GitHub监控消息提醒!!!
更新了:CVE-2025
描述:7-Zip Mark-of-the-Web绕过漏洞PoC(CVE-2025-0411)
URL:https://github.com/iSee857/CVE-2025-0411-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:7-Zip Mark-of-the-Web绕过漏洞PoC(CVE-2025-0411)
URL:https://github.com/iSee857/CVE-2025-0411-PoC
标签:#CVE-2025
GitHub
GitHub - iSee857/CVE-2025-0411-PoC: 7-Zip Mark-of-the-Web绕过漏洞PoC(CVE-2025-0411)
7-Zip Mark-of-the-Web绕过漏洞PoC(CVE-2025-0411). Contribute to iSee857/CVE-2025-0411-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Webmin Exploit (RCE Leading to Root Privilege Escalation)
URL:https://github.com/enisecur1ty/Webmin-RCE-Leading-to-Root-Privilege-Escalation
标签:#RCE
更新了:RCE
描述:Webmin Exploit (RCE Leading to Root Privilege Escalation)
URL:https://github.com/enisecur1ty/Webmin-RCE-Leading-to-Root-Privilege-Escalation
标签:#RCE
GitHub
GitHub - enisecur1ty/Webmin-RCE-Leading-to-Root-Privilege-Escalation: Webmin Exploit (RCE Leading to Root Privilege Escalation)
Webmin Exploit (RCE Leading to Root Privilege Escalation) - enisecur1ty/Webmin-RCE-Leading-to-Root-Privilege-Escalation
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/x86-512/VXpp
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/x86-512/VXpp
标签:#RCE
GitHub
GitHub - x86-512/VXpp: VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming…
VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advanced security protections like Intel CET and Control-Flow Gua...
👍1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Ivanti Connect Secure, Policy Secure & ZTA Gateways - CVE-2025-0282
URL:https://github.com/AdaniKamal/CVE-2025-0282
标签:#CVE-2025
更新了:CVE-2025
描述:Ivanti Connect Secure, Policy Secure & ZTA Gateways - CVE-2025-0282
URL:https://github.com/AdaniKamal/CVE-2025-0282
标签:#CVE-2025
GitHub
GitHub - AdaniKamal/CVE-2025-0282: Ivanti Connect Secure, Policy Secure & ZTA Gateways - CVE-2025-0282
Ivanti Connect Secure, Policy Secure & ZTA Gateways - CVE-2025-0282 - AdaniKamal/CVE-2025-0282
GitHub监控消息提醒!!!
更新了:漏洞验证
描述:针对JWT渗透开发的漏洞验证/密钥爆破工具,针对CVE-2015-9235/未验证签名攻击/CVE-2016-10555/CVE-2018-0114/CVE-2020-28042的结果生成用于FUZZ,也可使用字典/字符枚举(包括JJWT)的方式进行爆破
URL:https://github.com/z-bool/Venom-JWT
标签:#漏洞验证
更新了:漏洞验证
描述:针对JWT渗透开发的漏洞验证/密钥爆破工具,针对CVE-2015-9235/未验证签名攻击/CVE-2016-10555/CVE-2018-0114/CVE-2020-28042的结果生成用于FUZZ,也可使用字典/字符枚举(包括JJWT)的方式进行爆破
URL:https://github.com/z-bool/Venom-JWT
标签:#漏洞验证
GitHub
GitHub - z-bool/Venom-JWT: 针对JWT渗透开发的漏洞验证/密钥爆破工具,针对CVE-2015-9235/空白密钥/未验证签名攻击/CVE-2016-10555/CVE-2018-0114/CVE-2020-28042的结果生成…
针对JWT渗透开发的漏洞验证/密钥爆破工具,针对CVE-2015-9235/空白密钥/未验证签名攻击/CVE-2016-10555/CVE-2018-0114/CVE-2020-28042的结果生成用于FUZZ,也可使用字典/字符枚举(包括JJWT)的方式进行爆破(JWT Crack) - z-bool/Venom-JWT
GitHub监控消息提醒!!!
更新了:绕过
描述:绕过 Cursor 设备限制、禁止 Cursor 自动更新脚本
URL:https://github.com/W1ndys/CursorCrackScript
标签:#绕过
更新了:绕过
描述:绕过 Cursor 设备限制、禁止 Cursor 自动更新脚本
URL:https://github.com/W1ndys/CursorCrackScript
标签:#绕过
GitHub
GitHub - W1ndys/CursorCrackScript: 绕过 Cursor 设备限制、禁止 Cursor 自动更新脚本
绕过 Cursor 设备限制、禁止 Cursor 自动更新脚本. Contribute to W1ndys/CursorCrackScript development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:ICP_FLASK_YOLOY11是一个基于深度学习的目标检测和图像比对系统,结合了YOLOv11(YOLO系列目标检测)和Siamese网络(图像相似度比对)技术,开发的关于 ICP 域名查询的api接口。。该项目通过深度学习识别验证码,可以自完成验证码的绕过,从而查询域名是否已经进行 ICP 备案的功能。
URL:https://github.com/mBigFish/ICP_FLASK_YOLOY11
标签:#绕过
更新了:绕过
描述:ICP_FLASK_YOLOY11是一个基于深度学习的目标检测和图像比对系统,结合了YOLOv11(YOLO系列目标检测)和Siamese网络(图像相似度比对)技术,开发的关于 ICP 域名查询的api接口。。该项目通过深度学习识别验证码,可以自完成验证码的绕过,从而查询域名是否已经进行 ICP 备案的功能。
URL:https://github.com/mBigFish/ICP_FLASK_YOLOY11
标签:#绕过
GitHub
GitHub - mBigFish/ICP_FLASK_YOLOY11: ICP_FLASK_YOLOY11是一个基于深度学习的目标检测和图像比对系统,结合了YOLOv11(YOLO系列目标检测)和Siamese网络(图像相似度比对)技术,开发的关于 ICP…
ICP_FLASK_YOLOY11是一个基于深度学习的目标检测和图像比对系统,结合了YOLOv11(YOLO系列目标检测)和Siamese网络(图像相似度比对)技术,开发的关于 ICP 域名查询的api接口。。该项目通过深度学习识别验证码,可以自完成验证码的绕过,从而查询域名是否已经进行 ICP 备案的功能。 - mBigFish/ICP_FLASK_YOLOY11
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24085: Incorrect Default Permissions (CWE-276)
URL:https://github.com/clidancc1/CVE-2025-24085
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24085: Incorrect Default Permissions (CWE-276)
URL:https://github.com/clidancc1/CVE-2025-24085
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24085: Incorrect Default Permissions (CWE-276)
URL:https://github.com/bronsoneaver/CVE-2025-24085
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24085: Incorrect Default Permissions (CWE-276)
URL:https://github.com/bronsoneaver/CVE-2025-24085
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:All assignments for RCET3371
URL:https://github.com/andrew1593571/RCET3371
标签:#RCE
更新了:RCE
描述:All assignments for RCET3371
URL:https://github.com/andrew1593571/RCET3371
标签:#RCE
GitHub
GitHub - andrew1593571/RCET3371: All assignments for RCET3371
All assignments for RCET3371. Contribute to andrew1593571/RCET3371 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:What spatial scales does RCE apply? A data analysis project.
URL:https://github.com/amatthews20/RCE_project
标签:#RCE
更新了:RCE
描述:What spatial scales does RCE apply? A data analysis project.
URL:https://github.com/amatthews20/RCE_project
标签:#RCE
GitHub
GitHub - amatthews20/RCE_project: What spatial scales does RCE apply? A data analysis project.
What spatial scales does RCE apply? A data analysis project. - amatthews20/RCE_project
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-24587
URL:https://github.com/DoTTak/CVE-2025-24587
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-24587
URL:https://github.com/DoTTak/CVE-2025-24587
标签:#CVE-2025
GitHub
GitHub - DoTTak/CVE-2025-24587: PoC of CVE-2025-24587
PoC of CVE-2025-24587. Contribute to DoTTak/CVE-2025-24587 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-24659
URL:https://github.com/DoTTak/CVE-2025-24659
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-24659
URL:https://github.com/DoTTak/CVE-2025-24659
标签:#CVE-2025
GitHub
GitHub - DoTTak/CVE-2025-24659: PoC of CVE-2025-24659
PoC of CVE-2025-24659. Contribute to DoTTak/CVE-2025-24659 development by creating an account on GitHub.