yuriisanin |
CVE-2022-45025:在 Markdown Preview Enhanced(VSCode、Atom)中通过 PDF 导入进行命令注入 |
https://github.com/yuriisanin/CVE-2022-45025 |
https://github.com/yuriisanin?tab=followers |
Security Engineer |
Kyiv, Ukraine |
Octal Security |
7 |
0 |
59 |
0 |
0 |
Python |
0 |
0 |
wh1t3p1g |
TABBY:一款针对Java语言的静态代码分析工具 |
https://github.com/wh1t3p1g/tabby |
https://github.com/wh1t3p1g?tab=followers |
Study On Web Security && Code review (semi-auto and manual) |
None |
Never Stop Exploiting |
29 |
0 |
1500 |
0 |
0 |
PHP,Java |
0 |
0 |
root-tanishq |
一个专门fuzz User-Agent , X-Forwarded-For, Referer的 SQLI Fuzzer |
https://github.com/root-tanishq/userefuzz |
https://github.com/root-tanishq?tab=followers |
kuns Notebook OSCP , eWPTXv2 |
None |
None |
16 |
0 |
25 |
0 |
0 |
Python,Shell |
0 |
0 |
romainthomas |
一个逆向工程研讨会的ppt,讲到了很多x86下逆向的技巧 |
https://github.com/romainthomas/reverse-engineering-workshop |
https://github.com/lief-project |
Security Engineer working on mobile, obfuscation and file formats. Author & maintainer of @lief-project / @open-obfuscator |
None |
@lief-project @open-obfuscator |
49 |
0 |
331 |
0 |
0 |
Java,C++ |
0 |
0 |
reecdeep |
HiveV5勒索软件文件解密Poc和算法分析 |
https://github.com/reecdeep/HiveV5_file_decryptor |
https://github.com/reecdeep?tab=followers |
Malware analyst, reverse engineer |
Stack |
None |
2 |
0 |
0 |
0 |
0 |
C++ |
0 |
0 |
projectdiscovery |
社区整理的nuclei扫描器fuzz模版 |
https://github.com/projectdiscovery/fuzzing-templates |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
praetorian-inc |
一款扫描文本数据中的敏感信息的工具,可用于扫描开源项目寻找是否包含secret key在内的敏感信息泄露 |
https://github.com/praetorian-inc/noseyparker |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
pascal-lab |
Tai-e:Java静态分析框架 |
https://github.com/pascal-lab/Tai-e |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Shell,Java |
0 |
0 |
google |
VSCode远程代码执行漏洞(CVE-2022-41034)细节,存在于ipynb文件加载流程中,用户点击恶意链接即可能受到攻击。 |
https://github.com/google/security-research/security/advisories/GHSA-pw56-c55x-cm9m |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,Java,Python,JavaScript,C++,Shell,HTML,Go |
0 |
0 |
fr0gger |
用 OpenAI 的 GPT-3 模型来提供 Windows PE 文件导入函数的细节,并解释攻击者可能如何使用该 API |
https://github.com/fr0gger/IATelligence |
https://github.com/fr0gger?tab=followers |
|
None |
@microsoft |
82 |
0 |
57 |
0 |
0 |
Python,HTML,C++ |
0 |
0 |
deepinstinct |
通过滥用 Windows 错误报告服务以dump LSASS 的方法,来自DC30议题LSASS Shtinkering Abusing Windows Error Reporting to Dump LSASS |
https://github.com/deepinstinct/Lsass-Shtinkering |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,PowerShell,C++ |
0 |
0 |
coinspect |
收集了一些典型的以太坊智能合约漏洞和利用脚本 |
https://github.com/coinspect/learn-evm-attacks |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
TypeScript,Stylus,Solidity,Java,Go |
0 |
0 |
caioluders |
XSS 2 RCE on flipper_zero |
https://github.com/caioluders/pocs/blob/main/flipper_rce_xss.js |
https://github.com/caioluders?tab=followers |
|
Brazil |
None |
43 |
0 |
204 |
0 |
0 |
Python,C,HTML |
0 |
0 |
blasty |
blasty分享了关于其在Pwn2Own演示打印机漏洞的成功画面展示如何实现 |
https://github.com/blasty/printer-cracktro |
https://github.com/blasty?tab=followers |
|
None |
None |
19 |
0 |
5 |
0 |
0 |
Python,C,Dockerfile |
0 |
0 |
alfarom256 |
CVE-2022-45451:ngscan驱动访问控制实现缺陷,攻击者可利用该漏洞实现任意文件读取以及敏感注册表项修改 |
https://github.com/alfarom256/CVE-2022-45451 |
https://github.com/alfarom256?tab=followers |
|
None |
None |
60 |
0 |
71 |
0 |
0 |
Go,C,C++ |
0 |
0 |
ZhuriLab |
Yi: 项目监控工具 以及 Codeql 自动运行 |
https://github.com/ZhuriLab/Yi |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go,C |
0 |
0 |
Safe3 |
uuWAF: 免费、高性能、高扩展开源WAF |
https://github.com/Safe3/uuWAF |
https://github.com/Safe3?tab=followers |
|
None |
UUSEC Tech. |
438 |
0 |
7 |
0 |
0 |
Go,Lua,Kotlin |
0 |
0 |
Nalen98 |
Ghidra Native pcode 模拟器 |
https://github.com/Nalen98/GhidraEmu |
https://github.com/Nalen98?tab=followers |
|
None |
None |
13 |
0 |
22 |
0 |
0 |
Python,C,Java,C++ |
0 |
0 |
LittleBear4 |
OA-EXPTOOL: OA综合利用工具 |
https://github.com/LittleBear4/OA-EXPTOOL |
https://github.com/LittleBear4?tab=followers |
一个练习时长两年半的代码练习生,喜欢网安,代码,逆向 |
None |
None |
2 |
0 |
2 |
0 |
0 |
Python |
0 |
0 |
Bywalks |
DarkAngel: 一款全自动白帽漏洞扫描器 |
https://github.com/Bywalks/DarkAngel |
https://github.com/Bywalks?tab=followers |
知行合一。 |
shanghai |
None |
20 |
0 |
87 |
0 |
0 |
Python,Go |
0 |
0 |