Skip to content

Latest commit

 

History

History
84 lines (65 loc) · 7.39 KB

tech_info_20210212.md

File metadata and controls

84 lines (65 loc) · 7.39 KB

互联网安全 推荐

ts title url

玄武实验室 推荐

ts title url

安全维基 推荐

ts title url

CVE Github 推荐

ts cve_id title url cve_detail
20210212T20:10:14Z CVE-2021-3156 CVE-2021-3156非交互式执行命令 https://github.com/Rvn0xsy/CVE-2021-3156-plus Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via %sudoedit -s% and a command-line argument that ends with a single backslash character.
20210212T19:38:47Z cve-2020-35498 Flag the cve-2020-35498 attack https://github.com/freddierice/cve-2020-35498-flag 未查询到CVE信息
20210212T19:27:37Z CVE-2021-26121 Null https://github.com/sourceincite/CVE-2021-26121 未查询到CVE信息
20210212T07:36:37Z CVE-2021-27188 Null https://github.com/jet-pentest/CVE-2021-27188 The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 allows attackers to cause a denial of service (access suspended for five hours) by making five invalid login attempts to a victim%s account.
20210212T07:32:20Z CVE-2021-27190 Null https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 which is publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc.
20210212T04:27:05Z CVE-2021-3156 Exploit for Sudo heap overflow (CVE-2021-3156) on Debain 10 https://github.com/0xdevil/CVE-2021-3156 Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via %sudoedit -s% and a command-line argument that ends with a single backslash character.
20210212T03:11:16Z CVE-2021-1782 Null https://github.com/synacktiv/CVE-2021-1782 未查询到CVE信息
20210212T02:56:13Z CVE-2020-1350 HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019. https://github.com/ZephrFish/CVE-2020-1350 A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka %Windows DNS Server Remote Code Execution Vulnerability%.

klee on Github 推荐

ts title url stars forks
20210212T21:56:31Z KLEE Symbolic Execution Engine https://github.com/klee/klee 1627 482
20210212T15:52:06Z An open-source Chinese font derived from Fontworks% Klee One. 一款基于 FONTWORKS 的 Klee One 的开源中文字体。 https://github.com/lxgw/LxgwWenKai 36 2
20210212T09:05:51Z Null https://github.com/fontworks-fonts/Klee 361 9

s2e on Github 推荐

ts title url stars forks

exploit on Github 推荐

ts title url stars forks
20210212T23:49:46Z Autosplitter For The Game Speed Run 4 (Requires Exploit With Input API) https://github.com/BluelyTASer/Speed-Run-4-Autosplitter 0 0
20210212T23:46:28Z The hacking challenges I%ve solved https://github.com/andrewbae/playground 1 1
20210212T23:18:29Z Coming Soon https://github.com/Mellonyt/Falcon-Pike 2 1
20210212T22:49:59Z This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more. https://github.com/The-Art-of-Hacking/h4cker 9002 1447
20210212T22:47:16Z A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python https://github.com/VainlyStrain/Vailyn 93 3
20210212T22:36:48Z Automatic Linux privesc https://github.com/liamg/traitor 1 0
20210212T22:26:18Z All Files, Scripts, and exploits can be found here https://github.com/LMS57/TempleOfPwn 1 0
20210212T21:49:08Z Null https://github.com/bgould96/hacking-the-art-of-exploitation 0 0
20210212T21:05:57Z Tornado is a human-in-the-loop machine learning framework that helps you exploit your unlabelled data to train models through a simple and easy to use web interface. https://github.com/slrbl/human-in-the-loop-machine-learning-tool-tornado 15 5
20210212T20:32:03Z Roblox Unsigned Execution Through a Vanilla LBI. https://github.com/OpenGamerTips/Xenon 2 0

backdoor on Github 推荐

ts title url stars forks
20210212T18:18:39Z simple discord grabber made in python & DiscordAPI with paths (soon with IP Details include and may backdoor ^—^) https://github.com/zklqlf/zkl-grabber 0 0
20210212T16:58:49Z This is a backdoor used to execute command line on client%s computer. https://github.com/itismeTin/Python-Backdoor 0 0
20210212T16:37:07Z Intuitive Java Backdoor https://github.com/YeahOMA/omaBackdoor 0 0
20210212T14:33:36Z This program is an non-object oriented opensource, hidden and undetectable backdoor/reverse shell/RAT for Windows made in Python 3 which contains many features such as multi-client support and cross-platform server. https://github.com/xp4xbox/Python-Backdoor 356 133
20210212T13:42:43Z Basic Backdoor in Python 👨‍💻 https://github.com/ninjahacker123/Backdoor 0 0
20210212T13:36:00Z PyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_> https://github.com/angus-y/PyIris-backdoor 140 42

fuzz on Github 推荐

ts title url stars forks
20210212T23:58:28Z Software for fuzzing, used on web application pentestings. https://github.com/NESCAU-UFLA/FuzzingTool 4 1
20210212T23:11:45Z Null https://github.com/rafaelschroeder/fuzzy-adventure 0 0
20210212T22:51:45Z Git training https://github.com/MarkusLinjamaki/fuzzyGit 0 0
20210212T21:58:33Z Null https://github.com/sebalesraim/FuzzyNetworkFeat 1 0
20210212T21:35:58Z VMI Kernel Fuzzer for Xen Project - VM forking, VMI & AFL integration demo https://github.com/intel/kernel-fuzzer-for-xen-project 238 37
20210212T21:30:36Z The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more! https://github.com/AFLplusplus/AFLplusplus 1300 284
20210212T21:22:21Z A fuzzer for SMT solvers https://github.com/testsmt/yinyang 79 6
20210212T20:54:42Z A JavaScript Engine Fuzzer https://github.com/googleprojectzero/fuzzilli 1145 199
20210212T20:52:45Z Null https://github.com/h-fuzzy-logic/h-fuzzy-logic 0 0
20210212T20:47:51Z A project to run fuzzing jobs at scale with Kubernetes. https://github.com/theparanoids/yfuzz 134 16

日更新程序