Pinned Repositories
AngelSword
Python3编写的CMS漏洞检测框架
automated-subdomain-takeover
test
BlueKeep
Proof of concept for CVE-2019-0708
bluekeep-1
Research Regarding CVE-2019-0708.
bluekeep_CVE-2019-0708_poc_to_exploit
Porting BlueKeep PoC from @Ekultek to actual exploits
burplugin-java-rce
******本软件仅限用于学习交流禁止用于任何非法行为****** 本版本支持elasticsearch java语言远程命令执行及文件上传 elasticsearchgroov语言远程命令执行及文件上传 struts2-005、struts2-009、struts2-013、struts2-016、struts2-019、struts2-020、struts2-devmode、 struts2-032、struts2-033、struts2-037、struts2-045、struts2-048、struts2-052 除struts2-053全部RCE漏洞验证并支持批量验证。 Struts2漏洞验证需要python环境并需要相关类库支持.点击python按钮初始化初始化python类库 如果初始化失败请按照如下步骤安装类库, 1、执行 $[python]/Scrips/easy_install pip 2、requests模块 安装方法 pip install requests 3、termcolor模块安装方法: pip install termcolor github: https://github.com/bigsizeme/java-rce-tools burpsuite源码地址:https://github.com/bigsizeme/burplugin-java-rce
CVE-2015-3337
CVE-2015-3337 ElasticSearch 任意文件读取
CVE-2017-1000353
jenkins CVE-2017-1000353 POC
cve-2017-12615
just a python script for cve-2017-12615
CVE-2017-12617
Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution
microqs's Repositories
microqs/AngelSword
Python3编写的CMS漏洞检测框架
microqs/automated-subdomain-takeover
test
microqs/BlueKeep
Proof of concept for CVE-2019-0708
microqs/bluekeep-1
Research Regarding CVE-2019-0708.
microqs/bluekeep_CVE-2019-0708_poc_to_exploit
Porting BlueKeep PoC from @Ekultek to actual exploits
microqs/CVE-2015-3337
CVE-2015-3337 ElasticSearch 任意文件读取
microqs/CVE-2017-1000353
jenkins CVE-2017-1000353 POC
microqs/CVE-2017-7269-Echo-PoC
CVE-2017-7269 回显PoC ,用于远程漏洞检测..
microqs/CVE-2018-15473-Exploit
Exploit written in Python for CVE-2018-15473 with threading and export formats
microqs/CVE-2018-3191
CVE-2018-3191-PoC
microqs/CVE-2019-0193
microqs/CVE-2019-0194
Apache Solr DataImport Handler RCE
microqs/CVE-2019-0232
Apache Tomcat Remote Code Execution on Windows - CGI-BIN
microqs/CVE-2019-0708
dump
microqs/cve-2019-0708-exp
microqs/CVE-2019-0708-PoC-Hitting-Path
It's only hitting vulnerable path in termdd.sys!!! NOT DOS
microqs/CVE-2019-0709
Only Hitting PoC [Tested on Windows Server 2008 r2]
microqs/CVE-2019-2725
CVE-2019-2725 命令回显
microqs/fetch-some-proxies
Simple Python script for fetching "some" (usable) proxies
microqs/InCloud
运行于GitHub Actions 的仓库中自动化、自定义和执行软件开发工作流程,可以自己根据喜好定制功能,InCloud已经为您定制好了十种针对网段和域名的不同场景的信息收集与漏洞扫描流程。
microqs/ispy
ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )
microqs/Joomla-3.4.6-RCE
Joomla 3.4.6 – Remote Code Execution
microqs/MS08-067-Case-Study
microqs/ms08_067
Updating MS08-067 Python exploit script
microqs/ms12-020-Multiple
This obj is my first python and its from other user, i want to become multi IP attack , i speak poor English :p and i hope everyone can give some suggest to change it
microqs/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-
rce exploit , made to work with pocsuite3
microqs/Struts2-Scan
Struts2全漏洞扫描利用工具
microqs/vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
microqs/Vxscan
python3写的综合扫描工具,主要用来敏感文件探测(目录扫描与js泄露接口),WAF/CDN识别,端口扫描,指纹/服务识别,操作系统识别,弱口令探测,POC扫描,SQL注入,绕过CDN,查询旁站等功能,主要用来甲方自测或乙方授权测试,请勿用来搞破坏。
microqs/w3af
w3af: web application attack and audit framework, the open source web vulnerability scanner.