keepalivewalker's Stars
2dust/v2rayN
A GUI client for Windows, support Xray core and v2fly core and others
apolloconfig/apollo
Apollo is a reliable configuration management system suitable for microservice configuration management scenarios.
dianping/cat
CAT 作为服务端项目基础组件,提供了 Java, C/C++, Node.js, Python, Go 等多语言客户端,已经在美团点评的基础架构中间件框架(MVC框架,RPC框架,数据库框架,缓存框架等,消息队列,配置系统等)深度集成,为美团点评各业务线提供系统丰富的性能指标、健康状况、实时告警等。
pyecharts/pyecharts
🎨 Python Echarts Plotting Library
justcallmekoko/ESP32Marauder
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
guchangan1/All-Defense-Tool
本项目集成了全网优秀的攻防武器工具项目,包含自动化利用,子域名、目录扫描、端口扫描等信息收集工具,各大中间件、cms、OA漏洞利用工具,爆破工具、内网横向、免杀、社工钓鱼以及应急响应、甲方安全资料等其他安全攻防资料。
vvmdx/Sec-Interview-4-2023
一个2023届毕业生在毕业前持续更新、收集的安全岗面试题及面试经验分享~
jorhelp/Ingram
网络摄像头漏洞扫描工具 | Webcam vulnerability scanning tool
JohnHammond/msdt-follina
Codebase to generate an msdt-follina payload
chvancooten/follina.py
POC to replicate the full 'Follina' Office RCE vulnerability for testing purposes
aleff-github/my-flipper-shits
Free and libre source BadUSB payloads for Flipper Zero. [Windows, GNU/Linux, iOS]
Arinerron/CVE-2022-0847-DirtyPipe-Exploit
A root exploit for CVE-2022-0847 (Dirty Pipe)
taverntesting/tavern
A command-line tool and Python library and Pytest plugin for automated testing of RESTful APIs, with a simple, concise and flexible YAML-based syntax
zaproxy/zap-extensions
ZAP Add-ons
klezVirus/CVE-2021-40444
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
komomon/CVE-2022-30190-follina-Office-MSDT-Fixed
CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。
BobTheShoplifter/Spring4Shell-POC
Spring4Shell Proof Of Concept/And vulnerable application CVE-2022-22965
narstybits/MacOS-DuckyScripts
Presenting a wide range of more than 100 powerful BadUSB scripts exclusively designed for Mac OS & the Flipper Zero device. As the sole curator and maintainer of this repository. Your utilization of these scripts is highly valued, and I sincerely appreciate your support and enthusiasm!
0ps/Caesar
一个全新的敏感文件发现工具
r1is/CVE-2022-0847
CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”
UndedInside/DuckyScriptPayloads
A collection of Ducky scripts to be used in a Hak5 Rubber Ducky or Flipper Zero
rxwx/CVE-2017-8570
Proof of Concept exploit for CVE-2017-8570
wrenchathome/flipperfiles
extra cool flipper stuff
Yt1g3r/CVE-2018-8174_EXP
CVE-2018-8174_python
Axx8/CVE-2022-22947_Rce_Exp
Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947
tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway
CVE-2022-22947批量
dingxiao77/-cve-2022-22947-
cve-2022-22947 spring cloud gateway 批量扫描脚本
gamingwithevets/msdt-disable
MSDT protocol disabler (CVE-2022-30190 patch tool)
rouben/CVE-2022-30190-NSIS
An NSIS script that helps deploy and roll back the mitigation registry patch for CVE-2022-30190 as recommended by Microsoft
suenerve/CVE-2022-30190-Follina-Patch
The CVE-2022-30190-follina Workarounds Patch