s0duku |
VMware Workstation Heap OOB 漏洞POC。 |
https://github.com/s0duku/cve-2022-31705 |
https://github.com/s0duku?tab=followers |
NJFU |
None |
None |
123 |
0 |
106 |
0 |
0 |
Python,C,C++ |
0 |
0 |
romainthomas |
一款基于LIEF和LLVM的对Objective-C语言二进制文件中类成员分析的工具。 |
https://github.com/romainthomas/iCDump |
https://github.com/lief-project |
Security Engineer working on mobile, obfuscation and file formats. Author & maintainer of @lief-project / @open-obfuscator |
None |
@lief-project @open-obfuscator |
50 |
0 |
331 |
0 |
0 |
Java,C++ |
0 |
0 |
potmdehex |
Hexacon 2022会议中《More Tales from the iOS/macOS Kernel Trenches》议题slide,其中提及了CVE-2022-22640、CVE-2022-32821漏洞的原理等详细信息及利用技术。 |
https://github.com/potmdehex/slides/blob/main/Hexacon_2022_More_Tales_from_the_iOS_macOS_Kernel_Trenches.pdf |
https://github.com/potmdehex?tab=followers |
Reverse Engineer |
None |
None |
12 |
0 |
10 |
0 |
0 |
C,Ruby |
0 |
0 |
objective-see |
解析BackgroundItems-v4.btm中的启动项信息,可用于MacOS的取证 |
https://github.com/objective-see/DumpBTM/ |
https://github.com/objective-see?tab=followers |
|
Hawaii, USA |
Objective-See Foundation |
28 |
0 |
0 |
0 |
0 |
Objective-C |
0 |
0 |
mrphrazer |
Obfuscation Detection 一个用于自动检查二进制文件中的混淆代码和状态机的脚本/工具/Binary Ninja插件 |
https://github.com/mrphrazer/obfuscation_detection |
https://github.com/mrphrazer?tab=followers |
|
None |
None |
24 |
0 |
5 |
0 |
0 |
Python |
0 |
0 |
moyix |
基于Ghidra和GPT-3的辅助逆向工具 |
https://github.com/moyix/gpt-wpre |
https://github.com/moyix?tab=followers |
Assistant Professor in CSE at NYU Tandon School of Engineering, focusing on security, program analysis, and reverse engineering. |
New York, NY |
None |
74 |
0 |
30 |
0 |
0 |
Python,C,C++ |
0 |
0 |
momika233 |
CVE-2022-3656:Google Chrome 和基于 Chromium 的浏览器由于对一些文件上传功能缺乏symlink的检查,从而导致通过滥用symlink可以盗取你本地的一些重要配置文件 |
https://github.com/momika233/CVE-2022-3656 |
https://github.com/momika233?tab=followers |
momika233 |
Korea |
None |
60 |
0 |
8 |
0 |
0 |
Python,HTML |
0 |
0 |
michalbednarski |
CVE-2022-20452 的漏洞利用代码。可通过 LazyValue 将已安装的恶意 APP 提权至系统 APP |
https://github.com/michalbednarski/LeakValue |
https://github.com/michalbednarski?tab=followers |
|
None |
None |
16 |
0 |
2 |
0 |
0 |
Java |
0 |
0 |
jafarlihi |
modreveal 找出当前Linux机器的隐藏Linux内核模块的工具 |
https://github.com/jafarlihi/modreveal |
https://github.com/jafarlihi?tab=followers |
|
Baku, Azerbaijan |
None |
29 |
0 |
2 |
0 |
0 |
Go,C,Java,C++ |
0 |
0 |
iczc |
RealWorld CTF 5th 区块链挑战- realwrap Writeup |
https://github.com/iczc/rwctf-5th-realwrap |
https://github.com/iczc?tab=followers |
Blockchain Security |
Earth, Solar System |
None |
20 |
0 |
1600 |
0 |
0 |
Python,Go,JavaScript,Solidity |
0 |
0 |
blackorbird |
2022年APT组织分析年鉴 |
https://github.com/blackorbird/APT_REPORT/blob/master/summary/2023/2022%20Yearbook%20of%20APT%20group%20Analysis.pdf |
https://github.com/blackorbird?tab=followers |
APT hunter threat analyst |
https://twitter.com/blackorbird |
https://twitter.com/blackorbird |
46 |
0 |
125 |
0 |
0 |
Python,C |
0 |
0 |
bit4woo |
Fiora:漏洞PoC框架Nuclei的图形版 |
https://github.com/bit4woo/Fiora |
https://github.com/ossdao-org |
Creating with coding,Learning by doing,Learning by sharing! @ossdao-org•AIRDROP-0x028f231db6db1ef2f6bdb7bbc2da41bac976cdcc |
shenzhen |
https://space.bilibili.com/527442393 |
108 |
0 |
912 |
0 |
0 |
Python,Java |
0 |
0 |
bAuh0lz |
CVE-2023-0297:pyLoad中由于js2py的eval_js安全配置不当导致未授权RCE |
https://github.com/bAuh0lz/CVE-2023-0297_Pre-auth_RCE_in_pyLoad |
https://github.com/bAuh0lz?tab=followers |
|
None |
None |
8 |
0 |
5 |
0 |
0 |
Python,PHP |
0 |
0 |
alt3kx |
CVE-2023-24055:KeePass 配置文件具有写入权限的攻击者可以修改它并注入恶意触发器,可以泄露密码 |
https://github.com/alt3kx/CVE-2023-24055_PoC |
https://github.com/alt3kx?tab=followers |
Red Teamer , PentTester , Bug Bounty , 0day guy! , Researcher , Lone Wolf...l opinions expressed are mine 🇪🇺 |
France |
None |
49 |
0 |
11 |
0 |
0 |
C |
0 |
0 |
akamai |
利用 Windows CryptoAPI 中的欺骗漏洞(CVE-2022-34689),Poc的攻击分为两种:一种利用 Chrome v48,另一种侧重于crypt32.dll中易受攻击的MD5 |
https://github.com/akamai/akamai-security-research/tree/main/PoCs/CVE-2022-34689 |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,Java,Python,JavaScript,Go,Swift,PowerShell,Rust |
0 |
0 |
Wh04m1001 |
RazerEoP:Razer Synapse3 Macro模块中删除/移动任意文件的 PoC,可造成提权 |
https://github.com/Wh04m1001/RazerEoP |
https://github.com/Wh04m1001?tab=followers |
OSCP,OSEP,CRTO,CRTP,CRTE,PACES |
None |
Infigo IS |
37 |
0 |
123 |
0 |
0 |
Python,C,C++ |
0 |
0 |
TheBlupper |
idek 2022* CTF Hardest Demon Bloodbath by Riot题目的writeup |
https://github.com/TheBlupper/ctf_writeups/tree/main/idek2022/Hardest%20Demon%20Bloodbath%20by%20Riot |
https://github.com/TheBlupper?tab=followers |
git: gud is not a git command. See git --help. |
None |
None |
6 |
0 |
5 |
0 |
0 |
Python,JavaScript |
0 |
0 |
SunWeb3Sec |
Web3 安全-链上威胁分析教学 |
https://github.com/SunWeb3Sec/DeFiHackLabs#web3-cybersecurity-academy |
https://github.com/SunWeb3Sec?tab=followers |
Lets make Web3 more secure! |
None |
None |
9 |
0 |
8 |
0 |
0 |
Solidity |
0 |
0 |
PaulNorman01 |
Forensia:RedTeam后渗透阶段的痕迹清理工具 |
https://github.com/PaulNorman01/Forensia |
https://github.com/PaulNorman01?tab=followers |
Cybersecurity researcher , Coder , Geek ! |
None |
None |
3 |
0 |
1 |
0 |
0 |
C,C++ |
0 |
0 |
Fndroid |
Windows 上的 clash_for_windows 在 0.20.12 在订阅一个恶意链接时存在远程命令执行漏洞。因为对订阅文件中 rule-providers 的 path 的不安全处理导致 cfw-setting.yaml 会被覆盖,cfw-setting.yaml 中 parsers 的 js代码将会被执行 |
https://github.com/Fndroid/clash_for_windows_pkg/issues/3891 |
https://github.com/Fndroid?tab=followers |
|
China |
None |
82 |
0 |
186 |
0 |
0 |
|
0 |
0 |
DallasFR |
WalkerGate:通过查找ntdll的内存解析以进行系统调用 |
https://github.com/DallasFR/WalkerGate |
https://github.com/DallasFR?tab=followers |
|
None |
None |
14 |
0 |
2 |
0 |
0 |
C |
0 |
0 |
D1rkMtr |
劫持cscapi.dll以劫持explorer.exe来进行持久化驻留 |
https://github.com/D1rkMtr/ExplorerPersist |
https://github.com/D1rkMtr?tab=followers |
Malware dev , C2 dev |
None |
None |
47 |
0 |
47 |
0 |
0 |
C++ |
0 |
0 |
4ra1n |
code-inspector: 基于字节码分析的Java代码审计工具 |
https://github.com/4ra1n/code-inspector |
https://github.com/4ra1n?tab=followers |
我是4ra1n,大家习惯叫我许少 |
China |
@chaitin |
9 |
0 |
15 |
0 |
0 |
Go,Java |
0 |
0 |