Pinned Repositories
404StarLink2.0-Galaxy
404StarLink Project 2.0 - 推荐真正优质、有意义、有趣、坚持维护的开源项目
afl-rb
FairFuzz: AFL extension targeting rare branches
aflpro
Specification based Stateful Protocol Greybox Fuzzing
aflsmart
Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)
Angora
Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic execution.
appweb
Appweb Enterprise Edition Embedded Web Server
appweb-3
The Appweb Embedded WebServer
appweb-4
Appweb Embeddable Web Server 4
collafl
trying to implementing collafl
UAF
MRLEE123456's Repositories
MRLEE123456/record
MRLEE123456/UAF
MRLEE123456/404StarLink2.0-Galaxy
404StarLink Project 2.0 - 推荐真正优质、有意义、有趣、坚持维护的开源项目
MRLEE123456/aflpro
Specification based Stateful Protocol Greybox Fuzzing
MRLEE123456/aflsmart
Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)
MRLEE123456/Angora
Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic execution.
MRLEE123456/appweb
Appweb Enterprise Edition Embedded Web Server
MRLEE123456/CVE-2021-22893
Pulse Connect Secure RCE Vulnerability (CVE-2021-22893)
MRLEE123456/CVE-2021-22894
Proof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893.
MRLEE123456/FirmAE
Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
MRLEE123456/InScan
边界打点后的自动化渗透工具
MRLEE123456/Inveigh
Windows PowerShell ADIDNS/LLMNR/mDNS/NBNS spoofer/machine-in-the-middle tool
MRLEE123456/IOCPServer
from TTGuoying / IOCPServer
MRLEE123456/K8tools
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
MRLEE123456/Kernelhub
:palm_tree:Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (Windows提权漏洞合集)
MRLEE123456/LadonGo
Ladon Pentest Scanner framework 全平台Go开源内网渗透扫描器框架,Windows/Linux/Mac内网渗透,使用它可轻松一键批量探测C段、B段、A段存活主机、高危漏洞检测MS17010、SmbGhost,远程执行SSH/Winrm,密码爆破SMB/SSH/FTP/Mysql/Mssql/Oracle/Winrm/HttpBasic/Redis,端口扫描服务识别PortScan指纹识别/HttpBanner/HttpTitle/TcpBanner/Weblogic/Oxid多网卡主机,端口扫描服务识别PortScan。
MRLEE123456/malleable-c2
Cobalt Strike Malleable C2 Design and Reference Guide
MRLEE123456/Malleable-C2-Profiles
Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable C2 profiles that you may use. These profiles work with Cobalt Strike 3.x.
MRLEE123456/Middleware-Vulnerability-detection
CVE、CMS、中间件漏洞检测利用合集 Since 2019-9-15
MRLEE123456/nbtscan
The NBTscan mod for Windows without dependency of cygwin
MRLEE123456/nps
一款轻量级、高性能、功能强大的内网穿透代理服务器。支持tcp、udp、socks5、http等几乎所有流量转发,可用来访问内网网站、本地支付接口调试、ssh访问、远程桌面,内网dns解析、内网socks5代理等等……,并带有功能强大的web管理端。a lightweight, high-performance, powerful intranet penetration proxy server, with a powerful web management terminal.
MRLEE123456/pin--
挑选执行到指定位置的测试用例
MRLEE123456/poc-hub
漏洞复现:打点漏洞、提权漏洞、横向漏洞、域漏洞
MRLEE123456/Python-100-Days
Python - 100天从新手到大师
MRLEE123456/Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
MRLEE123456/RpcSsImpersonator
Privilege Escalation Via RpcSs svc
MRLEE123456/RSA_Algorithm
文件加密工具
MRLEE123456/Some-PoC-oR-ExP
各种漏洞poc、Exp的收集或编写
MRLEE123456/unicorn_pe
Unicorn PE is an unicorn based instrumentation project designed to emulate code execution for windows PE files.
MRLEE123456/wesng
Windows Exploit Suggester - Next Generation