Pinned Repositories
2021_Hvv
2021 hw
ansible
Ansible is a radically simple IT automation platform that makes your applications and systems easier to deploy. Avoid writing scripts or custom code to deploy and update your applications— automate in a language that approaches plain English, using SSH, with no agents to install on remote systems.
ARL
ARL官方仓库备份项目:ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
Binary-files
EarthWorm/Termite 停止更新
bro_scripts
bro 脚本整理
CVE-2020-1938
guards
主机入侵检测系统(HIDS)
Log-Analysis
日志分析工具
ThreatCollector
威胁情报采集系统
Threathunting-book
ATT&CK理解+sigma规则研究
h7hac9's Repositories
h7hac9/ThreatCollector
威胁情报采集系统
h7hac9/Threathunting-book
ATT&CK理解+sigma规则研究
h7hac9/CVE-2020-1938
h7hac9/2021_Hvv
2021 hw
h7hac9/ARL
ARL官方仓库备份项目:ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
h7hac9/bilibili-backup-backup
你还要我怎么样嘛 备份的备份(
h7hac9/cilium-ebpf-tools
cilium goebpf tools
h7hac9/cve-2020-0601
PoC for CVE-2020-0601
h7hac9/CVE-2020-1313
Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability
h7hac9/CVE-2022-0847-DirtyPipe-Exploit
A root exploit for CVE-2022-0847 (Dirty Pipe)
h7hac9/CVE-2024-4577
CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.
h7hac9/EVTX-ATTACK-SAMPLES
Windows Events Attack Samples
h7hac9/exphub
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,均为亲测可用的脚本文件,优先更新高危且易利用的漏洞利用脚本,最近添加CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340
h7hac9/h7hac9.github.io
h7hac9/linux-kernel-exploits
linux-kernel-exploits Linux平台提权漏洞集合
h7hac9/LinuxCheck
Linux应急处置/信息搜集/漏洞检测工具,支持基础配置/网络流量/任务计划/环境变量/用户信息/Services/bash/恶意文件/内核Rootkit/SSH/Webshell/挖矿文件/挖矿进程/供应链/服务器风险等13类70+项检查
h7hac9/Malleable-C2-Profiles
Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable C2 profiles that you may use. These profiles work with Cobalt Strike 3.x.
h7hac9/malware-samples
A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net
h7hac9/Micro8
Gitbook
h7hac9/PSPKIAudit
PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.
h7hac9/PSScriptAnalyzer
Download ScriptAnalyzer from PowerShellGallery
h7hac9/Red-Team-links
2019年红队资源链接,资源不是本人整理出来,来自互联网,因为流传的少,特意在此做个备份,做个分享。
h7hac9/red_team_tool_countermeasures
h7hac9/sec_interview_know_list
信息安全方面面试清单
h7hac9/secbook
信息安全从业者书单推荐
h7hac9/Security-Datasets
Re-play Security Events
h7hac9/Spring-Cloud-Gateway-CVE-2022-22947
CVE-2022-22947
h7hac9/trivy
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
h7hac9/trivy-db
h7hac9/trivy-java-db