Skip to content
View HB666666's full-sized avatar

Block or report HB666666

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. POCS POCS Public

    Forked from onewinner/POCS

    收集最新漏洞POC(Yaml\Python)

    Python 1

  2. EHole EHole Public

    Forked from EdgeSecurityTeam/EHole

    EHole(棱洞)3.0 重构版-红队重点攻击系统指纹探测工具

    Go

  3. computer-science-br computer-science-br Public

    Forked from ossu/computer-science-br

    🇧🇷 Brazilian OSSU-like Community built on the same principles of openness, inclusivity, and accessibility!

  4. computer-science computer-science Public

    Forked from ossu/computer-science

    🎓 Path to a free self-taught education in Computer Science!

  5. cve-2024-6387-poc cve-2024-6387-poc Public

    Forked from zgzhang/cve-2024-6387-poc

    a signal handler race condition in OpenSSH's server (sshd)

    C

  6. CVE-2024-26229 CVE-2024-26229 Public

    Forked from team-MineDEV/CVE-2024-26229

    Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从而控制受影响的系统、执行任意命令、安装恶意软件或访问敏感数据。 微软已发出警告成功利用此漏洞的攻击者可以获得 SYSTEM…