ts | title | url |
---|
ts | title | url |
---|
ts | title | url |
---|
ts | cve_id | title | url | cve_detail |
---|---|---|---|---|
20210212T20:10:14Z | CVE-2021-3156 | CVE-2021-3156非交互式执行命令 | https://github.com/Rvn0xsy/CVE-2021-3156-plus | Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via %sudoedit -s% and a command-line argument that ends with a single backslash character. |
20210212T19:38:47Z | cve-2020-35498 | Flag the cve-2020-35498 attack | https://github.com/freddierice/cve-2020-35498-flag | 未查询到CVE信息 |
20210212T19:27:37Z | CVE-2021-26121 | Null | https://github.com/sourceincite/CVE-2021-26121 | 未查询到CVE信息 |
20210212T07:36:37Z | CVE-2021-27188 | Null | https://github.com/jet-pentest/CVE-2021-27188 | The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 allows attackers to cause a denial of service (access suspended for five hours) by making five invalid login attempts to a victim%s account. |
20210212T07:32:20Z | CVE-2021-27190 | Null | https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS | A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 which is publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc. |
20210212T04:27:05Z | CVE-2021-3156 | Exploit for Sudo heap overflow (CVE-2021-3156) on Debain 10 | https://github.com/0xdevil/CVE-2021-3156 | Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via %sudoedit -s% and a command-line argument that ends with a single backslash character. |
20210212T03:11:16Z | CVE-2021-1782 | Null | https://github.com/synacktiv/CVE-2021-1782 | 未查询到CVE信息 |
20210212T02:56:13Z | CVE-2020-1350 | HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019. | https://github.com/ZephrFish/CVE-2020-1350 | A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka %Windows DNS Server Remote Code Execution Vulnerability%. |
ts | title | url | stars | forks |
---|---|---|---|---|
20210212T21:56:31Z | KLEE Symbolic Execution Engine | https://github.com/klee/klee | 1627 | 482 |
20210212T15:52:06Z | An open-source Chinese font derived from Fontworks% Klee One. 一款基于 FONTWORKS 的 Klee One 的开源中文字体。 | https://github.com/lxgw/LxgwWenKai | 36 | 2 |
20210212T09:05:51Z | Null | https://github.com/fontworks-fonts/Klee | 361 | 9 |
ts | title | url | stars | forks |
---|
ts | title | url | stars | forks |
---|---|---|---|---|
20210212T23:49:46Z | Autosplitter For The Game Speed Run 4 (Requires Exploit With Input API) | https://github.com/BluelyTASer/Speed-Run-4-Autosplitter | 0 | 0 |
20210212T23:46:28Z | The hacking challenges I%ve solved | https://github.com/andrewbae/playground | 1 | 1 |
20210212T23:18:29Z | Coming Soon | https://github.com/Mellonyt/Falcon-Pike | 2 | 1 |
20210212T22:49:59Z | This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more. | https://github.com/The-Art-of-Hacking/h4cker | 9002 | 1447 |
20210212T22:47:16Z | A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python | https://github.com/VainlyStrain/Vailyn | 93 | 3 |
20210212T22:36:48Z | Automatic Linux privesc | https://github.com/liamg/traitor | 1 | 0 |
20210212T22:26:18Z | All Files, Scripts, and exploits can be found here | https://github.com/LMS57/TempleOfPwn | 1 | 0 |
20210212T21:49:08Z | Null | https://github.com/bgould96/hacking-the-art-of-exploitation | 0 | 0 |
20210212T21:05:57Z | Tornado is a human-in-the-loop machine learning framework that helps you exploit your unlabelled data to train models through a simple and easy to use web interface. | https://github.com/slrbl/human-in-the-loop-machine-learning-tool-tornado | 15 | 5 |
20210212T20:32:03Z | Roblox Unsigned Execution Through a Vanilla LBI. | https://github.com/OpenGamerTips/Xenon | 2 | 0 |
ts | title | url | stars | forks |
---|---|---|---|---|
20210212T18:18:39Z | simple discord grabber made in python & DiscordAPI with paths (soon with IP Details include and may backdoor ^—^) | https://github.com/zklqlf/zkl-grabber | 0 | 0 |
20210212T16:58:49Z | This is a backdoor used to execute command line on client%s computer. | https://github.com/itismeTin/Python-Backdoor | 0 | 0 |
20210212T16:37:07Z | Intuitive Java Backdoor | https://github.com/YeahOMA/omaBackdoor | 0 | 0 |
20210212T14:33:36Z | This program is an non-object oriented opensource, hidden and undetectable backdoor/reverse shell/RAT for Windows made in Python 3 which contains many features such as multi-client support and cross-platform server. | https://github.com/xp4xbox/Python-Backdoor | 356 | 133 |
20210212T13:42:43Z | Basic Backdoor in Python 👨💻 | https://github.com/ninjahacker123/Backdoor | 0 | 0 |
20210212T13:36:00Z | PyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_> | https://github.com/angus-y/PyIris-backdoor | 140 | 42 |
ts | title | url | stars | forks |
---|---|---|---|---|
20210212T23:58:28Z | Software for fuzzing, used on web application pentestings. | https://github.com/NESCAU-UFLA/FuzzingTool | 4 | 1 |
20210212T23:11:45Z | Null | https://github.com/rafaelschroeder/fuzzy-adventure | 0 | 0 |
20210212T22:51:45Z | Git training | https://github.com/MarkusLinjamaki/fuzzyGit | 0 | 0 |
20210212T21:58:33Z | Null | https://github.com/sebalesraim/FuzzyNetworkFeat | 1 | 0 |
20210212T21:35:58Z | VMI Kernel Fuzzer for Xen Project - VM forking, VMI & AFL integration demo | https://github.com/intel/kernel-fuzzer-for-xen-project | 238 | 37 |
20210212T21:30:36Z | The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more! | https://github.com/AFLplusplus/AFLplusplus | 1300 | 284 |
20210212T21:22:21Z | A fuzzer for SMT solvers | https://github.com/testsmt/yinyang | 79 | 6 |
20210212T20:54:42Z | A JavaScript Engine Fuzzer | https://github.com/googleprojectzero/fuzzilli | 1145 | 199 |
20210212T20:52:45Z | Null | https://github.com/h-fuzzy-logic/h-fuzzy-logic | 0 | 0 |
20210212T20:47:51Z | A project to run fuzzing jobs at scale with Kubernetes. | https://github.com/theparanoids/yfuzz | 134 | 16 |