2025-01-06 14:26:37 +08:00
[
2025-01-15 11:02:39 +08:00
{
"link" : "https://github.com/xiangyuecn/AreaCity-JsSpider-StatsGov" ,
"name" : "AreaCity-JsSpider-StatsGov" ,
"created_at" : "2018-11-28T05:11:35Z" ,
"description" : "省市区县乡镇三级或四级城市数据, 带拼音标注、坐标、行政区域边界范围; 2025年01月14日最新采集, 提供csv格式文件, 支持在线转成多级联动js代码、通用json格式, 提供软件转成shp、geojson、sql、导入数据库; 带浏览器里面运..." ,
"author" : "xiangyuecn" ,
"language" : "JavaScript" ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/1024-lab/smart-admin" ,
"name" : "smart-admin" ,
"created_at" : "2019-11-16T02:30:31Z" ,
"description" : "SmartAdmin国内首个以「高质量代码」为核心, 「简洁、高效、安全」快速开发平台; 基于SpringBoot2/3 + Sa-Token + Mybatis-Plus 和 Vue3 + Vite5 + Ant Design Vue 4.x (同时支持JavaScript和TypeScript双版本);满足国家三级等保要求、支持登录限制、接..." ,
"author" : "1024-lab" ,
"language" : "Java" ,
"keyword" : "sql注入"
} ,
2025-01-10 10:02:43 +08:00
{
"link" : "https://github.com/zlt2000/microservices-platform" ,
"name" : "microservices-platform" ,
"created_at" : "2019-03-07T07:13:37Z" ,
"description" : "基于SpringBoot2.x、SpringCloud和SpringCloudAlibaba并采用前后端分离的企业级微服务多租户系统架构。并引入组件化的思想实现高内聚低耦合, 项目代码简洁注释丰富上手容易, 适合学习和企业中使用。真正实现了基于RBAC、jwt和oauth2的..." ,
"author" : "zlt2000" ,
"language" : "Java" ,
"keyword" : "sql注入"
} ,
2025-01-06 14:26:37 +08:00
{
"link" : "https://github.com/saoshao/DetSql" ,
"name" : "DetSql" ,
"created_at" : "2024-09-03T14:58:23Z" ,
"description" : "Burp插件, 快速探测可能存在SQL注入的请求并标记, 提高测试效率" ,
"author" : "saoshao" ,
"language" : "Java" ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/ClearloveLA/sql-injection-defense" ,
"name" : "sql-injection-defense" ,
"created_at" : "2025-01-04T10:42:03Z" ,
"description" : "基于Node.js和Vue3技术栈, 结合MySQL数据库, 设计并实现了一个Web应用SQL注入防护系统, 旨在解决MySQL数据库在Web应用中面临的SQL注入安全威胁。" ,
"author" : "ClearloveLA" ,
"language" : "Vue" ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/JaveleyQAQ/SQL-Injection-Scout" ,
"name" : "SQL-Injection-Scout" ,
"created_at" : "2025-01-03T08:42:22Z" ,
"description" : "SQL Injection Scout 是一个用于 Burp Suite 的扩展,专为帮助安全研究人员和开发人员检测和分析 SQL 注入漏洞而设计。该扩展提供了丰富的配置选项和直观的用户界面,便于用户自定义扫描和分析过程。" ,
"author" : "JaveleyQAQ" ,
"language" : null ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/henryxm/autumn" ,
"name" : "autumn" ,
"created_at" : "2018-10-08T12:12:12Z" ,
"description" : "采用Spring、Spring Boot、Redis、MyBatis、Shiro、Druid框架开发,搭载mysql数据。 如果你厌烦了MyBatis中需要手动创建表的事情, 这个项目非常适合你, 自动为你生成表。 从此你不在需要导入sql文件了, 项目初始化变得异常简单, 结构清..." ,
"author" : "henryxm" ,
"language" : "JavaScript" ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/AndyWannaSing/trace-canvas" ,
"name" : "trace-canvas" ,
"created_at" : "2024-12-29T10:39:59Z" ,
"description" : "TraceCanvas 是一款专注于基础链路追踪功能的工具, 旨在帮助开发者全面监控和分析系统性能。其主要功能包括方法执行树的可视化展示、SQL 操作追踪、HTTP 请求追踪、Redis 操作追踪, 以及消息队列( MQ) 操作追踪等。此外, TraceC..." ,
"author" : "AndyWannaSing" ,
"language" : null ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/Sanandd/---doAction-SQL-" ,
"name" : "---doAction-SQL-" ,
"created_at" : "2024-12-21T09:39:42Z" ,
"description" : "秒优科技-供应链管理系统doAction存在SQL注入漏洞" ,
"author" : "Sanandd" ,
"language" : null ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/Sanandd/yongyou" ,
"name" : "yongyou" ,
"created_at" : "2024-12-21T09:28:22Z" ,
"description" : "SQL注入" ,
"author" : "Sanandd" ,
"language" : "Python" ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/jiaqiwang8/wjq-goods" ,
"name" : "wjq-goods" ,
"created_at" : "2024-12-21T09:03:52Z" ,
"description" : "微商城系统 goods.php SQL注入漏洞" ,
"author" : "jiaqiwang8" ,
"language" : null ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/zhang-nan666/-HCM-LoadOtherTreeServlet-SQL-" ,
"name" : "-HCM-LoadOtherTreeServlet-SQL-" ,
"created_at" : "2024-12-21T08:49:32Z" ,
"description" : "宏景HCM-LoadOtherTreeServlet SQL注入检测" ,
"author" : "zhang-nan666" ,
"language" : null ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/zhang-nan666/-FE-apprvaddNew.jsp-SQL-" ,
"name" : "-FE-apprvaddNew.jsp-SQL-" ,
"created_at" : "2024-12-21T08:48:44Z" ,
"description" : "某远互联FE协作办公平台 apprvaddNew.jsp SQL注入漏洞" ,
"author" : "zhang-nan666" ,
"language" : null ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/ayy138/SpringBlade_Sql" ,
"name" : "SpringBlade_Sql" ,
"created_at" : "2024-12-21T08:34:10Z" ,
"description" : "SpringBlade tenant/list SQL 注入漏洞复现及POC" ,
"author" : "ayy138" ,
"language" : "Python" ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/Ning-0223/-HCM-LoadOtherTreeServlet-SQL-" ,
"name" : "-HCM-LoadOtherTreeServlet-SQL-" ,
"created_at" : "2024-12-21T07:54:40Z" ,
"description" : "宏景HCM-LoadOtherTreeServlet SQL注入 " ,
"author" : "Ning-0223" ,
"language" : "Python" ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/abyssdawn/poc_scan_web" ,
"name" : "poc_scan_web" ,
"created_at" : "2024-09-20T02:46:03Z" ,
"description" : "全自动化漏洞扫描系统。包括poc扫描、sql注入漏洞扫描、资产收集( 模仿fofa) 等功能。" ,
"author" : "abyssdawn" ,
"language" : null ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/jisec001/lade" ,
"name" : "lade" ,
"created_at" : "2024-12-21T07:12:58Z" ,
"description" : "某ladeX企业级开发平台 noticelist SQL 注入漏洞" ,
"author" : "jisec001" ,
"language" : "Python" ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/jisec001/da_hua" ,
"name" : "da_hua" ,
"created_at" : "2024-12-21T07:03:47Z" ,
"description" : "大华 DSS 数字监控系统存在SQL 注入漏洞复现" ,
"author" : "jisec001" ,
"language" : "Python" ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/jisec001/suite" ,
"name" : "suite" ,
"created_at" : "2024-12-21T07:02:37Z" ,
"description" : "SuiteCRM SQL注入漏洞" ,
"author" : "jisec001" ,
"language" : "Python" ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/keai714/CRM-index.php-SQL" ,
"name" : "CRM-index.php-SQL" ,
"created_at" : "2024-12-21T04:38:18Z" ,
"description" : "灵当CRM系统index.php存在SQL注入漏洞" ,
"author" : "keai714" ,
"language" : "Python" ,
"keyword" : "sql注入"
} ,
{
"link" : "https://github.com/20142995/wxvl" ,
"name" : "wxvl" ,
"created_at" : "2024-11-16T11:21:28Z" ,
"description" : "复现|漏洞|CVE|CNVD|POC|EXP|0day|1day|nday等相关微信文章收集" ,
"author" : "20142995" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/20142995/CNVD_crawler" ,
"name" : "CNVD_crawler" ,
"created_at" : "2024-09-02T10:54:53Z" ,
"description" : null ,
"author" : "20142995" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
2025-01-10 10:02:43 +08:00
{
"link" : "https://github.com/jmtruffa/cnvDownloader" ,
"name" : "cnvDownloader" ,
"created_at" : "2024-08-13T12:57:34Z" ,
"description" : "Downloader de data de CAFCI y parser de mails de FIMA" ,
"author" : "jmtruffa" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
2025-01-06 14:26:37 +08:00
{
"link" : "https://github.com/j8agent/CNVD-2024-15077--AJ-Report-RCE--" ,
"name" : "CNVD-2024-15077--AJ-Report-RCE--" ,
"created_at" : "2024-12-21T08:26:43Z" ,
"description" : "CNVD-2024-15077 AJ-Report 中swagger-ui的RCE漏洞" ,
"author" : "j8agent" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/must-bioinfo/fastCNVdata" ,
"name" : "fastCNVdata" ,
"created_at" : "2024-07-17T14:38:38Z" ,
"description" : "Datasets to run the vignettes of the R package fastCNV" ,
"author" : "must-bioinfo" ,
"language" : "R" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/XiaomingX/CNVD-2020-10487-Tomcat-Ajp-lfi" ,
"name" : "CNVD-2020-10487-Tomcat-Ajp-lfi" ,
"created_at" : "2024-12-08T04:14:03Z" ,
"description" : "Tomcat-Ajp协议文件读取漏洞" ,
"author" : "XiaomingX" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/lizhianyuguangming/TomcatScanPro" ,
"name" : "TomcatScanPro" ,
"created_at" : "2024-08-29T06:38:16Z" ,
"description" : "tomcat自动化漏洞扫描利用工具, 支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938/CNVD-2020-10487 文件包含" ,
"author" : "lizhianyuguangming" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/GoesM/ROS-CVE-CNVDs" ,
"name" : "ROS-CVE-CNVDs" ,
"created_at" : "2024-11-04T07:55:51Z" ,
"description" : "record and public CVE/CNVD IDs discovered by my works" ,
"author" : "GoesM" ,
"language" : null ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/xiadaogit/CNVD-" ,
"name" : "CNVD-" ,
"created_at" : "2024-10-30T07:13:00Z" ,
"description" : "CNVD挖的多了" ,
"author" : "xiadaogit" ,
"language" : null ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/sxq2003/CNVD-2022-10270" ,
"name" : "CNVD-2022-10270" ,
"created_at" : "2024-10-21T08:01:28Z" ,
"description" : null ,
"author" : "sxq2003" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/leonooo13/CNVD-2020-10487-Tomcat-Ajp-lfi" ,
"name" : "CNVD-2020-10487-Tomcat-Ajp-lfi" ,
"created_at" : "2024-09-27T17:05:09Z" ,
"description" : null ,
"author" : "leonooo13" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/Bin4xin/bigger-than-bigger" ,
"name" : "bigger-than-bigger" ,
"created_at" : "2021-04-16T01:33:26Z" ,
"description" : "Expolit Lists. 相关集合💥💥💥 ;) 用友NC反序列化/ CTF/ Java Deserialization/Shiro Vulns/ CNVD or CVE Vulns/ Log4j2/ Hikvision-decrypter...✨✨✨" ,
"author" : "Bin4xin" ,
"language" : "Java" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/OceanSec/cnvdtools" ,
"name" : "cnvdtools" ,
"created_at" : "2024-09-11T02:50:32Z" ,
"description" : "通过fofa批量查询通用系统, 配合去刷cnvd证书" ,
"author" : "OceanSec" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/kingqaquuu/CNVDspider" ,
"name" : "CNVDspider" ,
"created_at" : "2024-08-06T10:16:12Z" ,
"description" : "爬取CNVD共享漏洞文件" ,
"author" : "kingqaquuu" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/youxox/SeeYouOA-POC" ,
"name" : "SeeYouOA-POC" ,
"created_at" : "2024-05-12T11:45:28Z" ,
"description" : "致远OA ajax.do 任意文件上传漏洞检测 CNVD-2021-01627 " ,
"author" : "youxox" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/mesyedjunaidali/cnvdetection" ,
"name" : "cnvdetection" ,
"created_at" : "2024-07-16T05:57:09Z" ,
"description" : null ,
"author" : "mesyedjunaidali" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/bxxiaoxiong/cnvd_fofa_assets" ,
"name" : "cnvd_fofa_assets" ,
"created_at" : "2024-07-12T15:22:03Z" ,
"description" : "通过爱企查和FOFA接口获取注册资本大于5000w公司的公网通用系统, 方便获得CNVD证书 在搜索公网资产数量的基础上增加使用fid参数查询, 结果更精准" ,
"author" : "bxxiaoxiong" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/rtwen/cnvdst" ,
"name" : "cnvdst" ,
"created_at" : "2018-12-01T08:36:53Z" ,
"description" : "Copy number variant detection softawre" ,
"author" : "rtwen" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/RowtonSD/cnvdb" ,
"name" : "cnvdb" ,
"created_at" : "2024-03-14T08:17:22Z" ,
"description" : "Handles conversion between XLS, DB2, and external SQL DB sources via python dataframes" ,
"author" : "RowtonSD" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/eeeeeeeeee-code/e0e1-cnvd" ,
"name" : "e0e1-cnvd" ,
"created_at" : "2024-05-07T12:49:40Z" ,
"description" : "cnvd 范围扩展收集工具" ,
"author" : "eeeeeeeeee-code" ,
"language" : "Python" ,
"keyword" : "cnvd"
} ,
{
"link" : "https://github.com/Janhsu/DockerAPITool" ,
"name" : "DockerAPITool" ,
"created_at" : "2024-12-29T15:10:17Z" ,
"description" : "DockerRemoteAPI未授权访问(2375端口)利用工具,支持容器逃逸" ,
"author" : "Janhsu" ,
"language" : null ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/0xchang/RedisExp" ,
"name" : "RedisExp" ,
"created_at" : "2024-12-26T11:26:22Z" ,
"description" : "Redis未授权利用" ,
"author" : "0xchang" ,
"language" : "C#" ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/cm04918/timetask" ,
"name" : "timetask" ,
"created_at" : "2024-12-26T01:33:21Z" ,
"description" : "专为微信平台量身定制的chatgpt-on-wechat插件, 不仅赋予用户自定义定时任务的能力, 还提供了个性化的时间设定和轮询周期调整功能。这款插件功能全面, 涵盖了任务的动态添加、取消以及任务列表的查看等, 是您管理定时任务..." ,
"author" : "cm04918" ,
"language" : "Python" ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/Jilei-good/Kubelet-poc-" ,
"name" : "Kubelet-poc-" ,
"created_at" : "2024-12-26T02:58:25Z" ,
"description" : "Kubelet未授权批量检测脚本" ,
"author" : "Jilei-good" ,
"language" : "Python" ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/ajisai-babu/redis-unauth-hub" ,
"name" : "redis-unauth-hub" ,
"created_at" : "2024-09-29T08:57:32Z" ,
"description" : "基于docker的redis未授权访问漏洞复现环境" ,
"author" : "ajisai-babu" ,
"language" : "Dockerfile" ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/wsn001/-OAsap-b1config-aspx-" ,
"name" : "-OAsap-b1config-aspx-" ,
"created_at" : "2024-12-21T08:46:50Z" ,
"description" : "金和OAsap-b1config-aspx 未授权" ,
"author" : "wsn001" ,
"language" : "Python" ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/wangsec-y/JinHeOA_visit" ,
"name" : "JinHeOA_visit" ,
"created_at" : "2024-12-21T08:21:28Z" ,
"description" : "金和QA办公系统是.款集合了办公自动化协同办公工作流管理等功能的企业级管理软件。金和OA办公系统提供了多个模块, 包括日程管理、文件管理、邮件管理、人事管理、客户管理、项目管理等。用户可以根据自己的需求选择需..." ,
"author" : "wangsec-y" ,
"language" : "Python" ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/zxj-hub/weishouquan2POC" ,
"name" : "weishouquan2POC" ,
"created_at" : "2024-12-21T07:05:17Z" ,
"description" : "D-Link NAS设备 sc_mgr.cgi 未授权漏洞" ,
"author" : "zxj-hub" ,
"language" : "Python" ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/zxj-hub/CVE-2024-41713POC" ,
"name" : "CVE-2024-41713POC" ,
"created_at" : "2024-12-21T02:26:26Z" ,
"description" : "Mitel MiCollab 企业协作平台 任意文件读取漏洞(CVE-2024-41713)由于Mitel MiCollab软件的 NuPoint 统一消息 (NPM) 组件中存在身份验证绕过漏洞,并且输入验证不足,未经身份验证的远程攻击者可利用该漏洞执行路径遍历攻击,成功利用可能..." ,
"author" : "zxj-hub" ,
"language" : "Python" ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/zxj-hub/channeltree-POC" ,
"name" : "channeltree-POC" ,
"created_at" : "2024-12-20T15:36:22Z" ,
"description" : "livenvr青柿视频管理系统channeltree接口处存在未授权访问漏洞" ,
"author" : "zxj-hub" ,
"language" : null ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/ainrm/Jrohy-trojan-unauth-poc" ,
"name" : "Jrohy-trojan-unauth-poc" ,
"created_at" : "2024-11-28T07:05:30Z" ,
"description" : "Jrohy/trojan 未授权修改管理员密码" ,
"author" : "ainrm" ,
"language" : "Python" ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/hou-yy/mbkRce" ,
"name" : "mbkRce" ,
"created_at" : "2024-12-20T00:48:14Z" ,
"description" : "selectUserByOrgId 未授权访问漏洞批量检测脚本" ,
"author" : "hou-yy" ,
"language" : "Python" ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/Popo-data/-selectUserByOrgId-" ,
"name" : "-selectUserByOrgId-" ,
"created_at" : "2024-12-19T15:47:17Z" ,
"description" : "满客宝智慧食堂系统selectUserByOrgId存在未授权访问漏洞" ,
"author" : "Popo-data" ,
"language" : "Python" ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/XiaomingX/ddos_attack_script_demo" ,
"name" : "ddos_attack_script_demo" ,
"created_at" : "2024-11-22T03:34:19Z" ,
"description" : "仅用于授权情况下验证安全产品的抗DDoS能力, 请不要在未经网站所有者同意的情况下进行攻击。" ,
"author" : "XiaomingX" ,
"language" : "Python" ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/qingchenhh/jwt_sec" ,
"name" : "jwt_sec" ,
"created_at" : "2024-08-21T01:36:46Z" ,
"description" : "jwt自动化测试, 放入请求的URL、jwt和请求参数, 自动化测试jwt, 先原始访问, 再未授权访问, 再jwt的alg改为none测试, 最后再jwt爆破测试。" ,
"author" : "qingchenhh" ,
"language" : "Python" ,
"keyword" : "未授权"
} ,
{
"link" : "https://github.com/chasingboy/appsx" ,
"name" : "appsx" ,
"created_at" : "2024-11-28T08:22:46Z" ,
"description" : "appsx 是一款自动化信息收集|敏感信息识别|未授权漏洞扫描工具" ,
"author" : "chasingboy" ,
"language" : null ,
"keyword" : "未授权"
} ,
2025-01-15 11:02:39 +08:00
{
"link" : "https://github.com/lichunown/head-encrypt" ,
"name" : "head-encrypt" ,
"created_at" : "2024-11-22T08:31:19Z" ,
"description" : "head-encrypt 文件(头)加密工具。 在只想防止未经授权的访问者识别文件类型或内容时。由于完全加密大型文件耗时 head-encrypt提供了一种解决方案, 通过仅加密文件的头部部分, 减少了加密过程所需的时间。" ,
"author" : "lichunown" ,
"language" : "Python" ,
"keyword" : "未授权"
} ,
2025-01-06 14:26:37 +08:00
{
"link" : "https://github.com/20142995/wxvl" ,
"name" : "wxvl" ,
"created_at" : "2024-11-16T11:21:28Z" ,
"description" : "复现|漏洞|CVE|CNVD|POC|EXP|0day|1day|nday等相关微信文章收集" ,
"author" : "20142995" ,
"language" : "Python" ,
"keyword" : "漏洞POC"
} ,
{
"link" : "https://github.com/126789t/poc_everyday" ,
"name" : "poc_everyday" ,
"created_at" : "2024-12-11T00:32:34Z" ,
"description" : "自动搜集每天的漏洞poc和exp信息。" ,
"author" : "126789t" ,
"language" : null ,
"keyword" : "漏洞POC"
} ,
{
2025-01-10 10:02:43 +08:00
"link" : "https://github.com/adysec/nuclei_poc" ,
"name" : "nuclei_poc" ,
"created_at" : "2024-05-07T03:03:34Z" ,
"description" : "Nuclei POC, 每日更新 | 自动整合全网Nuclei的漏洞POC, 实时同步更新最新POC, 保存已被删除的POC。通过批量克隆Github项目, 获取Nuclei POC, 并将POC按类别分类存放, 使用Github Action实现( 已有14wPOC, 已校验有效性并去重) " ,
"author" : "adysec" ,
"language" : "Python" ,
"keyword" : "漏洞POC"
} ,
2025-01-15 11:02:39 +08:00
{
"link" : "https://github.com/Threekiii/Vulnerability-Wiki" ,
"name" : "Vulnerability-Wiki" ,
"created_at" : "2022-04-29T05:36:33Z" ,
"description" : "基于 docsify 快速部署 Awesome-POC 中的漏洞文档" ,
"author" : "Threekiii" ,
"language" : "HTML" ,
"keyword" : "漏洞POC"
} ,
{
"link" : "https://github.com/Threekiii/Awesome-POC" ,
"name" : "Awesome-POC" ,
"created_at" : "2022-02-20T06:43:22Z" ,
"description" : "一个漏洞POC知识库 目前数量 1000+" ,
"author" : "Threekiii" ,
"language" : null ,
"keyword" : "漏洞POC"
} ,
{
"link" : "https://github.com/Threekiii/CVE" ,
"name" : "CVE" ,
"created_at" : "2023-01-05T02:19:29Z" ,
"description" : "一个CVE漏洞预警知识库 no exp/poc" ,
"author" : "Threekiii" ,
"language" : null ,
"keyword" : "漏洞POC"
} ,
{
"link" : "https://github.com/lal0ne/vulnerability" ,
"name" : "vulnerability" ,
"created_at" : "2022-01-20T02:48:42Z" ,
"description" : "收集、整理、修改互联网上公开的漏洞POC" ,
"author" : "lal0ne" ,
"language" : "Go" ,
"keyword" : "漏洞POC"
} ,
{
"link" : "https://github.com/wy876/POC" ,
"name" : "POC" ,
"created_at" : "2023-08-19T12:08:53Z" ,
"description" : "收集整理漏洞EXP/POC,大部分漏洞来源网络, 目前收集整理了1400多个poc/exp, 长期更新。" ,
"author" : "wy876" ,
"language" : null ,
"keyword" : "漏洞POC"
} ,
2025-01-10 10:02:43 +08:00
{
"link" : "https://github.com/perlh/hscan" ,
"name" : "hscan" ,
"created_at" : "2023-08-17T21:03:50Z" ,
"description" : "hscan 网络资产收集与漏洞扫描探活 服务扫描(常规 & 非常规端口)、 poc探测( xray v2 & nuclei 格式) 、数据库等弱口令爆破 、内网常见漏洞利用" ,
"author" : "perlh" ,
"language" : "Go" ,
2025-01-06 14:26:37 +08:00
"keyword" : "漏洞POC"
} ,
{
"link" : "https://github.com/Y5neKO/Y5_VulnHub" ,
"name" : "Y5_VulnHub" ,
"created_at" : "2024-07-09T03:41:47Z" ,
"description" : "个人漏洞收集项目, 包括复现环境、POC、EXP等" ,
"author" : "Y5neKO" ,
"language" : "Python" ,
"keyword" : "漏洞POC"
} ,
{
"link" : "https://github.com/zan8in/afrog-pocs" ,
"name" : "afrog-pocs" ,
"created_at" : "2023-10-15T11:44:22Z" ,
"description" : "afrog-pocs 是 afrog 漏洞检测工具的官方 PoCs( Proof of Concepts) 库。" ,
"author" : "zan8in" ,
"language" : null ,
"keyword" : "漏洞POC"
} ,
{
"link" : "https://github.com/xl1nv/pocs" ,
"name" : "pocs" ,
"created_at" : "2024-12-24T02:43:40Z" ,
"description" : "一些漏洞的poc" ,
"author" : "xl1nv" ,
"language" : "Python" ,
"keyword" : "漏洞POC"
} ,
{
"link" : "https://github.com/ayy138/SpringBlade_Sql" ,
"name" : "SpringBlade_Sql" ,
"created_at" : "2024-12-21T08:34:10Z" ,
"description" : "SpringBlade tenant/list SQL 注入漏洞复现及POC" ,
"author" : "ayy138" ,
"language" : "Python" ,
"keyword" : "漏洞POC"
} ,
{
"link" : "https://github.com/ayy138/IPVideo_Fileupload_POC" ,
"name" : "IPVideo_Fileupload_POC" ,
"created_at" : "2024-12-21T08:31:47Z" ,
"description" : "IP网络广播服务平台任意文件上传漏洞复现及POC" ,
"author" : "ayy138" ,
"language" : "Python" ,
"keyword" : "漏洞POC"
} ,
{
"link" : "https://github.com/zxj-hub/sql2POC" ,
"name" : "sql2POC" ,
"created_at" : "2024-12-21T08:19:42Z" ,
"description" : "用友U8-CRM系统getDeptNameSQL注入漏洞检测POC" ,
"author" : "zxj-hub" ,
"language" : "Python" ,
"keyword" : "漏洞POC"
} ,
{
"link" : "https://github.com/abyssdawn/poc_scan_web" ,
"name" : "poc_scan_web" ,
"created_at" : "2024-09-20T02:46:03Z" ,
"description" : "全自动化漏洞扫描系统。包括poc扫描、sql注入漏洞扫描、资产收集( 模仿fofa) 等功能。" ,
"author" : "abyssdawn" ,
"language" : null ,
"keyword" : "漏洞POC"
} ,
{
"link" : "https://github.com/NingXin2002/XETUX-POC" ,
"name" : "XETUX-POC" ,
"created_at" : "2024-12-19T10:22:14Z" ,
"description" : "XETUX 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞POC" ,
"author" : "NingXin2002" ,
"language" : "Python" ,
"keyword" : "漏洞POC"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/cultureelerfgoed/sparql" ,
"name" : "sparql" ,
"created_at" : "2018-03-27T11:51:01Z" ,
"description" : "In deze repositories worden openbare SPARQL queries verzameld die gebruikt worden op linked datasets van de RCE" ,
2025-01-06 14:26:37 +08:00
"author" : "cultureelerfgoed" ,
"language" : "Python" ,
"keyword" : "RCE"
} ,
{
"link" : "https://github.com/GhostTroops/TOP" ,
"name" : "TOP" ,
"created_at" : "2022-03-19T01:54:15Z" ,
"description" : "TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things" ,
"author" : "GhostTroops" ,
"language" : "Shell" ,
"keyword" : "RCE"
} ,
{
"link" : "https://github.com/StevenRCE0/StevenRCE0" ,
"name" : "StevenRCE0" ,
"created_at" : "2022-02-25T09:22:13Z" ,
"description" : "Hello meow!" ,
"author" : "StevenRCE0" ,
"language" : null ,
"keyword" : "RCE"
} ,
{
2025-01-10 10:02:43 +08:00
"link" : "https://github.com/XiaomingX/proxy-pool" ,
"name" : "proxy-pool" ,
"created_at" : "2024-11-26T12:57:48Z" ,
"description" : "Python ProxyPool for web spider" ,
"author" : "XiaomingX" ,
2025-01-06 14:26:37 +08:00
"language" : "Python" ,
"keyword" : "RCE"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/cultureelerfgoed/rce-thesauri-backup" ,
"name" : "rce-thesauri-backup" ,
"created_at" : "2023-10-17T12:00:47Z" ,
"description" : "Automatic thesauri backups from RCE PoolParty" ,
"author" : "cultureelerfgoed" ,
"language" : "Python" ,
"keyword" : "RCE"
} ,
{
"link" : "https://github.com/rcevulndev/rcevulndev.github.io" ,
"name" : "rcevulndev.github.io" ,
"created_at" : "2021-06-03T19:56:44Z" ,
"description" : null ,
"author" : "rcevulndev" ,
"language" : "HTML" ,
"keyword" : "RCE"
} ,
{
"link" : "https://github.com/bo0l3an/CVE-2024-49112-PoC" ,
"name" : "CVE-2024-49112-PoC" ,
"created_at" : "2025-01-08T01:56:41Z" ,
"description" : "CVE-2024-49112 LDAP RCE PoC and Metasploit Module" ,
"author" : "bo0l3an" ,
"language" : "Python" ,
2025-01-10 10:02:43 +08:00
"keyword" : "RCE"
} ,
{
"link" : "https://github.com/tencentcloud-sdk-php/rce" ,
"name" : "rce" ,
"created_at" : "2021-02-20T09:13:31Z" ,
2025-01-06 14:26:37 +08:00
"description" : null ,
2025-01-10 10:02:43 +08:00
"author" : "tencentcloud-sdk-php" ,
"language" : "PHP" ,
2025-01-06 14:26:37 +08:00
"keyword" : "RCE"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/darksideoftheshmoo/rcell2.examples" ,
"name" : "rcell2.examples" ,
"created_at" : "2022-04-15T19:52:23Z" ,
"description" : "Example notebooks and sample data for rcell2" ,
"author" : "darksideoftheshmoo" ,
"language" : "R" ,
2025-01-06 14:26:37 +08:00
"keyword" : "RCE"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/fl4m3-s/Cleo_Unauth_RCE" ,
"name" : "Cleo_Unauth_RCE" ,
"created_at" : "2025-01-14T03:32:36Z" ,
"description" : "Proof of concept to use an arbitrary file write to achieve Remote Code Execution in Cleo Harmony, VLTrader, and LexiCom before 5.8.0.24." ,
"author" : "fl4m3-s" ,
"language" : "Python" ,
2025-01-06 14:26:37 +08:00
"keyword" : "RCE"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/shelldivers/Just1RCe" ,
"name" : "Just1RCe" ,
"created_at" : "2024-11-12T11:05:01Z" ,
"description" : "irc" ,
"author" : "shelldivers" ,
"language" : "C++" ,
2025-01-06 14:26:37 +08:00
"keyword" : "RCE"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/darksideoftheshmoo/rcell2-cellid" ,
"name" : "rcell2-cellid" ,
"created_at" : "2022-10-11T15:29:22Z" ,
"description" : "R package bundling Cell-ID and tools to optimize its performance." ,
"author" : "darksideoftheshmoo" ,
"language" : "C" ,
2025-01-06 14:26:37 +08:00
"keyword" : "RCE"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/leistimo/RCET_ThirdSemester" ,
"name" : "RCET_ThirdSemester" ,
"created_at" : "2022-03-29T21:15:03Z" ,
2025-01-10 10:02:43 +08:00
"description" : null ,
2025-01-15 11:02:39 +08:00
"author" : "leistimo" ,
"language" : null ,
"keyword" : "RCE"
} ,
{
"link" : "https://github.com/canonai/New-RCE-script-" ,
"name" : "New-RCE-script-" ,
"created_at" : "2025-01-13T15:37:02Z" ,
"description" : "Python programming language script, easy to run, and still have to do it in a home lab or something. Enjoy our work!" ,
"author" : "canonai" ,
2025-01-10 10:02:43 +08:00
"language" : "Python" ,
2025-01-06 14:26:37 +08:00
"keyword" : "RCE"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/N4s1rl1/Limesurvey-6.6.4-RCE" ,
"name" : "Limesurvey-6.6.4-RCE" ,
"created_at" : "2025-01-13T14:34:14Z" ,
"description" : "Getting RCE (Remote Code Execution) for LimeSurvey version 6.6.4." ,
"author" : "N4s1rl1" ,
2025-01-10 10:02:43 +08:00
"language" : "Python" ,
2025-01-06 14:26:37 +08:00
"keyword" : "RCE"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/rhtap-rhdh-qe/o2b6rce2e-dotnet-basic-gitops" ,
"name" : "o2b6rce2e-dotnet-basic-gitops" ,
"created_at" : "2025-01-13T06:31:46Z" ,
"description" : "This is GitOps repository for o2b6rce2e-dotnet-basic" ,
"author" : "rhtap-rhdh-qe" ,
2025-01-10 10:02:43 +08:00
"language" : null ,
2025-01-06 14:26:37 +08:00
"keyword" : "RCE"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/rhtap-rhdh-qe/o2b6rce2e-dotnet-basic" ,
"name" : "o2b6rce2e-dotnet-basic" ,
"created_at" : "2025-01-13T06:31:40Z" ,
"description" : "This is o2b6rce2e-dotnet-basic" ,
"author" : "rhtap-rhdh-qe" ,
"language" : "HTML" ,
"keyword" : "RCE"
} ,
{
"link" : "https://github.com/Nikhil-Pachpande/web-crawler" ,
"name" : "web-crawler" ,
"created_at" : "2023-02-03T03:13:13Z" ,
"description" : "This project is a simple web crawler and web security scanner that identifies vulnerabilities such as SQLi, XSS, CSRF, SSRF, LFI, and RCE on a given set of URLs." ,
"author" : "Nikhil-Pachpande" ,
2025-01-10 10:02:43 +08:00
"language" : "Python" ,
"keyword" : "RCE"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/yangrchen/collab-runner-rce" ,
"name" : "collab-runner-rce" ,
"created_at" : "2024-12-28T05:31:53Z" ,
"description" : "Realtime collaborative code runner using Firecracker microVMs." ,
"author" : "yangrchen" ,
"language" : "Go" ,
2025-01-06 14:26:37 +08:00
"keyword" : "RCE"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/alienfxfiend/Prelude-in-C" ,
"name" : "Prelude-in-C" ,
"created_at" : "2022-09-21T20:30:37Z" ,
"description" : "xL AUX *~My Journey Into Programming~* *~My Learning Path~* *~Diary Of A Reverse Engineer~* *~Legacy of RCE Chronicles & Code Mastery~* *~Gdev Kdev Primer Sysdev 101 Capture The Flag CTF Macro Excerpt [Codemasters]~* *~Steep Learning Curve~* :comet: —Cybernetic Crew Brb乇√iレ◥Çレ₳Ñ◤" ,
"author" : "alienfxfiend" ,
"language" : null ,
2025-01-06 14:26:37 +08:00
"keyword" : "RCE"
} ,
2025-01-15 11:02:39 +08:00
{
"link" : "https://github.com/cpkkcb/fuzzDicts" ,
"name" : "fuzzDicts" ,
"created_at" : "2020-11-26T04:51:29Z" ,
"description" : "渗透测试路径字典,爆破字典。内容来自互联网和实战积累。" ,
"author" : "cpkkcb" ,
"language" : null ,
"keyword" : "渗透测试"
} ,
2025-01-06 14:26:37 +08:00
{
"link" : "https://github.com/arch3rPro/PST-Bucket" ,
"name" : "PST-Bucket" ,
"created_at" : "2023-04-24T06:49:11Z" ,
"description" : "Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop" ,
"author" : "arch3rPro" ,
"language" : "PowerShell" ,
"keyword" : "渗透测试"
} ,
2025-01-10 10:02:43 +08:00
{
"link" : "https://github.com/whoopscs/scoop-security" ,
"name" : "scoop-security" ,
"created_at" : "2024-05-06T14:17:13Z" ,
"description" : "Scoop bucket for Penetration Testing and Cybersecurity related tools. 用于渗透测试和网络安全相关工具下载、安装和自动更新的Scoop软件仓库。" ,
"author" : "whoopscs" ,
"language" : "PowerShell" ,
"keyword" : "渗透测试"
} ,
2025-01-06 14:26:37 +08:00
{
"link" : "https://github.com/adysec/ARL" ,
"name" : "ARL" ,
"created_at" : "2024-05-13T10:04:52Z" ,
"description" : "ARL 资产侦察灯塔系统(可运行,添加指纹,提高并发,升级工具及系统,无限制修改版) | ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗..." ,
"author" : "adysec" ,
"language" : "Python" ,
"keyword" : "渗透测试"
} ,
2025-01-10 10:02:43 +08:00
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/INotGreen/XiebroC2" ,
"name" : "XiebroC2" ,
"created_at" : "2024-02-15T15:46:07Z" ,
"description" : "渗透测试C2、支持Lua插件扩展、域前置/CDN上线、自定义profile、前置sRDI、文件管理、进程管理、内存加载、截图、反向代理、分组管理" ,
"author" : "INotGreen" ,
"language" : "Go" ,
"keyword" : "渗透测试"
} ,
{
"link" : "https://github.com/doimet/AuxTools" ,
"name" : "AuxTools" ,
"created_at" : "2022-05-03T16:53:11Z" ,
"description" : "图形化渗透测试辅助工具" ,
"author" : "doimet" ,
2025-01-10 10:02:43 +08:00
"language" : null ,
"keyword" : "渗透测试"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/kkbo8005/mitan" ,
"name" : "mitan" ,
"created_at" : "2024-04-03T09:59:12Z" ,
"description" : "密探渗透测试工具包含资产信息收集, 子域名爆破, 搜索语法, 资产测绘( FOFA, Hunter, quake, ZoomEye) , 指纹识别, 敏感信息采集, 文件扫描、端口扫描、批量信息权重查询、密码字典等功能" ,
"author" : "kkbo8005" ,
"language" : null ,
2025-01-10 10:02:43 +08:00
"keyword" : "渗透测试"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/birdhan/SecurityTools" ,
"name" : "SecurityTools" ,
"created_at" : "2022-03-07T07:52:37Z" ,
"description" : "渗透测试工具包 | 开源安全测试工具 | 网络安全工具" ,
"author" : "birdhan" ,
2025-01-10 10:02:43 +08:00
"language" : null ,
"keyword" : "渗透测试"
} ,
2025-01-06 14:26:37 +08:00
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/Leeyangee/leeyangee.github.io" ,
"name" : "leeyangee.github.io" ,
"created_at" : "2023-06-19T02:22:19Z" ,
"description" : "个人博客,关于渗透测试和审计,请访问 leeyabug.top" ,
"author" : "Leeyangee" ,
2025-01-06 14:26:37 +08:00
"language" : "HTML" ,
"keyword" : "渗透测试"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/SurrealSky/web_security" ,
"name" : "web_security" ,
"created_at" : "2020-03-13T09:29:24Z" ,
"description" : "web以及二进制安全, 渗透测试, 漏洞挖掘, 工控安全学习笔记" ,
"author" : "SurrealSky" ,
"language" : "Python" ,
2025-01-06 14:26:37 +08:00
"keyword" : "渗透测试"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/vsdwef/James_synthesis_tooL" ,
"name" : "James_synthesis_tooL" ,
"created_at" : "2024-11-25T08:50:21Z" ,
"description" : "旨在帮助技术人员在日常渗透测试或攻防演练中对于漏洞及指纹的积累, 形成自己强大的漏洞库及指纹库。相比于nuclei脚本可能会相对无脑简化! 且采用GUI设置, 使用起来也更加方便! " ,
"author" : "vsdwef" ,
2025-01-06 14:26:37 +08:00
"language" : null ,
"keyword" : "渗透测试"
} ,
{
"link" : "https://github.com/yuning029/PenSafe" ,
"name" : "PenSafe" ,
"created_at" : "2025-01-02T05:25:47Z" ,
"description" : "PenSafe( 渗透测试安全扫描器) , 能用上此工具说明测试系统很安全! ! ! " ,
"author" : "yuning029" ,
"language" : "Go" ,
"keyword" : "渗透测试"
} ,
{
"link" : "https://github.com/sec-report/SecReport" ,
"name" : "SecReport" ,
"created_at" : "2023-04-10T16:18:53Z" ,
"description" : "ChatGPT加持的, 多人在线协同信息安全报告编写平台。目前支持的报告类型: 渗透测试报告, APP隐私合规报告。" ,
"author" : "sec-report" ,
"language" : "Python" ,
"keyword" : "渗透测试"
} ,
2025-01-15 11:02:39 +08:00
{
"link" : "https://github.com/VirgoLee/Virgol" ,
"name" : "Virgol" ,
"created_at" : "2024-11-13T05:39:11Z" ,
"description" : "Virgol渗透测试工具集" ,
"author" : "VirgoLee" ,
"language" : null ,
"keyword" : "渗透测试"
} ,
{
"link" : "https://github.com/Mr-xn/Penetration_Testing_POC" ,
"name" : "Penetration_Testing_POC" ,
"created_at" : "2019-07-24T03:37:55Z" ,
"description" : "渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms" ,
"author" : "Mr-xn" ,
"language" : "HTML" ,
"keyword" : "渗透测试"
} ,
2025-01-06 14:26:37 +08:00
{
2025-01-10 10:02:43 +08:00
"link" : "https://github.com/mohdkey/easy_bash" ,
"name" : "easy_bash" ,
"created_at" : "2024-12-29T09:06:56Z" ,
"description" : "渗透测试用的集成bash脚本, 目前还在doing" ,
"author" : "mohdkey" ,
"language" : "Shell" ,
2025-01-06 14:26:37 +08:00
"keyword" : "渗透测试"
} ,
{
"link" : "https://github.com/hanc00l/nemo_go" ,
"name" : "nemo_go" ,
"created_at" : "2021-07-29T08:13:25Z" ,
"description" : "Nemo是用来进行自动化信息收集的一个简单平台, 通过集成常用的信息收集工具和技术, 实现对内网及互联网资产信息的自动收集, 提高隐患排查和渗透测试的工作效率。" ,
"author" : "hanc00l" ,
"language" : "JavaScript" ,
"keyword" : "渗透测试"
} ,
{
"link" : "https://github.com/Toddli468/Pentest-Scoop-Bucket" ,
"name" : "Pentest-Scoop-Bucket" ,
"created_at" : "2024-08-13T07:57:06Z" ,
"description" : "渗透测试相关工具脚本的Scoop软件仓库" ,
"author" : "Toddli468" ,
"language" : "PowerShell" ,
"keyword" : "渗透测试"
} ,
{
"link" : "https://github.com/IronShell018/Penetration_test_Resources" ,
"name" : "Penetration_test_Resources" ,
"created_at" : "2024-10-24T06:30:33Z" ,
"description" : "网络安全、渗透测试相关资源收集整理" ,
"author" : "IronShell018" ,
"language" : null ,
"keyword" : "渗透测试"
} ,
{
"link" : "https://github.com/en0th/ElectricRat" ,
"name" : "ElectricRat" ,
"created_at" : "2023-02-22T01:04:21Z" ,
"description" : "电气鼠靶场系统是一种带有漏洞的Web应用程序, 旨在为Web安全渗透测试学习者提供学习和实践的机会。The Electrical Mouse Target Range System is a web application with vulnerabilities designed to provide learning and practice opportunities for web security penetrat..." ,
"author" : "en0th" ,
"language" : "JavaScript" ,
"keyword" : "渗透测试"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/y1shiny1shin/Seri" ,
"name" : "Seri" ,
"created_at" : "2024-12-26T07:24:55Z" ,
"description" : "个人反序列化学习代码" ,
"author" : "y1shiny1shin" ,
"language" : "Java" ,
"keyword" : "反序列化"
} ,
{
"link" : "https://github.com/LiSForever/unserialization" ,
"name" : "unserialization" ,
"created_at" : "2024-09-24T09:41:25Z" ,
"description" : "反序列化" ,
"author" : "LiSForever" ,
"language" : "Java" ,
"keyword" : "反序列化"
} ,
{
"link" : "https://github.com/godownio/java_unserial_attackcode" ,
"name" : "java_unserial_attackcode" ,
"created_at" : "2024-09-21T10:10:44Z" ,
"description" : "Java反序列化字节码生成器" ,
"author" : "godownio" ,
"language" : "Java" ,
"keyword" : "反序列化"
} ,
{
"link" : "https://github.com/miahemu/juechen-rpc" ,
"name" : "juechen-rpc" ,
"created_at" : "2025-01-13T16:05:26Z" ,
"description" : "基于 Java + Etcd + Vert.x 的高性能 RPC 框架,用新颖的技术栈从 0 到 1 开发轮子。基于 Vert.x 的网络服务器、序列化器、基于 Etcd 和 ZooKeeper 的注册中心、反射、动态代理、自定义网络协议、多种设计模式(单例 / 工厂 / 装饰者等)..." ,
"author" : "miahemu" ,
2025-01-06 14:26:37 +08:00
"language" : null ,
2025-01-15 11:02:39 +08:00
"keyword" : "反序列化"
2025-01-06 14:26:37 +08:00
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/my6521/WWB.BufferSerializer" ,
"name" : "WWB.BufferSerializer" ,
"created_at" : "2025-01-13T07:49:55Z" ,
"description" : "一个非常简单的二进制序列化和反序列化工具" ,
"author" : "my6521" ,
"language" : "C#" ,
"keyword" : "反序列化"
2025-01-06 14:26:37 +08:00
} ,
{
"link" : "https://github.com/B0T1eR/ysoSimple" ,
"name" : "ysoSimple" ,
"created_at" : "2025-01-01T09:39:20Z" ,
"description" : "ysoSimple: 简易的Java漏洞利用工具, 集成Java反序列化, Hessian反序列化, XStream反序列化, SnakeYaml反序列化, Shiro550, JSF反序列化, SSTI模板注入, JdbcAttackPayload, JNDIAttack, 字节码生成。" ,
"author" : "B0T1eR" ,
"language" : "Java" ,
"keyword" : "反序列化"
} ,
2025-01-15 11:02:39 +08:00
{
"link" : "https://github.com/Ape1ron/SpringAopInDeserializationDemo1" ,
"name" : "SpringAopInDeserializationDemo1" ,
"created_at" : "2025-01-11T09:22:18Z" ,
"description" : "在spring-aop中新发现的反序列化gadget-chain" ,
"author" : "Ape1ron" ,
"language" : "Java" ,
"keyword" : "反序列化"
} ,
{
"link" : "https://github.com/Ape1ron/FastjsonInDeserializationDemo1" ,
"name" : "FastjsonInDeserializationDemo1" ,
"created_at" : "2025-01-11T09:17:33Z" ,
"description" : "高版本Fastjson在Java原生反序列化中的利用演示" ,
"author" : "Ape1ron" ,
"language" : "Java" ,
"keyword" : "反序列化"
} ,
2025-01-10 10:02:43 +08:00
{
"link" : "https://github.com/jar-analyzer/jar-analyzer" ,
"name" : "jar-analyzer" ,
"created_at" : "2023-10-07T15:42:35Z" ,
"description" : "Jar Analyzer - 一个JAR包分析工具, 批量分析, SCA漏洞分析, 方法调用关系搜索, 字符串搜索, Spring组件分析, 信息泄露检查, CFG程序分析, JVM栈帧分析, 进阶表达式搜索, 字节码指令级的动态调试分析, 反编译JAR包一键导出, 一..." ,
"author" : "jar-analyzer" ,
"language" : "Java" ,
"keyword" : "反序列化"
} ,
{
"link" : "https://github.com/H4cking2theGate/ysogate" ,
"name" : "ysogate" ,
"created_at" : "2023-10-21T13:20:19Z" ,
"description" : "Java反序列化/JNDI注入/恶意类生成工具, 支持多种高版本bypass, 支持回显/内存马等多种扩展利用。" ,
"author" : "H4cking2theGate" ,
"language" : "Java" ,
"keyword" : "反序列化"
} ,
{
"link" : "https://github.com/864381832/xJavaFxTool" ,
"name" : "xJavaFxTool" ,
"created_at" : "2017-08-27T04:38:06Z" ,
"description" : "基于JavaFx搭建的实用小工具集合, 方便开发过程中的代码编写与调试, 想学习javaFx的同学可以参考参考。其中包括文件复制、Cron表达式生成器、编码转换、加密解密、Time转换、路径转换、二维码生成工具、身份证生成器、正则..." ,
"author" : "864381832" ,
"language" : "Java" ,
"keyword" : "反序列化"
} ,
2025-01-06 14:26:37 +08:00
{
"link" : "https://github.com/cooker-sast/gx" ,
"name" : "gx" ,
"created_at" : "2024-10-19T14:39:29Z" ,
"description" : "This is a repository representing how cooker-sast implements gadget exploring.这个仓库分享了cooker实现java反序列化利用链自动化挖掘的设计思路和核心细节" ,
"author" : "cooker-sast" ,
"language" : null ,
"keyword" : "反序列化"
} ,
{
"link" : "https://github.com/Java-Chains/web-chains" ,
"name" : "web-chains" ,
"created_at" : "2024-11-02T10:41:25Z" ,
"description" : "Web 版 Java Payload 生成与利用工具,提供 Java 反序列化、Hessian 1/2 反序列化等Payload生成, 以及 JNDI、Fake Mysql、JRMPListener 等利用| The web version of Java Payload generation and utilization tool provides Payload generation such as Java deserialization and Hessian..." ,
"author" : "Java-Chains" ,
"language" : "Dockerfile" ,
"keyword" : "反序列化"
} ,
{
"link" : "https://github.com/CaoMeiYouRen/safe-json-type" ,
"name" : "safe-json-type" ,
"created_at" : "2019-12-23T15:44:13Z" ,
"description" : "将json中不支持的Date和Bytes(Buffer)用安全的方法序列化,并在反序列化后找回对应的类型(而不是字符串)" ,
"author" : "CaoMeiYouRen" ,
"language" : "TypeScript" ,
"keyword" : "反序列化"
} ,
{
"link" : "https://github.com/yukuyoulei/ConfigExcel" ,
"name" : "ConfigExcel" ,
"created_at" : "2022-01-30T09:41:10Z" ,
"description" : "【ConfigExcel】 excel导出成C#类并填充数据, 省去序列化和反序列化的消耗。以前是不能热更, 不往这方面想, 能热更了为啥lua能当配置表C#就不行" ,
"author" : "yukuyoulei" ,
"language" : "C#" ,
"keyword" : "反序列化"
} ,
{
"link" : "https://github.com/Xstephe/RPC-" ,
"name" : "RPC-" ,
"created_at" : "2024-07-21T04:59:19Z" ,
"description" : "集群和分布式概念以及原理 RPC远程过程调用原理以及实现 Protobuf数据序列化和反序列化协议 ZooKeeper分布式一致性协调服务应用以及编程 muduo网络库编程 conf配置文件读取 异步日志 CMake构建项目集成编译环境 " ,
"author" : "Xstephe" ,
"language" : "Makefile" ,
"keyword" : "反序列化"
} ,
{
"link" : "https://github.com/Oceanzbz/JavaSecStu" ,
"name" : "JavaSecStu" ,
"created_at" : "2024-12-29T06:08:47Z" ,
"description" : "Java反序列化的一些学习记录" ,
"author" : "Oceanzbz" ,
"language" : "Java" ,
"keyword" : "反序列化"
} ,
{
"link" : "https://github.com/triplexlove/javasocket" ,
"name" : "javasocket" ,
"created_at" : "2024-08-26T17:22:56Z" ,
"description" : "java实现反序列化建立socket连接" ,
"author" : "triplexlove" ,
"language" : "Java" ,
"keyword" : "反序列化"
} ,
{
"link" : "https://github.com/zschong/dns" ,
"name" : "dns" ,
"created_at" : "2024-12-20T12:18:59Z" ,
"description" : "dns报文序列化、反序列化( 组包、拆包) " ,
"author" : "zschong" ,
"language" : "C" ,
"keyword" : "反序列化"
} ,
{
"link" : "https://github.com/j05070415/QSerializer" ,
"name" : "QSerializer" ,
"created_at" : "2024-08-11T10:42:34Z" ,
"description" : "基于Qt的QDataStream, 做了一层封装, 实现Qt数据和自定义结构体类的序列号和反序列化, 简化使用流程" ,
"author" : "j05070415" ,
"language" : "C++" ,
"keyword" : "反序列化"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/zhou274/Forestdefense" ,
"name" : "Forestdefense" ,
"created_at" : "2025-01-06T07:22:34Z" ,
"description" : "森林攻防" ,
"author" : "zhou274" ,
"language" : "C#" ,
"keyword" : "攻防"
2025-01-06 14:26:37 +08:00
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/guchangan1/All-Defense-Tool" ,
"name" : "All-Defense-Tool" ,
"created_at" : "2022-04-25T11:45:06Z" ,
"description" : "本项目集成了全网优秀的攻防武器工具项目, 包含自动化利用, 子域名、目录扫描、端口扫描等信息收集工具, 各大中间件、cms、OA漏洞利用工具, 爆破工具、内网横向、免杀、社工钓鱼以及应急响应、甲方安全资料等其他安全..." ,
"author" : "guchangan1" ,
"language" : null ,
"keyword" : "攻防"
2025-01-06 14:26:37 +08:00
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/Threekiii/Awesome-Redteam" ,
"name" : "Awesome-Redteam" ,
"created_at" : "2022-02-08T00:45:03Z" ,
"description" : "一个攻防知识仓库 Red Teaming and Offensive Security" ,
"author" : "Threekiii" ,
"language" : "Python" ,
"keyword" : "攻防"
2025-01-06 14:26:37 +08:00
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/vsdwef/James_synthesis_tooL" ,
"name" : "James_synthesis_tooL" ,
"created_at" : "2024-11-25T08:50:21Z" ,
"description" : "旨在帮助技术人员在日常渗透测试或攻防演练中对于漏洞及指纹的积累, 形成自己强大的漏洞库及指纹库。相比于nuclei脚本可能会相对无脑简化! 且采用GUI设置, 使用起来也更加方便! " ,
"author" : "vsdwef" ,
"language" : null ,
"keyword" : "攻防"
2025-01-06 14:26:37 +08:00
} ,
{
2025-01-10 10:02:43 +08:00
"link" : "https://github.com/ngc660sec/NGCBot" ,
"name" : "NGCBot" ,
"created_at" : "2022-12-12T03:40:22Z" ,
"description" : "一个基于✨HOOK机制的微信机器人, 支持🌱安全新闻定时推送【FreeBuf, 先知, 安全客, 奇安信攻防社区】, 👯Kfc文案, ⚡漏洞查询, ⚡手机号归属地查询, ⚡知识库查询, 🎉星座查询, ⚡天气查询, 🌱摸鱼日历, ⚡微步威胁..." ,
"author" : "ngc660sec" ,
2025-01-06 14:26:37 +08:00
"language" : "Python" ,
"keyword" : "攻防"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/CJ-Labs/zk-red-packet" ,
"name" : "zk-red-packet" ,
"created_at" : "2025-01-09T02:24:43Z" ,
"description" : "使用 Poseidon 哈希和零知识证明来实现安全的红包领取机制,防止重入攻击和保护用户隐私" ,
"author" : "CJ-Labs" ,
"language" : "Solidity" ,
2025-01-10 10:02:43 +08:00
"keyword" : "攻防"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/Jackyy330/CDN-" ,
"name" : "CDN-" ,
"created_at" : "2025-01-09T06:41:51Z" ,
"description" : "高防CDN过国内移动屏蔽、地区屏蔽、无限抗T级DDOS以及CC攻击、证书SSL在内免费申请、可添加地区白名单。自主独立后台, 可设置WAF以及异常地区IP访问等等" ,
"author" : "Jackyy330" ,
2025-01-10 10:02:43 +08:00
"language" : null ,
"keyword" : "攻防"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/coronatusvi/VoiceAntiSpoofingAI" ,
"name" : "VoiceAntiSpoofingAI" ,
"created_at" : "2024-12-31T10:28:20Z" ,
"description" : "VoiceAntiSpoofingAI A cutting-edge AI-based system for detecting and preventing voice spoofing attacks. Enhance the security of voice authentication systems with advanced anti-spoofing technology. VoiceAntiSpoofingAI 一个基于人工智能的尖端系统,用于检测和防止语音欺骗攻击..." ,
"author" : "coronatusvi" ,
"language" : "Jupyter Notebook" ,
2025-01-06 14:26:37 +08:00
"keyword" : "攻防"
} ,
{
"link" : "https://github.com/official-free12/an_gY" ,
"name" : "an_gY" ,
"created_at" : "2024-12-31T06:45:43Z" ,
"description" : "( 安全稳定版) 8月份新版理财投资金融P2P分红经营版/投资理财/防黑防攻击" ,
"author" : "official-free12" ,
"language" : null ,
"keyword" : "攻防"
} ,
{
"link" : "https://github.com/hhuayuan/spiderbuf" ,
"name" : "spiderbuf" ,
"created_at" : "2023-07-24T17:53:41Z" ,
"description" : "Spiderbuf 是一个python爬虫学习及练习网站: 保姆式引导关卡 + 免费在线视频教程, 从Python环境的搭建到最简单的网页爬取, 让零基础的小白也能获得成就感。 在已经入门的基础上强化练习,在矛与盾的攻防中不断提高技术水平..." ,
"author" : "hhuayuan" ,
"language" : "Python" ,
"keyword" : "攻防"
} ,
{
"link" : "https://github.com/AJCDN003/jubilant-tribble" ,
"name" : "jubilant-tribble" ,
"created_at" : "2024-12-26T08:30:11Z" ,
"description" : "AJCDN服务: 支持无限抗攻击🛡🛡、非绕美🇺🇸、本地抗和国内加速, 免实名可测试✅, 享受极速网络和强大防御。🎆🎆🥰🥰 🟢 TG: ajcdn003" ,
"author" : "AJCDN003" ,
"language" : null ,
"keyword" : "攻防"
} ,
{
"link" : "https://github.com/just0rg/Security-Interview" ,
"name" : "Security-Interview" ,
"created_at" : "2023-10-30T07:03:32Z" ,
"description" : "安全方向知识点(包含web攻防、java攻防、企业安全、内网/域、提权、免杀)" ,
"author" : "just0rg" ,
"language" : null ,
"keyword" : "攻防"
} ,
{
"link" : "https://github.com/nu0l/Send_Email" ,
"name" : "Send_Email" ,
"created_at" : "2024-12-12T13:54:08Z" ,
"description" : "一款轻量化可定制模板的邮件批量发送工具 | 可用于攻防钓鱼或其他邮件个性化的场景 | 可启动JavaFX或SpringWeb环境" ,
"author" : "nu0l" ,
"language" : "Java" ,
"keyword" : "攻防"
} ,
{
"link" : "https://github.com/Zpyzpyy/-" ,
"name" : "-" ,
"created_at" : "2024-12-21T07:17:58Z" ,
"description" : "大华DSS数字监控系统 attachment_downloadAtt.action 任意文件读取漏洞 漏洞描述: 大华城市安防监控系统平台 attachment_downloadByUrlAtt.action接口存在任意文件下载漏洞, 未经身份验证的攻击者 可以获取系统内部敏感文件信息,使系统处..." ,
"author" : "Zpyzpyy" ,
"language" : "Python" ,
"keyword" : "攻防"
} ,
{
"link" : "https://github.com/ViporMiner/RMS" ,
"name" : "RMS" ,
"created_at" : "2023-08-30T08:52:48Z" ,
"description" : "本地隧道、数据压缩、加密、公网连接数压缩的强大本地客户端,极限降低延迟,防止中间人攻击, 最大限度提升安全性及矿场利润。 Powerful local client for local tunnel, data compression, encryption, and public network connection number compression can..." ,
"author" : "ViporMiner" ,
"language" : "Shell" ,
"keyword" : "攻防"
} ,
{
"link" : "https://github.com/AJCDN003/supreme-lamp" ,
"name" : "supreme-lamp" ,
"created_at" : "2024-12-18T04:25:10Z" ,
"description" : "AJCDNCDN服务: 支持无限抗攻击🛡🛡、非绕美🇺🇸、本地抗和国内加速, 免实名可测试✅, 享受极速网络和强大防御。🎆🎆🥰🥰 🟢 TG: @ajcdn003" ,
"author" : "AJCDN003" ,
"language" : null ,
"keyword" : "攻防"
} ,
{
"link" : "https://github.com/CakeSystem/RMS" ,
"name" : "RMS" ,
"created_at" : "2023-08-15T18:52:23Z" ,
"description" : "CakeSystem-RMS本地隧道、数据压缩、加密、公网连接数压缩的强大本地客户端, 极限降低延迟, 防止中间人攻击, 最大限度提升安全性及矿场利润。 Powerful local client for local tunnel, data compression, encryption, and public network connection number c..." ,
"author" : "CakeSystem" ,
"language" : "Shell" ,
"keyword" : "攻防"
} ,
{
"link" : "https://github.com/Xnuvers007/webshells" ,
"name" : "webshells" ,
"created_at" : "2023-08-03T01:18:25Z" ,
"description" : null ,
"author" : "Xnuvers007" ,
"language" : "Python" ,
"keyword" : "webshell"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/macOnGit/sam-webshell" ,
"name" : "sam-webshell" ,
"created_at" : "2024-11-01T16:50:20Z" ,
"description" : "app for generating shells" ,
"author" : "macOnGit" ,
"language" : "Python" ,
"keyword" : "webshell"
} ,
{
"link" : "https://github.com/1llsion/shell" ,
"name" : "shell" ,
"created_at" : "2024-01-25T16:39:04Z" ,
"description" : "just webshell" ,
"author" : "1llsion" ,
2025-01-10 10:02:43 +08:00
"language" : "PHP" ,
2025-01-06 14:26:37 +08:00
"keyword" : "webshell"
} ,
{
"link" : "https://github.com/exploit-haxor/webshell" ,
"name" : "webshell" ,
"created_at" : "2024-12-13T23:46:35Z" ,
"description" : "webshell" ,
"author" : "exploit-haxor" ,
"language" : "PHP" ,
"keyword" : "webshell"
} ,
2025-01-10 10:02:43 +08:00
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/zhaojh329/rttys" ,
"name" : "rttys" ,
"created_at" : "2018-01-17T13:31:34Z" ,
"description" : "Access your device's terminal from anywhere via the web." ,
"author" : "zhaojh329" ,
"language" : "Go" ,
2025-01-10 10:02:43 +08:00
"keyword" : "webshell"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/Cvar1984/sussyfinder" ,
"name" : "sussyfinder" ,
"created_at" : "2023-06-02T10:23:44Z" ,
"description" : "Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integration. Subscribe to get API Key" ,
"author" : "Cvar1984" ,
2025-01-10 10:02:43 +08:00
"language" : "PHP" ,
"keyword" : "webshell"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/0xWhoami35/Webshell" ,
"name" : "Webshell" ,
"created_at" : "2022-12-28T03:27:23Z" ,
"description" : null ,
"author" : "0xWhoami35" ,
"language" : "PHP" ,
2025-01-10 10:02:43 +08:00
"keyword" : "webshell"
} ,
{
"link" : "https://github.com/dromara/orion-visor" ,
"name" : "orion-visor" ,
"created_at" : "2023-06-20T08:01:55Z" ,
"description" : "一款高颜值、现代化的自动化运维及轻量堡垒机, 提供服务器智能运维解决方案。支持资产管理分组、SSH SFTP 终端、文件上传下载、文件在线编辑、命令批量执行、多主机文件分发、cron 表达式配置计划任务,安全保障等。该项..." ,
"author" : "dromara" ,
"language" : "Java" ,
"keyword" : "webshell"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/PranavArya37/webshell" ,
"name" : "webshell" ,
"created_at" : "2025-01-08T08:27:16Z" ,
2025-01-10 10:02:43 +08:00
"description" : null ,
2025-01-15 11:02:39 +08:00
"author" : "PranavArya37" ,
2025-01-10 10:02:43 +08:00
"language" : "TypeScript" ,
"keyword" : "webshell"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/LT-lanthau/Webshell" ,
"name" : "Webshell" ,
"created_at" : "2024-10-04T06:34:18Z" ,
"description" : "A collection of webshells for learning only. All forms of misuse and violations are not our responsibility." ,
"author" : "LT-lanthau" ,
2025-01-10 10:02:43 +08:00
"language" : "PHP" ,
"keyword" : "webshell"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/MCSManager/MCSManager" ,
"name" : "MCSManager" ,
"created_at" : "2017-11-12T01:41:58Z" ,
"description" : "Free, Secure, Distributed, Modern Control Panel for Minecraft and most Steam Game Servers." ,
"author" : "MCSManager" ,
"language" : "TypeScript" ,
2025-01-10 10:02:43 +08:00
"keyword" : "webshell"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/pen4uin/java-memshell-generator" ,
"name" : "java-memshell-generator" ,
"created_at" : "2023-06-03T19:49:29Z" ,
"description" : "一款支持自定义的 Java 内存马生成工具| A customizable Java in-memory webshell generation tool." ,
"author" : "pen4uin" ,
"language" : "Java" ,
"keyword" : "webshell"
} ,
{
"link" : "https://github.com/Yavuzlar/Yavuzlar-WebShell" ,
"name" : "Yavuzlar-WebShell" ,
"created_at" : "2024-12-31T00:19:55Z" ,
"description" : "Yavuzlar WebShell: Web tabanlı bir shell uygulaması . Kullanı cı lar, web üzerinden dosya yöneticisi, terminal ve reverse shell gibi güvenlik araçları na erişebilir. PHP ve CSS kullanarak minimalist bir tasarı mda, yönetimsel işlemler ve siber güvenlik simülasyonları için geliştirilmi..." ,
"author" : "Yavuzlar" ,
2025-01-10 10:02:43 +08:00
"language" : "PHP" ,
"keyword" : "webshell"
} ,
2025-01-06 14:26:37 +08:00
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/cr1f/P.A.S.-Fork" ,
"name" : "P.A.S.-Fork" ,
"created_at" : "2020-12-01T18:45:52Z" ,
"description" : "A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting some requests and responses by various WAF/IDS." ,
"author" : "cr1f" ,
"language" : "PHP" ,
2025-01-06 14:26:37 +08:00
"keyword" : "webshell"
} ,
{
"link" : "https://github.com/ReaJason/MemShellParty" ,
"name" : "MemShellParty" ,
"created_at" : "2024-09-01T05:17:19Z" ,
"description" : "JavaWeb 内存马开聚会 🎉" ,
"author" : "ReaJason" ,
"language" : "Java" ,
"keyword" : "webshell"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/AabyssZG/WebShell-Bypass-Guide" ,
"name" : "WebShell-Bypass-Guide" ,
"created_at" : "2023-03-18T02:04:11Z" ,
"description" : "从零学习Webshell免杀手册" ,
"author" : "AabyssZG" ,
"language" : null ,
2025-01-06 14:26:37 +08:00
"keyword" : "webshell"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/sagsooz/Bypass-Webshell" ,
"name" : "Bypass-Webshell" ,
"created_at" : "2023-07-30T21:11:26Z" ,
"description" : "Prvi8 PHP AND ASPX Web Shells ( Bypasser Web Shells ) NEW !" ,
"author" : "sagsooz" ,
2025-01-06 14:26:37 +08:00
"language" : "PHP" ,
"keyword" : "webshell"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/S-Tazar/webshell-collection" ,
"name" : "webshell-collection" ,
"created_at" : "2024-08-01T05:46:10Z" ,
2025-01-06 14:26:37 +08:00
"description" : null ,
2025-01-15 11:02:39 +08:00
"author" : "S-Tazar" ,
2025-01-06 14:26:37 +08:00
"language" : "PHP" ,
"keyword" : "webshell"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/cpkarma/Reborn-PHP-Bypass-Webshell" ,
"name" : "Reborn-PHP-Bypass-Webshell" ,
"created_at" : "2024-12-29T07:26:44Z" ,
"description" : "A php shell which will bypass firewalls." ,
"author" : "cpkarma" ,
"language" : "PHP" ,
2025-01-06 14:26:37 +08:00
"keyword" : "webshell"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/ceren77/Webshell" ,
2025-01-06 14:26:37 +08:00
"name" : "Webshell" ,
2025-01-15 11:02:39 +08:00
"created_at" : "2025-01-07T18:12:46Z" ,
"description" : "HTML, CSS ve PHP dilleri kullanı larak yazı lmı ş bir webshell uygulaması dı r" ,
"author" : "ceren77" ,
2025-01-06 14:26:37 +08:00
"language" : "PHP" ,
"keyword" : "webshell"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/azx1573/frontend-algorithms" ,
"name" : "frontend-algorithms" ,
"created_at" : "2024-11-17T07:23:53Z" ,
"description" : "渐进式收集整理及手动实现前端算法基础知识点包括栈、队列、链表、哈希表、树(二叉树、红黑树等)、图常见的各种基础算法、高阶算法等等。" ,
"author" : "azx1573" ,
"language" : "JavaScript" ,
"keyword" : "红队"
2025-01-06 14:26:37 +08:00
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/chainreactors/gogo" ,
"name" : "gogo" ,
"created_at" : "2022-06-16T07:13:40Z" ,
"description" : "面向红队的, 高度可控可拓展的自动化引擎" ,
"author" : "chainreactors" ,
"language" : "Go" ,
2025-01-10 10:02:43 +08:00
"keyword" : "红队"
2025-01-06 14:26:37 +08:00
} ,
{
"link" : "https://github.com/ChinaRan0/HuntBack" ,
"name" : "HuntBack" ,
"created_at" : "2024-12-22T10:27:31Z" ,
"description" : "针对护网行动中红队溯源工具" ,
"author" : "ChinaRan0" ,
"language" : "Python" ,
"keyword" : "红队"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/ranhn/Goby-Poc" ,
"name" : "Goby-Poc" ,
"created_at" : "2025-01-08T06:20:06Z" ,
"description" : "此次更新共包含1314个自定义gobypoc, 是否含有后门和重复自行判断, 如果无红队版, 可直接poc管理处导入自定义poc即可, 共计1314个。" ,
"author" : "ranhn" ,
"language" : null ,
"keyword" : "红队"
} ,
{
"link" : "https://github.com/b0bac/ApolloScanner" ,
"name" : "ApolloScanner" ,
"created_at" : "2022-03-17T01:34:24Z" ,
"description" : "自动化巡航扫描框架(可用于红队打点评估)" ,
"author" : "b0bac" ,
2025-01-06 14:26:37 +08:00
"language" : "JavaScript" ,
"keyword" : "红队"
} ,
2025-01-15 11:02:39 +08:00
{
"link" : "https://github.com/safe6Sec/command" ,
"name" : "command" ,
"created_at" : "2021-08-22T16:16:09Z" ,
"description" : "红队常用命令速查" ,
"author" : "safe6Sec" ,
"language" : null ,
"keyword" : "红队"
} ,
2025-01-06 14:26:37 +08:00
{
"link" : "https://github.com/KPF888/Starmark" ,
"name" : "Starmark" ,
"created_at" : "2024-08-28T10:20:58Z" ,
"description" : "红队信息收集工具" ,
"author" : "KPF888" ,
"language" : null ,
"keyword" : "红队"
} ,
{
"link" : "https://github.com/official-free12/tai_yg" ,
"name" : "tai_yg" ,
"created_at" : "2024-12-30T17:53:38Z" ,
"description" : "【太阳线】直销分润模式静态分红|动态奖金|分享奖|团队奖|积分模式|报单中心" ,
"author" : "official-free12" ,
"language" : null ,
"keyword" : "红队"
} ,
{
"link" : "https://github.com/official-free12/tui_Sy" ,
"name" : "tui_Sy" ,
"created_at" : "2024-12-30T17:34:23Z" ,
"description" : "推荐奖/三三见点/团队奖/报单奖/购物分红/直销系统/软件/源码" ,
"author" : "official-free12" ,
"language" : null ,
"keyword" : "红队"
} ,
{
"link" : "https://github.com/official-free12/shuang_GO" ,
"name" : "shuang_GO" ,
"created_at" : "2024-12-29T20:59:04Z" ,
"description" : "双轨直销返利分红系统/会员管理系统/购物商城团队级差系统" ,
"author" : "official-free12" ,
"language" : null ,
"keyword" : "红队"
} ,
{
"link" : "https://github.com/P0lar1ght/JVMHeapAnalyzer" ,
"name" : "JVMHeapAnalyzer" ,
"created_at" : "2024-12-26T10:07:13Z" ,
"description" : "JVMHeapAnalyzer是一款自动化的 Java 堆转储分析工具,支持多种操作系统和 Java 版本。旨在通过简单的Shell终端, 自动生成堆转储文件并分析其中的敏感信息, 包括但不限于JDK信息, Env信息, ShiroKey, 存储Cookie, authorization, oss, 数据..." ,
"author" : "P0lar1ght" ,
"language" : null ,
"keyword" : "红队"
} ,
{
"link" : "https://github.com/cvestone/JsExtractor" ,
"name" : "JsExtractor" ,
"created_at" : "2024-12-15T09:59:53Z" ,
"description" : "红队渗透中js文件批量信息提取器, 待优化完善" ,
"author" : "cvestone" ,
"language" : "Python" ,
"keyword" : "红队"
} ,
{
"link" : "https://github.com/crazymartinzhang/RedOpt-AI" ,
"name" : "RedOpt-AI" ,
"created_at" : "2024-12-10T15:05:37Z" ,
"description" : "RedOpt AI 是一个开源的 AI 工具集, 专注于社交媒体内容优化和营销效果提升。通过整合自然语言处理和机器学习技术, 为内容创作者和营销团队提供智能推荐和优化策略, 助力在社交媒体平台( 如小红书、抖音、Instagram) 上实现..." ,
"author" : "crazymartinzhang" ,
"language" : null ,
"keyword" : "红队"
} ,
{
"link" : "https://github.com/FunnyWolf/Viper" ,
"name" : "Viper" ,
"created_at" : "2020-05-29T12:53:42Z" ,
"description" : "Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台" ,
"author" : "FunnyWolf" ,
"language" : null ,
"keyword" : "红队"
} ,
{
"link" : "https://github.com/zidanfanshao/befree" ,
"name" : "befree" ,
"created_at" : "2024-11-27T05:51:54Z" ,
"description" : "一款红队在信息收集时规避IP封禁的傻瓜式一键代理池, 通过大量代理节点轮询的代理池工具" ,
"author" : "zidanfanshao" ,
"language" : "C#" ,
"keyword" : "红队"
} ,
{
"link" : "https://github.com/lsq0713/datacon-RedDragon" ,
"name" : "datacon-RedDragon" ,
"created_at" : "2024-11-11T13:10:25Z" ,
"description" : "2024 datacon 红龙战队 队伍仓库" ,
"author" : "lsq0713" ,
"language" : "Jupyter Notebook" ,
"keyword" : "红队"
} ,
{
"link" : "https://github.com/xzajyjs/ThunderSearch" ,
"name" : "ThunderSearch" ,
"created_at" : "2022-01-14T14:53:32Z" ,
"description" : "macOS上的小而美【Fofa、Shodan、Hunter、Zoomeye、Quake网络空间搜索引擎】闪电搜索器; GUI图形化(Mac/Windows)渗透测试信息搜集工具; 资产搜集引擎; hw红队工具hvv" ,
"author" : "xzajyjs" ,
"language" : "Python" ,
"keyword" : "红队"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/mthcht/awesome-lists" ,
"name" : "awesome-lists" ,
"created_at" : "2022-12-11T10:45:11Z" ,
"description" : "Awesome Security lists for SOC/CERT/CTI" ,
"author" : "mthcht" ,
"language" : "GLSL" ,
"keyword" : "redteam"
} ,
{
"link" : "https://github.com/xophae/moonwalk" ,
"name" : "moonwalk" ,
"created_at" : "2025-01-13T18:07:12Z" ,
"description" : "Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps." ,
"author" : "xophae" ,
2025-01-06 14:26:37 +08:00
"language" : null ,
2025-01-15 11:02:39 +08:00
"keyword" : "redteam"
2025-01-06 14:26:37 +08:00
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/edoardottt/secfiles" ,
"name" : "secfiles" ,
"created_at" : "2022-05-25T15:10:01Z" ,
"description" : "My useful files for penetration tests, security assessments, bug bounty and other security related stuff" ,
"author" : "edoardottt" ,
"language" : "Shell" ,
2025-01-06 14:26:37 +08:00
"keyword" : "redteam"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/BStyls/Simple-RunPE-Process-Hollowing" ,
"name" : "Simple-RunPE-Process-Hollowing" ,
"created_at" : "2025-01-14T15:16:17Z" ,
"description" : "The RunPE program is written in C# to execute a specific executable file within another files memory using the ProcessHollowing technique." ,
"author" : "BStyls" ,
"language" : "C#" ,
2025-01-06 14:26:37 +08:00
"keyword" : "redteam"
} ,
2025-01-10 10:02:43 +08:00
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/jm33-m0/emp3r0r" ,
"name" : "emp3r0r" ,
"created_at" : "2020-01-25T08:55:08Z" ,
"description" : "Linux/Windows post-exploitation framework made by linux user" ,
"author" : "jm33-m0" ,
"language" : "Go" ,
2025-01-10 10:02:43 +08:00
"keyword" : "redteam"
} ,
2025-01-06 14:26:37 +08:00
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/ibnaleem/gosearch" ,
"name" : "gosearch" ,
"created_at" : "2024-11-09T23:47:22Z" ,
"description" : "🔍 OSINT tool for searching people's digital footprint and leaked passwords across various social networks, written in Go." ,
"author" : "ibnaleem" ,
"language" : "Go" ,
2025-01-06 14:26:37 +08:00
"keyword" : "redteam"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/laramies/theHarvester" ,
"name" : "theHarvester" ,
"created_at" : "2011-01-01T20:40:15Z" ,
"description" : "E-mails, subdomains and names Harvester - OSINT " ,
"author" : "laramies" ,
2025-01-10 10:02:43 +08:00
"language" : "Python" ,
2025-01-06 14:26:37 +08:00
"keyword" : "redteam"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/CedarvilleCyber/RedTeamVault" ,
"name" : "RedTeamVault" ,
"created_at" : "2024-06-17T00:18:17Z" ,
"description" : "Red Team TTP Obsidian Vault" ,
"author" : "CedarvilleCyber" ,
"language" : null ,
2025-01-06 14:26:37 +08:00
"keyword" : "redteam"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/swisskyrepo/PayloadsAllTheThings" ,
"name" : "PayloadsAllTheThings" ,
"created_at" : "2016-10-18T07:29:07Z" ,
"description" : "A list of useful payloads and bypass for Web Application Security and Pentest/CTF" ,
"author" : "swisskyrepo" ,
2025-01-10 10:02:43 +08:00
"language" : "Python" ,
2025-01-06 14:26:37 +08:00
"keyword" : "redteam"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/maxDcb/C2Implant" ,
"name" : "C2Implant" ,
"created_at" : "2023-04-26T12:17:42Z" ,
"description" : "Windows C++ Implant for Exploration C2" ,
"author" : "maxDcb" ,
"language" : "C++" ,
2025-01-06 14:26:37 +08:00
"keyword" : "redteam"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/maxDcb/C2Core" ,
"name" : "C2Core" ,
"created_at" : "2023-04-26T06:32:18Z" ,
"description" : "Core Submodule of Exploration C2 " ,
"author" : "maxDcb" ,
"language" : "C++" ,
2025-01-06 14:26:37 +08:00
"keyword" : "redteam"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/D1se0/h4cker_b00k" ,
"name" : "h4cker_b00k" ,
"created_at" : "2024-06-28T16:29:43Z" ,
"description" : "Welcome to h4cker_b00k, a sheet where the write up's of different CTF's are to learn ethical hacking..." ,
"author" : "D1se0" ,
"language" : null ,
2025-01-06 14:26:37 +08:00
"keyword" : "redteam"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/CyberSecurityUP/Offensive-Windows-Drivers-Development" ,
"name" : "Offensive-Windows-Drivers-Development" ,
"created_at" : "2025-01-14T15:52:35Z" ,
"description" : null ,
"author" : "CyberSecurityUP" ,
"language" : "C" ,
2025-01-06 14:26:37 +08:00
"keyword" : "redteam"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/tkmru/awesome-edr-bypass" ,
"name" : "awesome-edr-bypass" ,
"created_at" : "2023-04-19T18:01:21Z" ,
"description" : "Awesome EDR Bypass Resources For Ethical Hacking" ,
"author" : "tkmru" ,
"language" : null ,
2025-01-06 14:26:37 +08:00
"keyword" : "redteam"
} ,
{
2025-01-10 10:02:43 +08:00
"link" : "https://github.com/h4m5t/VulnAlert" ,
"name" : "VulnAlert" ,
"created_at" : "2025-01-04T14:19:48Z" ,
"description" : "基于Django 的漏洞管理预警系统" ,
"author" : "h4m5t" ,
"language" : "CSS" ,
2025-01-06 14:26:37 +08:00
"keyword" : "redteam"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/Oni-kuki/RedTeam-Operator_Workstation" ,
"name" : "RedTeam-Operator_Workstation" ,
"created_at" : "2024-12-24T00:46:41Z" ,
"description" : "This project automates the setup of work environments for Red Team operators, enabling faster deployment and operational readiness." ,
"author" : "Oni-kuki" ,
"language" : "PowerShell" ,
2025-01-06 14:26:37 +08:00
"keyword" : "redteam"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/ait-testbed/attackmate" ,
"name" : "attackmate" ,
"created_at" : "2023-04-28T11:00:16Z" ,
"description" : "AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks." ,
"author" : "ait-testbed" ,
"language" : "Python" ,
2025-01-06 14:26:37 +08:00
"keyword" : "redteam"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/LOLBAS-Project/LOLBAS" ,
"name" : "LOLBAS" ,
"created_at" : "2018-06-08T22:11:05Z" ,
"description" : "Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)" ,
"author" : "LOLBAS-Project" ,
"language" : "XSLT" ,
2025-01-10 10:02:43 +08:00
"keyword" : "redteam"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/t3l3machus/ACEshark" ,
"name" : "ACEshark" ,
"created_at" : "2024-12-28T10:42:29Z" ,
"description" : "ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminating the need for tools like accesschk.exe or other non-native binaries." ,
"author" : "t3l3machus" ,
"language" : "Python" ,
2025-01-10 10:02:43 +08:00
"keyword" : "redteam"
} ,
{
"link" : "https://github.com/yaklang/yakit" ,
"name" : "yakit" ,
"created_at" : "2021-10-12T02:15:42Z" ,
"description" : "Cyber Security ALL-IN-ONE Platform" ,
"author" : "yaklang" ,
"language" : "TypeScript" ,
"keyword" : "redteam"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/huqiang252/InformationGathering" ,
"name" : "InformationGathering" ,
"created_at" : "2024-06-20T08:25:28Z" ,
"description" : "信息收集" ,
"author" : "huqiang252" ,
"language" : "Python" ,
"keyword" : "信息收集"
2025-01-06 14:26:37 +08:00
} ,
2025-01-10 10:02:43 +08:00
{
"link" : "https://github.com/huan-cdm/info_scan" ,
"name" : "info_scan" ,
"created_at" : "2023-11-11T13:56:19Z" ,
"description" : "自动化漏洞扫描系统, 一键完成相关漏洞扫描和信息收集、资产处理、IP基础信息探测, 系统采用B/S架构, 系统分为源码安装和配置好环境的虚拟机, 项目会持续更新, 欢迎在Issues中提交需求, 如果对您有所帮助, 欢迎留下宝贵..." ,
"author" : "huan-cdm" ,
"language" : "Python" ,
"keyword" : "信息收集"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/GrassWorkshop/wxapkg_infosearch" ,
"name" : "wxapkg_infosearch" ,
"created_at" : "2025-01-15T01:05:22Z" ,
"description" : "一款微信小程序源码包信息收集工具,根据已有项目改编" ,
"author" : "GrassWorkshop" ,
"language" : "Python" ,
2025-01-10 10:02:43 +08:00
"keyword" : "信息收集"
} ,
2025-01-06 14:26:37 +08:00
{
"link" : "https://github.com/709343767/phoenix" ,
"name" : "phoenix" ,
"created_at" : "2022-03-19T12:50:26Z" ,
"description" : "“phoenix” 是一个灵活可配置的开源监控平台, 主要用于监控应用程序、服务器、数据库、网络、tcp端口和http接口, 通过实时收集、汇聚和分析监控信息, 实现在发现异常时立刻推送告警信息, 并且提供了可视化系统进行配置..." ,
"author" : "709343767" ,
"language" : "Java" ,
"keyword" : "信息收集"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/lxl66566/my-college-files" ,
"name" : "my-college-files" ,
"created_at" : "2022-09-14T14:58:14Z" ,
"description" : "ECUST 华东理工大学 信息工程专业 资料全收集" ,
"author" : "lxl66566" ,
"language" : "Typst" ,
2025-01-10 10:02:43 +08:00
"keyword" : "信息收集"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/guchangan1/All-Defense-Tool" ,
"name" : "All-Defense-Tool" ,
"created_at" : "2022-04-25T11:45:06Z" ,
"description" : "本项目集成了全网优秀的攻防武器工具项目, 包含自动化利用, 子域名、目录扫描、端口扫描等信息收集工具, 各大中间件、cms、OA漏洞利用工具, 爆破工具、内网横向、免杀、社工钓鱼以及应急响应、甲方安全资料等其他安全..." ,
"author" : "guchangan1" ,
"language" : null ,
2025-01-10 10:02:43 +08:00
"keyword" : "信息收集"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/xunmaw001/Restaurant-ordering-system" ,
"name" : "Restaurant-ordering-system" ,
"created_at" : "2025-01-13T13:01:45Z" ,
"description" : "基于 Spring Boot 和 Vue 的餐厅点餐系统是一款便捷的餐饮管理工具。系统集成了菜单管理,可随时更新菜品信息;餐桌管理,便于安排顾客就餐;点餐功能,支持顾客自助点餐;订单处理,能高效处理订单并进行收银操作;还包..." ,
"author" : "xunmaw001" ,
"language" : "JavaScript" ,
2025-01-06 14:26:37 +08:00
"keyword" : "信息收集"
} ,
{
"link" : "https://github.com/JoeanAmier/XHS-Downloader" ,
"name" : "XHS-Downloader" ,
"created_at" : "2023-08-16T11:03:36Z" ,
"description" : "小红书链接提取/作品采集工具:提取账号发布、收藏、点赞、专辑作品链接;提取搜索结果作品、用户链接;采集小红书作品信息;提取小红书作品下载地址;下载小红书无水印作品文件" ,
"author" : "JoeanAmier" ,
"language" : "Python" ,
"keyword" : "信息收集"
} ,
{
"link" : "https://github.com/kkbo8005/mitan" ,
"name" : "mitan" ,
"created_at" : "2024-04-03T09:59:12Z" ,
"description" : "密探渗透测试工具包含资产信息收集, 子域名爆破, 搜索语法, 资产测绘( FOFA, Hunter, quake, ZoomEye) , 指纹识别, 敏感信息采集, 文件扫描、端口扫描、批量信息权重查询、密码字典等功能" ,
"author" : "kkbo8005" ,
"language" : null ,
"keyword" : "信息收集"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/h1thub/SecureJS" ,
"name" : "SecureJS" ,
"created_at" : "2025-01-13T06:35:00Z" ,
"description" : "SecureJS 是一款功能强大的工具,旨在通过模拟浏览器行为从目标网站收集所有相关链接(包括加载的所有资源链接和页面中存在的所有链接),访问这些链接(主要是 JavaScript 文件),并扫描其中的敏感信息,如令牌、密钥、..." ,
"author" : "h1thub" ,
"language" : "Go" ,
"keyword" : "信息收集"
} ,
{
"link" : "https://github.com/CyrilSLi/12306-wechat-apis" ,
"name" : "12306-wechat-apis" ,
"created_at" : "2025-01-10T05:54:22Z" ,
"description" : "12306 微信小程序信息类 API 收集" ,
"author" : "CyrilSLi" ,
2025-01-06 14:26:37 +08:00
"language" : null ,
"keyword" : "信息收集"
} ,
{
"link" : "https://github.com/dromara/dax-pay" ,
"name" : "dax-pay" ,
"created_at" : "2024-02-16T13:08:06Z" ,
"description" : "免费开源的支付网关, 支持支付宝、微信、云闪付等通道, 提供收单、退款、对账、分账等功能, 通过HTTP方式进行调用, 不与其他系统产生耦合关联, 可以快速集成到各种系统中, 提供可视化界面进行管理, 便于实现统一的支..." ,
"author" : "dromara" ,
"language" : "Java" ,
"keyword" : "信息收集"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/xunmaw001/Comic-website" ,
"name" : "Comic-website" ,
"created_at" : "2025-01-10T14:27:18Z" ,
"description" : "基于 Spring Boot + Vue 的漫画网站,是一个漫画爱好者的聚集地。该系统提供丰富的漫画资源,支持漫画分类、搜索、在线阅读、收藏等功能。前端 Vue 为用户带来舒适的阅读界面和流畅操作体验;后端 Spring Boot 保证系统稳定,实..." ,
"author" : "xunmaw001" ,
"language" : "JavaScript" ,
"keyword" : "信息收集"
} ,
{
"link" : "https://github.com/xxm1995/dax-pay-h5" ,
"name" : "dax-pay-h5" ,
"created_at" : "2024-02-16T13:12:56Z" ,
"description" : "免费开源的支付网关, 支持支付宝、微信、云闪付等通道, 提供收单、退款、聚合支付、组合支付、对账、分账等功能, 同时扩展了更多支付方式, 如储值卡、现金卡等, 通过HTTP方式进行调用, 不与其他系统产生耦合关联, 可..." ,
2025-01-06 14:26:37 +08:00
"author" : "xxm1995" ,
2025-01-15 11:02:39 +08:00
"language" : "TypeScript" ,
2025-01-06 14:26:37 +08:00
"keyword" : "信息收集"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/peng456/rabbitmq_note" ,
"name" : "rabbitmq_note" ,
"created_at" : "2019-03-07T08:16:45Z" ,
"description" : "rabbitmq 的总结blog.信息收集。面试的时候,这些都需要。知识需要输出,沉淀,才会进入的大脑。记住看过一遍的事,大脑是会遗忘的。" ,
"author" : "peng456" ,
"language" : null ,
2025-01-06 14:26:37 +08:00
"keyword" : "信息收集"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/s7safe/masnmapscan-GO" ,
"name" : "masnmapscan-GO" ,
"created_at" : "2025-01-09T05:41:18Z" ,
"description" : "masnmapscan的Golang版本, 接入自动化流程体系中, 对收集到的子域名进行端口扫描, 并进入下一个流程, 适用于自动化渗透、自动化信息收集、自动化资产测绘、Bug Bounty" ,
"author" : "s7safe" ,
"language" : "Go" ,
2025-01-06 14:26:37 +08:00
"keyword" : "信息收集"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/testnet0/testnet" ,
"name" : "testnet" ,
"created_at" : "2024-06-14T11:29:17Z" ,
"description" : "TestNet资产管理系统( 资产管理|信息收集|暴露面管理|子域名扫描|C段扫描|端口扫描|漏洞扫描|Hunter|Fofa) " ,
"author" : "testnet0" ,
"language" : "Shell" ,
2025-01-06 14:26:37 +08:00
"keyword" : "信息收集"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/haishikeji/QHY-QJL-XCX" ,
"name" : "QHY-QJL-XCX" ,
"created_at" : "2025-01-07T08:17:21Z" ,
"description" : "群接龙主要用于微信好友和微信群之间各种接龙场景, 如: 活动报名、团购、收集信息、活动互动的、社群通知等。支持模板市场、AI生成模板、数据管理、数据导出功能。" ,
"author" : "haishikeji" ,
"language" : "Java" ,
2025-01-06 14:26:37 +08:00
"keyword" : "信息收集"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/haishikeji/QT-JYZ-YY" ,
"name" : "QT-JYZ-YY" ,
"created_at" : "2025-01-07T08:02:03Z" ,
"description" : "加油站运营系统是一个集成了多种功能的综合管理平台, 系统提供H5、小程序, 支持微信支付、支付宝支付、拉卡拉支付。帮助加油站实现高效、精准的运营管理。该系统涵盖了从员工管理、广告投放( 如轮播图广告、优惠活动..." ,
"author" : "haishikeji" ,
"language" : "Java" ,
2025-01-06 14:26:37 +08:00
"keyword" : "信息收集"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/haishikeji/ZF-ZHZX-QS" ,
"name" : "ZF-ZHZX-QS" ,
"created_at" : "2025-01-07T07:32:41Z" ,
"description" : "智慧政协系统是一款集成了提案管理、履职跟踪、社情民意收集、会议活动安排、委员信息管理等多功能的政协工作平台, 包含APP和WEB两端。该系统通过WEB端为政协工作人员提供全面的政协事务管理功能, 包括公告发布、提案..." ,
"author" : "haishikeji" ,
"language" : "Vue" ,
"keyword" : "信息收集"
} ,
{
"link" : "https://github.com/ItzNotJorz/cursor-free-vip" ,
"name" : "cursor-free-vip" ,
"created_at" : "2025-01-11T22:09:51Z" ,
"description" : "自动绕过 Cursor Ai 机制, 免费升级使用Pro 功能: You've reached your trial request limit. / Too many free trial accounts used on this machine. Please upgrade to pro. We have this limit in place to prevent abuse. Please let us know if you believe this is a mistake." ,
"author" : "ItzNotJorz" ,
2025-01-06 14:26:37 +08:00
"language" : null ,
2025-01-10 10:02:43 +08:00
"keyword" : "绕过"
2025-01-06 14:26:37 +08:00
} ,
{
2025-01-10 10:02:43 +08:00
"link" : "https://github.com/NgxuAnGMH/github-DNS" ,
"name" : "github-DNS" ,
"created_at" : "2023-06-06T17:04:37Z" ,
"description" : "自动更新获取常用域名服务的即时IP, 可以配合SwitchHosts进行一键修改。这样可以绕过相关限制, 以及省去DNS查询解析。" ,
"author" : "NgxuAnGMH" ,
2025-01-06 14:26:37 +08:00
"language" : "Java" ,
2025-01-10 10:02:43 +08:00
"keyword" : "绕过"
2025-01-06 14:26:37 +08:00
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/byname66/SerializeJava" ,
"name" : "SerializeJava" ,
"created_at" : "2024-12-29T15:11:19Z" ,
"description" : "SerializeJava是用Go语言+GUI库Fyne开发的, 展示JAVA序列化流以及集成一键插入脏数据,UTF过长编码绕WAF(Utf OverLoad Encoding),修改类SerializeVersionUID功能的图形化工具。" ,
"author" : "byname66" ,
"language" : "Go" ,
2025-01-10 10:02:43 +08:00
"keyword" : "绕过"
2025-01-06 14:26:37 +08:00
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/topvpntool/gfw" ,
"name" : "gfw" ,
"created_at" : "2025-01-13T01:18:10Z" ,
"description" : "科学上网, 指的是使用特定的软件或工具, 以绕过防火长城的方式, 从而可以访问被屏蔽的海外网站和资源。在中国, 这种方式也被称为“翻墙”, 是为了将本地IP地址伪装成外国IP地址, 以便访问被屏蔽的资源。" ,
"author" : "topvpntool" ,
"language" : null ,
2025-01-06 14:26:37 +08:00
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/pxx917144686/Stay_pxx" ,
"name" : "Stay_pxx" ,
"created_at" : "2025-01-07T15:07:20Z" ,
"description" : "( hook) 绕过 Stay 安全机制!许可证检查和其他授权功能,激活。" ,
2025-01-06 14:26:37 +08:00
"author" : "pxx917144686" ,
2025-01-15 11:02:39 +08:00
"language" : "Makefile" ,
2025-01-06 14:26:37 +08:00
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/passeway/Snell" ,
"name" : "Snell" ,
"created_at" : "2024-04-07T06:01:04Z" ,
"description" : "Snell 协议是一种用于网络代理的加密协议,主要应用于科学上网和数据传输,专门为绕过防火墙和网络审查设计。" ,
"author" : "passeway" ,
"language" : "Shell" ,
2025-01-06 14:26:37 +08:00
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/racpast/SNIBypassGUI" ,
"name" : "SNIBypassGUI" ,
"created_at" : "2024-12-15T09:11:13Z" ,
"description" : "一个通过 Nginx 反向代理实现绕过 SNI 阻断的工具。" ,
"author" : "racpast" ,
"language" : "C#" ,
2025-01-06 14:26:37 +08:00
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/OnlineMo/Renew_X_Auto_Pardon" ,
"name" : "Renew_X_Auto_Pardon" ,
"created_at" : "2025-01-11T10:19:20Z" ,
"description" : "利用python实现 Microsoft365 E5 Renew X 自动特赦, 可绕过自动特赦时间要大于30的限制" ,
"author" : "OnlineMo" ,
"language" : "Python" ,
2025-01-06 14:26:37 +08:00
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/TXZcombo/-" ,
"name" : "-" ,
"created_at" : "2025-01-11T12:01:52Z" ,
"description" : "虚拟机检测及绕过反检测源代码-Python3" ,
"author" : "TXZcombo" ,
2025-01-06 14:26:37 +08:00
"language" : null ,
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/leveryd/x-waf" ,
"name" : "x-waf" ,
"created_at" : "2024-12-04T09:37:29Z" ,
"description" : "让\"WAF绕过\"变得简单" ,
"author" : "leveryd" ,
2025-01-06 14:26:37 +08:00
"language" : null ,
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/daijunhaoMinecraft/WPFLauncher_Hook" ,
"name" : "WPFLauncher_Hook" ,
"created_at" : "2024-09-21T03:05:02Z" ,
"description" : "网易我的世界发烧平台绕过,但是Hook盒子方法" ,
"author" : "daijunhaoMinecraft" ,
"language" : "C#" ,
2025-01-06 14:26:37 +08:00
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/bzym2/MidiPull" ,
"name" : "MidiPull" ,
"created_at" : "2025-01-08T12:22:09Z" ,
"description" : "另类思路绕过MIDISHOW" ,
"author" : "bzym2" ,
2025-01-06 14:26:37 +08:00
"language" : "Python" ,
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/Qin3Yu/PasteAssistant_v.2.0" ,
"name" : "PasteAssistant_v.2.0" ,
"created_at" : "2024-06-27T16:06:53Z" ,
"description" : "模拟键盘输入的文本粘贴,绕过学习通等网站的禁用复制粘贴检测,支持中英双语粘贴。" ,
"author" : "Qin3Yu" ,
2025-01-06 14:26:37 +08:00
"language" : "Python" ,
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/pojz/zentao-getshell" ,
"name" : "zentao-getshell" ,
"created_at" : "2025-01-08T09:07:23Z" ,
"description" : "禅道认证绕过后台命令执行Getshell" ,
"author" : "pojz" ,
"language" : "Go" ,
2025-01-06 14:26:37 +08:00
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/K-R-DRUVA/Cursor-help" ,
"name" : "Cursor-help" ,
"created_at" : "2025-01-03T08:38:56Z" ,
"description" : "绕过免费路径的演练" ,
"author" : "K-R-DRUVA" ,
"language" : "Python" ,
2025-01-06 14:26:37 +08:00
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/durunsong/kilyicms" ,
"name" : "kilyicms" ,
"created_at" : "2024-07-09T12:57:10Z" ,
"description" : "这是一个国际化全栈中后台解决方案, 支持16种语言切换, 前端: vue3, typescript, vite5, pinia, element-plus, unocss, sass, 后端Nodejs, express, MySQL/PostgreSQL, Redis的管理后台项目, ⬇预览: 网络需要绕过大陆⬇" ,
"author" : "durunsong" ,
"language" : "TypeScript" ,
2025-01-06 14:26:37 +08:00
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/pxx917144686/Surge_pxx" ,
"name" : "Surge_pxx" ,
"created_at" : "2025-01-04T00:06:03Z" ,
"description" : "( hook) 绕过 Surge 安全机制!模拟许可证检查和其他授权功能,激活。" ,
"author" : "pxx917144686" ,
"language" : "Logos" ,
2025-01-06 14:26:37 +08:00
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/0xCaner/DoH-ECH-Demo" ,
"name" : "DoH-ECH-Demo" ,
"created_at" : "2024-12-18T02:16:08Z" ,
"description" : "使用DoH + ECH实现的简单的Https和Websocket请求demo, 可绕过GFW, 用于研究流量隐藏技术" ,
"author" : "0xCaner" ,
"language" : "Go" ,
2025-01-06 14:26:37 +08:00
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/qyzhaojinxi/bypass_pairipcore" ,
"name" : "bypass_pairipcore" ,
"created_at" : "2024-06-27T05:44:20Z" ,
"description" : "bypass pairip, bypass google play protect with pairipcore, 绕过play保护, 修复apk, 防止闪退。xapk merge to apk;apks to apk;remove sign check, unlimited money for unity game" ,
"author" : "qyzhaojinxi" ,
"language" : "JavaScript" ,
2025-01-06 14:26:37 +08:00
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/kingru005511/360tianyu-slider-bypass" ,
"name" : "360tianyu-slider-bypass" ,
"created_at" : "2025-01-02T10:15:43Z" ,
"description" : "360天御滑块验证绕过 http://use.my-api.ip-ddns.com 登录360对应网站登录校验 三六零天御滑块验证Bypass 360天御验证码 三六零天御滑块验证码" ,
"author" : "kingru005511" ,
"language" : null ,
2025-01-06 14:26:37 +08:00
"keyword" : "绕过"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/Ripo-s/Bitrat-Hvnc-Rat-Remote-Control-Av-Bypass" ,
2025-01-06 14:26:37 +08:00
"name" : "Bitrat-Hvnc-Rat-Remote-Control-Av-Bypass" ,
2025-01-15 11:02:39 +08:00
"created_at" : "2025-01-14T13:20:33Z" ,
2025-01-06 14:26:37 +08:00
"description" : "BitRAT CrackedIt is meticulously constructed utilizing the C++ programming language. It stands as the most recent iteration of the premier PC RAT for the year 2023. Regarded as a prized tool" ,
2025-01-15 11:02:39 +08:00
"author" : "Ripo-s" ,
2025-01-06 14:26:37 +08:00
"language" : "C++" ,
"keyword" : "bypass av"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/webRemi/ghostAccess" ,
"name" : "ghostAccess" ,
"created_at" : "2025-01-14T19:06:58Z" ,
"description" : "Bypassing AV is the goal of the tool actually in build" ,
"author" : "webRemi" ,
"language" : "C" ,
2025-01-06 14:26:37 +08:00
"keyword" : "bypass av"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/Easysploit/easysploit-server" ,
"name" : "easysploit-server" ,
"created_at" : "2024-12-13T17:36:14Z" ,
"description" : "Easier to exploit, bypass AV with fileless reverse tcp. (Faster, Easier, More comfortable ever)" ,
"author" : "Easysploit" ,
2025-01-06 14:26:37 +08:00
"language" : "Python" ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/Easysploit/easysploit-client" ,
"name" : "easysploit-client" ,
"created_at" : "2024-12-16T18:46:14Z" ,
"description" : "Easier to exploit, automated code generation, AV bypass, admin privilege escalation. (Faster, Easier, More comfortable ever)" ,
"author" : "Easysploit" ,
"language" : "Python" ,
"keyword" : "bypass av"
} ,
{
2025-01-15 11:02:39 +08:00
"link" : "https://github.com/yinsel/BypassAV" ,
"name" : "BypassAV" ,
"created_at" : "2024-08-03T07:17:36Z" ,
"description" : "一款基于PE Patch技术的后渗透免杀工具, 支持32位和64位" ,
"author" : "yinsel" ,
"language" : "C++" ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/Nathanfnt/Berry-Avenue-RP" ,
"name" : "Berry-Avenue-RP" ,
"created_at" : "2025-01-10T07:49:42Z" ,
"description" : "Berry Avenue RP Script Hack Cheat Pastebin No Key OP GUI Keyless 2024 auto farm Macro scriptblox Github Discord BONK HUB Download Roblox Exploit Executor Lua 100% UNC Undetected Byfron Bypass No ban Free Solara Mobile and PC Speed hub redz hub copy and paste Berry Avenue script – (IceHub)" ,
"author" : "Nathanfnt" ,
"language" : null ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/Os-MoZ/BypassAv" ,
"name" : "BypassAv" ,
"created_at" : "2025-01-03T16:48:58Z" ,
"description" : null ,
"author" : "Os-MoZ" ,
"language" : null ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/ShkudW/Reverser" ,
"name" : "Reverser" ,
"created_at" : "2024-08-16T13:07:23Z" ,
"description" : "Reverse is a Python-based tool designed to create a Revshell payload in a variety of file types: PS1, BAT, VBS and HTA The tool knows how to generate payloads with obfuscation that work with coding to bypass various AV tools." ,
"author" : "ShkudW" ,
2025-01-06 14:26:37 +08:00
"language" : "Python" ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/Speeder-bit/Berry-Avenue-RP" ,
"name" : "Berry-Avenue-RP" ,
"created_at" : "2024-12-22T21:58:45Z" ,
"description" : "Berry Avenue RP Script Hack Cheat Pastebin No Key OP GUI Keyless 2024 auto farm Macro scriptblox Github Discord BONK HUB Download Roblox Exploit Executor Lua 100% UNC Undetected Byfron Bypass No ban Free Solara Mobile and PC Speed hub redz hub copy and paste Berry Avenue script – (IceHub)" ,
"author" : "Speeder-bit" ,
"language" : null ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/libalpm64/Leviware" ,
"name" : "Leviware" ,
"created_at" : "2024-12-04T23:42:57Z" ,
"description" : "A ransomware coded in python, bypasses all AV's and EDRs except Kaspersky. (If PYArmor is used)" ,
"author" : "libalpm64" ,
"language" : "Python" ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/tuangu2609/bypass-AV-techniques-research" ,
"name" : "bypass-AV-techniques-research" ,
"created_at" : "2024-12-19T13:17:59Z" ,
"description" : null ,
"author" : "tuangu2609" ,
"language" : "C++" ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/EvilBytecode/EDR-XDR-AV-Bypass-Shellcode-Loader" ,
"name" : "EDR-XDR-AV-Bypass-Shellcode-Loader" ,
"created_at" : "2024-12-15T18:10:57Z" ,
"description" : "Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more." ,
"author" : "EvilBytecode" ,
"language" : "C" ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/temporaryJustice/run-shellcode-in-memory" ,
"name" : "run-shellcode-in-memory" ,
"created_at" : "2024-11-21T23:25:35Z" ,
"description" : "Can run a payload shellcode in-memory by injecting a process. (does not bypass AV)." ,
"author" : "temporaryJustice" ,
"language" : "C++" ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/scs-labrat/corruptme" ,
"name" : "corruptme" ,
"created_at" : "2024-12-09T00:50:53Z" ,
"description" : "CorruptMe is a research and testing tool designed to manipulate Word documents (`.docx`) and ZIP files by corrupting specific structures. These manipulations are intended for studying file recovery, AV evasion, and malware detection bypass mechanisms" ,
"author" : "scs-labrat" ,
"language" : "Python" ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/brosck/Condor" ,
"name" : "Condor" ,
"created_at" : "2022-09-04T14:29:40Z" ,
"description" : "「🛡️ 」AVs/EDRs Evasion tool" ,
"author" : "brosck" ,
"language" : "Python" ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/Lucasvdcngs/Berry-Avenue-RP" ,
"name" : "Berry-Avenue-RP" ,
"created_at" : "2024-12-06T04:49:16Z" ,
"description" : "Roblox Berry Avenue RP Script Hack Cheat Exploit Executor Injector GUI Lua 100% UNC DECOMPILER Best Keyless No Key Undetected Macros Pastebin Working 2024 (Working PC/Mobile/Android/IOS) Free Download NO BAN Bypassing Byfron Bypass Anti-cheat Solara OP Autofarm Admin Tools Commands Backdoor Access ..." ,
"author" : "Lucasvdcngs" ,
"language" : null ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/Hemanth2332/av_bypass_keylogger" ,
"name" : "av_bypass_keylogger" ,
"created_at" : "2024-12-03T18:35:51Z" ,
"description" : null ,
"author" : "Hemanth2332" ,
"language" : "C#" ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/4lm4n4ch/Robotino_LineFollower_With_ObstacleAvoidance" ,
"name" : "Robotino_LineFollower_With_ObstacleAvoidance" ,
"created_at" : "2024-12-04T13:26:34Z" ,
"description" : "A Robotino project focusing on line following and obstacle avoidance. The robot uses sensors for path tracking, detects obstacles, and adjusts its path to bypass them. Features include collision detection, real-time obstacle handling, and smooth path recovery. Implemented step-by-step for efficient..." ,
"author" : "4lm4n4ch" ,
"language" : null ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/vivashu27/AMSI-Bypass" ,
"name" : "AMSI-Bypass" ,
"created_at" : "2024-03-01T14:26:16Z" ,
"description" : "Contains One-liner to bypass AMSI integrated with various modern AV engines " ,
"author" : "vivashu27" ,
"language" : null ,
"keyword" : "bypass av"
} ,
{
"link" : "https://github.com/Th3l3mic/IP_AV_Bypass" ,
"name" : "IP_AV_Bypass" ,
"created_at" : "2024-12-01T14:36:07Z" ,
"description" : "Shellcode to IPv4 " ,
"author" : "Th3l3mic" ,
"language" : null ,
"keyword" : "bypass av"
}
]