|---|
20210209T23:23:10Z | A cross-platform browser fuzzing framework | https://github.com/MozillaSecurity/grizzly | 227 | 30 |
20210209T23:18:21Z | FuzzBench - Fuzzer benchmarking as a service. | https://github.com/google/fuzzbench | 593 | 98 |
20210209T22:49:11Z | Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based) | https://github.com/google/honggfuzz | 2129 | 430 |
20210209T22:10:13Z | Practical activities developed for Fuzzy Systems course (ELE075) at UFMG. | https://github.com/thaismenegaldi/Fuzzy-Systems | 0 | 0 |
20210209T21:55:43Z | Generate code for json encoders/decoders, codecs, fuzzers, generators, and more | https://github.com/MartinSStewart/elm-review-todo-it-for-me | 0 | 0 |
20210209T21:44:52Z | Go fuzzy matching tool using Levenshtein distance calculation | https://github.com/datahappy1/go_fuzzymatch | 0 | 0 |
20210209T21:18:25Z | Write unit and fuzz tests for Elm code. | https://github.com/elm-explorations/test | 194 | 28 |
20210209T21:02:19Z | Null | https://github.com/VahalaSly/Fuzzy_System | 0 | 0 |
20210209T21:00:57Z | Null | https://github.com/lutzer/node-red-contrib-fuzzywuzzy | 1 | 0 |
20210209T20:05:17Z | Null | https://github.com/primosz/FuzzySandbox | 0 | 0 |