# sectoolset **Repository Path**: childlu/sectoolset ## Basic Information - **Project Name**: sectoolset - **Description**: 安全项目工具集合 - **Primary Language**: Python - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 19 - **Created**: 2019-05-27 - **Last Updated**: 2024-11-22 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README ## sectoolset -- Github安全相关工具集合 ## 主要内容: [0x00 漏洞利用实战练习&CTF安全竞赛](Practice_CTF.md) [0x01 安全扫描器](Scanner.md) [0x02 安全防守](Defence.md) [0x03 渗透测试](PenetrationTest.md) [0x04 漏洞库及利用工具(POC,EXP)](ProofofConcept_Exploit.md) [0x05 二进制及代码分析工具](BinaryAnalysis.md) [0x06 威胁情报&蜜罐](ThreatIntelligence_Honey.md) [0x07 安全文档资料](SecurityDoucument.md) [0x11 所有内容](All.md) ## 乌云镜像 [乌云镜像](http://wooyun.webbaozi.com) [乌云镜像,河*蟹](http://wy.hx99.net/) ## 近期安全热点 [微软远程桌面漏洞影响WindowsXP、Win7、Win2003、Win2008](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708) [eyeDisk虹膜加密U盘也没有那么安全](https://www.pentestpartners.com/security-blog/eyedisk-hacking-the-unhackable-again/) [WordPress最大主题之一pipdig 存安全隐患,可以发起Ddos攻击对手](https://www.jemjabella.co.uk/2019/security-alert-pipdig-insecure-ddosing-competitors/) [Java序列化对象:流行性调研,漏洞渗透、利用开发和安全识别](https://www.freebuf.com/column/199570.html) [大佬们对2019的信息安全预测](https://cybersecuritymag.com/cybersecurity-predictions-for-2019/) [Widows下WinRAR 等多款压缩软件爆严重代码执行漏洞](https://mbd.baidu.com/newspage/data/landingshare?context=%7B%22nid%22%3A%22news_9188401000047963513%22%2C%22sourceFrom%22%3A%22bjh%22%2C%22url_data%22%3A%22bjhauthor%22%7D) [SCP客户端现多个漏洞,可执行恶意脚本`CVE-2018-20685`,`CVE-2019-6109/6111`](http://baijiahao.baidu.com/builder/preview/s?id=1622801862898115331) [Jenkins暴严重漏洞`CVE-2018-1999001` `CVE-2018-1999043` 匿名账号可以提权到admin](https://www.zdnet.com/google-amp/article/thousands-of-jenkins-servers-will-let-anonymous-users-become-admins/) [2018 Blackhat 工具集](BlackHat2018.md) [Meltdown & Spectre](Meltdown_Spectre.md) ## License Licensed under [Apache License 2.0](https://www.apache.org/licenses/LICENSE-2.0.html).