Topic: 0day Goto Github
Some thing interesting about 0day
Some thing interesting about 0day
0day,0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)
User: 0dayninja
0day,Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
User: 1n3
Home Page: https://xerosecurity.com
0day,Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
User: 1n3
Home Page: https://crowdshield.com
0day,CVE-2023-38831 winrar exploit generator
User: b1tg
Home Page: https://b1tg.github.io/post/cve-2023-38831-winrar-analysis/
0day,Custom Metasploit logos
User: bcoles
0day,LPE exploits for Secret Net and Secret Net Studio
User: cr4sh
0day,Public Disclosures
User: drunkenshells
0day,WPS 0day.hen the wps software is running, an api interface with port 4709 will be opened. An attacker can request this interface to execute commands.
User: george-boop-svg
0day,Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
Organization: ghosttroops
Home Page: https://scan4all.51pwn.com
0day,Repository for information about 0-days exploited in-the-wild.
Organization: googleprojectzero
Home Page: https://googleprojectzero.github.io/0days-in-the-wild
0day,hack tools
User: hacktoolspack
0day,spring-cloud / spring-cloud-function,spring.cloud.function.routing-expression,RCE,0day,0-day,POC,EXP,CVE-2022-22963
User: hktalent
Home Page: https://51pwn.com
0day,CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.
User: hook-s3c
0day,iOS exploit (fixed in 14.7)
User: illusionofchaos
Home Page: https://habr.com/ru/post/579714/
0day,iOS gamed exploit (fixed in 15.0.2)
User: illusionofchaos
Home Page: https://habr.com/ru/post/579714/
0day,iOS 15 0-day exploit (still works in 15.0.2)
User: illusionofchaos
Home Page: https://habr.com/ru/post/579714/
0day,iOS 15 0-day exploit (still works in 15.0.2)
User: illusionofchaos
Home Page: https://habr.com/ru/post/579714/
0day,RTSPhuzz - An RTSP Fuzzer written using the Boofuzz framework
Organization: includesecurity
0day,0day安全_软件漏洞分析技术
User: jas502n
0day,K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
User: k8gege
0day,CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
User: klezvirus
0day,Spring Core RCE 0-day Vulnerability (https://share.vx-underground.org/)
User: mcdulltii
0day,This repository contains proof of concept for zero days and CVEs that were found by Omar Hashem through Security Research
User: omarhashem123
Home Page: https://eg.linkedin.com/in/omar-1-hashem
0day,OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/
Organization: owasp
Home Page: https://www.secologist.com/open-source-projects
0day,ProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)
User: p0wershe11
0day,面向网络安全从业者的知识文库🍃
User: peiqi0
Home Page: https://peiqi.wgpsec.org
0day,🎵 Official source code and writeups for SekaiCTF 2024!
Organization: project-sekai-ctf
Home Page: https://2024.ctf.sekai.team/
0day,No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are already sandboxed escaped: https://no-sandbox.io/
User: sickcodes
Home Page: https://no-sandbox.io/
0day,CVE-2024-32640 | Automated SQLi Exploitation PoC
User: stuub
0day,CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support
User: stuub
0day,Everything I needed to understand what was going on with "Spring4Shell" - translated source materials, exploit, links to demo apps, and more.
User: tweedge
0day,"AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS
User: v-i-x-x
Home Page: https://www.offsec.com/offsec/amsi-write-raid-0day-vulnerability/
0day,Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
User: voidsec
Home Page: https://voidsec.com
0day,exploit for f5-big-ip RCE cve-2023-46747
User: w01fh4cker
0day,exploit for cve-2023-47246 SysAid RCE (shell upload)
User: w01fh4cker
0day,CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4
User: w01fh4cker
0day,【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。
User: w01fh4cker
0day,【Lazy Artifact】A graphical tool that collects urls in batches, and performs various nday detections on the collected urls in batches. It can be used for src mining, cnvd mining, 0day exploitation, building your own arsenal and other scenarios.
User: w01fh4cker
0day,APT38 Tactic PoC for Stealing 0days from security professionals
User: zeromemoryex
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.