GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.
GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.
import conf as cf BASE_URL = 'https://github.com/offensive-security/exploitdb/releases' DOWNLOAD_LINK_PATTERN = 'href="(.*?)zip" rel="nofollow">' FIRST_PATTERN = r'Next.*' PAGE_PATTERN = r'>PreviousNext.*' class MyCrawler: def __init__(self, base_url=BASE_URL, start_page="f...
Included in ourExploit Database repository on GitHubis “searchsploit”, a command line search tool for Exploit-DB that also allows you to takea copy ofExploit Database with you, everywhere you go. SearchSploit gives you the power to perform detailed off-line searches through your locallychecked...
This was done with the latest copy of this repository and on Ubuntu 23.04. The repository is installed in the /opt folder. Perhaps this is related to the change from github to gitlab? Edited1 year ago 00 To upload designs, you'll need to enable LFS and have an admin enable hashed sto...
Exploits & Shellcodes:gitlab.com/exploit-database/exploitdb Binary Exploits:gitlab.com/exploit-database/exploitdb-bin-sploits Papers:gitlab.com/exploit-database/exploitdb-papers The Exploit Database is an archive of public exploits and corresponding vulnerable software, developed for use by penetrat...
精准反馈,高效沟通 我知道了查看详情 登录注册 扫描微信二维码支付 取消 支付完成 Watch 不关注关注所有动态仅关注版本发行动态关注但不提醒动态 1Star0Fork0 RabbitQ/exploitdb 代码Issues0Pull Requests0Wiki统计流水线 服务 统计 搜索 Watchers (1) RabbitQ ...
他会自动化爬取微信公众号漏洞Poc,Gihtub采集漏洞代码采集,监控各种漏洞平台(x里云,x安信,x创宇,x盟等)判断采集利用Poc,会根据漏洞名称是否有POC/EXP提取关键字自动化去搜索引擎(支持谷歌、Bing)和Gihub搜索爬取和提取数据,监控xxhub、nuclei、exploitdb等漏洞利用平台2.0主要新增了github内容的漏洞exp/poc的监控,...
Link: https://imagemagick.org/ # Version: <= 7.1.0-49 # Tested on: 7.1.0-49 and 6.9.11-60 # CVE : CVE-2022-44268 (CVE Owner: Metabase Q Team https://www.metabaseq.com/imagemagick-zero-days/) # Exploit pre-requirements: Rust # PoC : https://github.com/voidz0r/CVE-2022-...
# Exploit Title: Flowise 1.6.5 - Authentication Bypass # Date: 17-April-2024 # Exploit Author: Maerifat Majeed # Vendor Homepage: https://flowiseai.com/ # Software Link: https://github.com/FlowiseAI/Flowise/releases # Version: 1.6.5 # Tested on: mac-os # CVE : CVE-2024-31621 ...