GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2024-11972 in Hunk Companion <1.9.0 allows unauthenticated attackers to exploit insecure REST API endpoints and install vulnerable plugins, risking RCE, SQLi, XSS, and backdoors.
URL:https://github.com/RonF98/CVE-2024-11972-POC
标签:#RCE
更新了:RCE
描述:CVE-2024-11972 in Hunk Companion <1.9.0 allows unauthenticated attackers to exploit insecure REST API endpoints and install vulnerable plugins, risking RCE, SQLi, XSS, and backdoors.
URL:https://github.com/RonF98/CVE-2024-11972-POC
标签:#RCE
GitHub
GitHub - RonF98/CVE-2024-11972-POC: CVE-2024-11972 in Hunk Companion <1.9.0 allows unauthenticated attackers to exploit insecure…
CVE-2024-11972 in Hunk Companion <1.9.0 allows unauthenticated attackers to exploit insecure REST API endpoints and install vulnerable plugins, risking RCE, SQLi, XSS, and backdoors. - RonF9...
GitHub监控消息提醒!!!
更新了:RCE
描述:xdebug 2.5.5 RCE exploit
URL:https://github.com/D3Ext/XDEBUG-Exploit
标签:#RCE
更新了:RCE
描述:xdebug 2.5.5 RCE exploit
URL:https://github.com/D3Ext/XDEBUG-Exploit
标签:#RCE
GitHub
GitHub - D3Ext/CVE-2015-10141: POC exploit for CVE-2015-10141
POC exploit for CVE-2015-10141. Contribute to D3Ext/CVE-2015-10141 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:xdebug 2.5.5 RCE exploit
URL:https://github.com/D3Ext/xdebug-exploit
标签:#RCE
更新了:RCE
描述:xdebug 2.5.5 RCE exploit
URL:https://github.com/D3Ext/xdebug-exploit
标签:#RCE
GitHub
GitHub - D3Ext/xdebug-exploit: xdebug 2.5.5 RCE exploit
xdebug 2.5.5 RCE exploit. Contribute to D3Ext/xdebug-exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways
URL:https://github.com/sfewer-r7/CVE-2025-0282
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways
URL:https://github.com/sfewer-r7/CVE-2025-0282
标签:#CVE-2025
GitHub
GitHub - sfewer-r7/CVE-2025-0282: PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti…
PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways - sfewer-r7/CVE-2025-0282
GitHub监控消息提醒!!!
更新了:RCE
描述:Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)
URL:https://github.com/watchtowrlabs/CVE-2025-0282
标签:#RCE
更新了:RCE
描述:Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)
URL:https://github.com/watchtowrlabs/CVE-2025-0282
标签:#RCE
GitHub
GitHub - watchtowrlabs/CVE-2025-0282: Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)
Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282) - watchtowrlabs/CVE-2025-0282
GitHub监控消息提醒!!!
更新了:绕过
描述:一个使用Python开发的工具,通过修改gerber内文件的方法来绕过嘉立创白嫖PCB时的拆单检测
URL:https://github.com/zhangMonday/JLC-no-chaidan
标签:#绕过
更新了:绕过
描述:一个使用Python开发的工具,通过修改gerber内文件的方法来绕过嘉立创白嫖PCB时的拆单检测
URL:https://github.com/zhangMonday/JLC-no-chaidan
标签:#绕过
GitHub
GitHub - zhangMonday/JLC-no-chaidan: 一个使用Python开发的工具,通过修改gerber内文件的方法来绕过嘉立创白嫖PCB时的拆单检测
一个使用Python开发的工具,通过修改gerber内文件的方法来绕过嘉立创白嫖PCB时的拆单检测. Contribute to zhangMonday/JLC-no-chaidan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:越权
描述:一个支持被动代理的调用 KIMI AI 进行越权漏洞检测的工具。
URL:https://github.com/Ed1s0nZ/PrivHunterAI
标签:#越权
更新了:越权
描述:一个支持被动代理的调用 KIMI AI 进行越权漏洞检测的工具。
URL:https://github.com/Ed1s0nZ/PrivHunterAI
标签:#越权
GitHub
GitHub - Ed1s0nZ/PrivHunterAI: 一款通过被动代理方式,利用主流 AI(如 Kimi、DeepSeek、GPT 等)检测越权漏洞的工具。其核心检测功能依托相关 AI 引擎的开放 API 构建,支持 HTTPS 协议的数据传输与交互。
一款通过被动代理方式,利用主流 AI(如 Kimi、DeepSeek、GPT 等)检测越权漏洞的工具。其核心检测功能依托相关 AI 引擎的开放 API 构建,支持 HTTPS 协议的数据传输与交互。 - Ed1s0nZ/PrivHunterAI
👍1
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Homemade Aggressor scripts kit for Cobalt Strike
URL:https://github.com/nickvourd/CS-Aggressor-Kit
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Homemade Aggressor scripts kit for Cobalt Strike
URL:https://github.com/nickvourd/CS-Aggressor-Kit
标签:#Cobalt Strike
GitHub
GitHub - nickvourd/CS-Aggressor-Kit: Homemade Aggressor scripts kit for Cobalt Strike
Homemade Aggressor scripts kit for Cobalt Strike. Contribute to nickvourd/CS-Aggressor-Kit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:密探渗透测试工具包含资产信息收集,子域名爆破,搜索语法,资产测绘(FOFA,Hunter,quake, ZoomEye),指纹识别,敏感信息采集,文件扫描、端口扫描、批量信息权重查询、密码字典等功能
URL:https://github.com/haishikeji/QT-JYZ-YY
标签:#信息收集
更新了:信息收集
描述:密探渗透测试工具包含资产信息收集,子域名爆破,搜索语法,资产测绘(FOFA,Hunter,quake, ZoomEye),指纹识别,敏感信息采集,文件扫描、端口扫描、批量信息权重查询、密码字典等功能
URL:https://github.com/haishikeji/QT-JYZ-YY
标签:#信息收集
GitHub
GitHub - haishikeji/QT-JYZ-YY: 加油站运营系统是一个集成了多种功能的综合管理平台,系统提供H5、小程序,支持微信支付、支付宝支付、拉卡拉支付。帮助加油站实现高效、精准的运营管理。该系统涵盖了从员工管理、广告投放(如轮播图广…
加油站运营系统是一个集成了多种功能的综合管理平台,系统提供H5、小程序,支持微信支付、支付宝支付、拉卡拉支付。帮助加油站实现高效、精准的运营管理。该系统涵盖了从员工管理、广告投放(如轮播图广告、优惠活动推广)到油品管理(包括油价、油号列表及油品信息维护)、资金管理(如资金流水监控、拉卡拉分账商户及接收方管理)、订单处理(涵盖订单列表、订单详情查看、退款订单管理)以及客户管理(例如加油卡发行、...
GitHub监控消息提醒!!!
更新了:RCE
描述:A virus that allows you to perform RCE without a central C&C server. Inspired by https://web.archive.org/web/20240630111816/https://pato.pw/SilentFileserver.html
URL:https://github.com/Planetaryauto60/Reverse_C-C
标签:#RCE
更新了:RCE
描述:A virus that allows you to perform RCE without a central C&C server. Inspired by https://web.archive.org/web/20240630111816/https://pato.pw/SilentFileserver.html
URL:https://github.com/Planetaryauto60/Reverse_C-C
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Reproducer for CVE-2025-22620
URL:https://github.com/EliahKagan/checkout-index
标签:#CVE-2025
更新了:CVE-2025
描述:Reproducer for CVE-2025-22620
URL:https://github.com/EliahKagan/checkout-index
标签:#CVE-2025
GitHub
GitHub - EliahKagan/checkout-index: Reproducer for CVE-2025-22620
Reproducer for CVE-2025-22620. Contribute to EliahKagan/checkout-index development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:`EmergencyTookit `是一款专为Windows系统设计的应急响应解决方案,旨在帮助用户在面对系统安全事件、故障排查等紧急情况时,能够迅速、高效地收集关键信息、定位问题根源并采取相应措施。它集合了市面上轻量且优秀的工具,经过精心挑选和优化,以满足应急响应过程中对速度和准确性的严格要求。
URL:https://github.com/XcNgg/EmergencyTookit
标签:#应急响应
更新了:应急响应
描述:`EmergencyTookit `是一款专为Windows系统设计的应急响应解决方案,旨在帮助用户在面对系统安全事件、故障排查等紧急情况时,能够迅速、高效地收集关键信息、定位问题根源并采取相应措施。它集合了市面上轻量且优秀的工具,经过精心挑选和优化,以满足应急响应过程中对速度和准确性的严格要求。
URL:https://github.com/XcNgg/EmergencyTookit
标签:#应急响应
GitHub
GitHub - XcNgg/EmergencyTookit: `EmergencyTookit `是一款专为Windows系统设计的应急响应解决方案,旨在帮助用户在面对系统安全事件、故障排查等紧急情况时,能够迅速、高效地收集关键信息、定位问题根源并采…
`EmergencyTookit `是一款专为Windows系统设计的应急响应解决方案,旨在帮助用户在面对系统安全事件、故障排查等紧急情况时,能够迅速、高效地收集关键信息、定位问题根源并采取相应措施。它集合了市面上轻量且优秀的工具,经过精心挑选和优化,以满足应急响应过程中对速度和准确性的严格要求。 - XcNgg/EmergencyTookit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Python script for examining Ivanti Secure Connect (ICS) event logs, designed to support investigations into vulnerabilities CVE-2025-0282, CVE-2023-46805, and CVE-2024-21887.
URL:https://github.com/Hexastrike/Ivanti-Secure-Connect-Logs-Parser
标签:#CVE-2025
更新了:CVE-2025
描述:A Python script for examining Ivanti Secure Connect (ICS) event logs, designed to support investigations into vulnerabilities CVE-2025-0282, CVE-2023-46805, and CVE-2024-21887.
URL:https://github.com/Hexastrike/Ivanti-Secure-Connect-Logs-Parser
标签:#CVE-2025
GitHub
GitHub - Hexastrike/Ivanti-Connect-Secure-Logs-Parser: A Python script for examining Ivanti Secure Connect (ICS) event logs, designed…
A Python script for examining Ivanti Secure Connect (ICS) event logs, designed to support investigations into vulnerabilities CVE-2025-0282, CVE-2023-46805, and CVE-2024-21887. - Hexastrike/Ivanti-...
GitHub监控消息提醒!!!
更新了:漏洞挖掘
描述:闭源系统半自动漏洞挖掘工具,针对 jar/war/zip 进行静态代码分析,输出从source到sink的可达路径。LLM将验证路径可达性,并根据上下文给出该路径可信分数
URL:https://github.com/TheKingOfDuck/SinkFinder
标签:#漏洞挖掘
更新了:漏洞挖掘
描述:闭源系统半自动漏洞挖掘工具,针对 jar/war/zip 进行静态代码分析,输出从source到sink的可达路径。LLM将验证路径可达性,并根据上下文给出该路径可信分数
URL:https://github.com/TheKingOfDuck/SinkFinder
标签:#漏洞挖掘
GitHub
GitHub - TheKingOfDuck/SinkFinder: 闭源系统半自动漏洞挖掘工具,针对 jar/war/zip 进行静态代码分析,输出从source到sink的可达路径。LLM将验证路径可达性,并根据上下文给出该路径可信分数
闭源系统半自动漏洞挖掘工具,针对 jar/war/zip 进行静态代码分析,输出从source到sink的可达路径。LLM将验证路径可达性,并根据上下文给出该路径可信分数 - TheKingOfDuck/SinkFinder
GitHub监控消息提醒!!!
更新了:信息收集
描述:AutoPen是一款功能强大的自动化渗透测试工具,专为安全研究人员、渗透测试工程师和网络安全爱好者设计。它集成了多种高级安全测试功能,能够自动化完成信息收集、漏洞扫描、安全评估等任务,帮助用户快速发现目标系统中的潜在安全隐患。
URL:https://github.com/pattonant/autopen
标签:#信息收集
更新了:信息收集
描述:AutoPen是一款功能强大的自动化渗透测试工具,专为安全研究人员、渗透测试工程师和网络安全爱好者设计。它集成了多种高级安全测试功能,能够自动化完成信息收集、漏洞扫描、安全评估等任务,帮助用户快速发现目标系统中的潜在安全隐患。
URL:https://github.com/pattonant/autopen
标签:#信息收集
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a Chained RCE in the Havoc C2 framework using github.com/chebuya and github.com/IncludeSecurity pocs
URL:https://github.com/thisisveryfunny/Havoc-C2-RCE
标签:#RCE
更新了:RCE
描述:This is a Chained RCE in the Havoc C2 framework using github.com/chebuya and github.com/IncludeSecurity pocs
URL:https://github.com/thisisveryfunny/Havoc-C2-RCE
标签:#RCE
GitHub
chebuya - Overview
chebuya has 8 repositories available. Follow their code on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A Tool that combines two Havoc CVEs in order to obtain RCE on a havoc C2 server through an SSRF.
URL:https://github.com/Mesumine/Havoc-Hackback
标签:#RCE
更新了:RCE
描述:A Tool that combines two Havoc CVEs in order to obtain RCE on a havoc C2 server through an SSRF.
URL:https://github.com/Mesumine/Havoc-Hackback
标签:#RCE
GitHub
GitHub - Mesumine/Havoc-Hackback: A Tool that combines two Havoc CVEs in order to obtain RCE on a havoc C2 server through an SSRF.
A Tool that combines two Havoc CVEs in order to obtain RCE on a havoc C2 server through an SSRF. - Mesumine/Havoc-Hackback
GitHub监控消息提醒!!!
更新了:RCE
描述:Havoc C2 Teamserver SSRF-RCE chain exploit
URL:https://github.com/EndermanSUPREME/Havoc-C2-SSRF-to-RCE-POC
标签:#RCE
更新了:RCE
描述:Havoc C2 Teamserver SSRF-RCE chain exploit
URL:https://github.com/EndermanSUPREME/Havoc-C2-SSRF-to-RCE-POC
标签:#RCE
GitHub
GitHub - EndermanSUPREME/Havoc-C2-SSRF-to-RCE-POC: Havoc C2 Teamserver SSRF-RCE chain exploit
Havoc C2 Teamserver SSRF-RCE chain exploit. Contribute to EndermanSUPREME/Havoc-C2-SSRF-to-RCE-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This POC chains CVE-2024-41570 and RCE in Havoc C2
URL:https://github.com/Doc-Grinch/Havoc-CVE-2024-41570-and-RCE
标签:#RCE
更新了:RCE
描述:This POC chains CVE-2024-41570 and RCE in Havoc C2
URL:https://github.com/Doc-Grinch/Havoc-CVE-2024-41570-and-RCE
标签:#RCE