daybreak's starred repositories
MYJNDIExploit
自己的JNDI 利用工具,添加一些人性化功能
How-to-create-a-csgo-cheating-program
CSGO游戏透视自瞄辅助实现教程
my-re0-k8s-security
:atom: [WIP] 整理过去的分享,从零开始的Kubernetes攻防 🧐
trufflehog
Find and verify secrets
SummaryOfLoanSuspension
全国各省市停贷通知汇总
wsMemShell
WebSocket 内存马/Webshell,一种新型内存马/WebShell技术
Emergency-Response-Notes
应急响应实战笔记,一个安全工程师的自我修养。
spider-flow
新一代爬虫平台,以图形化方式定义爬虫流程,不写代码即可完成爬虫。
DesignPattern
📚 Java 23种设计模式全归纳
JNDIExploit
对原版https://github.com/feihong-cs/JNDIExploit 进行了实用化修改
Safety-Project-Collection
收集一些比较优秀的开源安全项目,以帮助甲方安全从业人员构建企业安全能力。
sqlmap4burp-plus-plus
sqlmap4burp++是一款兼容Windows,mac,linux多个系统平台的Burp与sqlmap联动插件
JNDIExploit-1
一款用于JNDI注入利用的工具,大量参考/引用了Rogue JNDI项目的代码,支持直接植入内存shell,并集成了常见的bypass 高版本JDK的方式,适用于与自动化工具配合使用。
codeql_compile
自动反编译闭源应用,创建codeql数据库
ByPassBehinder4J
冰蝎Java WebShell自动化免杀生成
ApolloScanner
自动化巡航扫描框架(可用于红队打点评估)
LiME
LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. LiME is unique in that it is the first tool that allows full memory captures from Android devices. It also minimizes its interaction between user and kernel space processes during acquisition, which allows it to produce memory captures that are more forensically sound than those of other tools designed for Linux memory acquisition.
CodeqlLearn
记录学习codeql的过程
kubeletctl
A client for kubelet