GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A critical SQL Injection vulnerability (CVE-2025-25964) discovered in the School Information Management System v1.0
URL:https://github.com/Sudo-Sakib/CVE-2025-25965
标签:#CVE-2025
更新了:CVE-2025
描述:A critical SQL Injection vulnerability (CVE-2025-25964) discovered in the School Information Management System v1.0
URL:https://github.com/Sudo-Sakib/CVE-2025-25965
标签:#CVE-2025
GitHub
GitHub - Sudo-Sakib/CVE-2025-25965: CVE-2025-25965 is a newly discovered CSRF vulnerability in the Phpgurukul Online Banquet Booking…
CVE-2025-25965 is a newly discovered CSRF vulnerability in the Phpgurukul Online Banquet Booking System v1.2, allowing remote attackers to change a user’s email address without their consent by exp...
GitHub监控消息提醒!!!
更新了:RCE
描述:POC for CVE-2024-42327: Zabbix Privilege Escalation -> RCE
URL:https://github.com/godylockz/CVE-2024-42327
标签:#RCE
更新了:RCE
描述:POC for CVE-2024-42327: Zabbix Privilege Escalation -> RCE
URL:https://github.com/godylockz/CVE-2024-42327
标签:#RCE
GitHub
GitHub - godylockz/CVE-2024-42327: POC for CVE-2024-42327: Zabbix Privilege Escalation -> RCE
POC for CVE-2024-42327: Zabbix Privilege Escalation -> RCE - godylockz/CVE-2024-42327
👍1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24016
URL:https://github.com/0xjessie21/CVE-2025-24016
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24016
URL:https://github.com/0xjessie21/CVE-2025-24016
标签:#CVE-2025
GitHub
GitHub - 0xjessie21/CVE-2025-24016: CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)
CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE) - 0xjessie21/CVE-2025-24016
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike UAC bypass bofs
URL:https://github.com/lineeralgebra/fodhelper_bypassBOFS
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike UAC bypass bofs
URL:https://github.com/lineeralgebra/fodhelper_bypassBOFS
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:攻防
描述:模拟网络攻防系统dos攻击恶意请求攻击分布式拒绝服务攻击模拟网络攻防系统dos攻击恶意请求攻击分布式拒绝服务攻击模拟网络攻防系统dos攻击恶意请求攻击分布式拒绝服务攻击
URL:https://github.com/Pratikshiku/HIxChGyEnyid
标签:#攻防
更新了:攻防
描述:模拟网络攻防系统dos攻击恶意请求攻击分布式拒绝服务攻击模拟网络攻防系统dos攻击恶意请求攻击分布式拒绝服务攻击模拟网络攻防系统dos攻击恶意请求攻击分布式拒绝服务攻击
URL:https://github.com/Pratikshiku/HIxChGyEnyid
标签:#攻防
GitHub
GitHub - Pratikshiku/HIxChGyEnyid: 模拟网络攻防系统dos攻击恶意请求攻击分布式拒绝服务攻击模拟网络攻防系统dos攻击恶意请求攻击分布式拒绝服务攻击模拟网络攻防系统dos攻击恶意请求攻击分布式拒绝服务攻击
模拟网络攻防系统dos攻击恶意请求攻击分布式拒绝服务攻击模拟网络攻防系统dos攻击恶意请求攻击分布式拒绝服务攻击模拟网络攻防系统dos攻击恶意请求攻击分布式拒绝服务攻击 - Pratikshiku/HIxChGyEnyid
GitHub监控消息提醒!!!
更新了:弱口令
描述:一个AI分类系统来区分弱口令、Token和普通文本
URL:https://github.com/lao1a0/Sensitive-leakage-detection
标签:#弱口令
更新了:弱口令
描述:一个AI分类系统来区分弱口令、Token和普通文本
URL:https://github.com/lao1a0/Sensitive-leakage-detection
标签:#弱口令
GitHub监控消息提醒!!!
更新了:RCE
描述:POC for CVE-2021-44967 LImeSurvey RCE
URL:https://github.com/godylockz/CVE-2021-44967
标签:#RCE
更新了:RCE
描述:POC for CVE-2021-44967 LImeSurvey RCE
URL:https://github.com/godylockz/CVE-2021-44967
标签:#RCE
GitHub
GitHub - godylockz/CVE-2021-44967: POC for CVE-2021-44967: LimeSurvey RCE
POC for CVE-2021-44967: LimeSurvey RCE. Contribute to godylockz/CVE-2021-44967 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:sql注入
描述:一个ssrf的综合靶场,包含RCE,SQL注入,Tomcat,Redis,MySQL提权等ssrf攻击场景
URL:https://github.com/ProbiusOfficial/ssrf-labs
标签:#sql注入
更新了:sql注入
描述:一个ssrf的综合靶场,包含RCE,SQL注入,Tomcat,Redis,MySQL提权等ssrf攻击场景
URL:https://github.com/ProbiusOfficial/ssrf-labs
标签:#sql注入
GitHub
GitHub - ProbiusOfficial/ssrf-labs: 一个ssrf的综合靶场,包含RCE,SQL注入,Tomcat,Redis,MySQL提权等ssrf攻击场景
一个ssrf的综合靶场,包含RCE,SQL注入,Tomcat,Redis,MySQL提权等ssrf攻击场景 - ProbiusOfficial/ssrf-labs
GitHub监控消息提醒!!!
更新了:RCE
描述:Sensor for fetching RCE price from external API
URL:https://github.com/dawmagoo/rce-price-sensor
标签:#RCE
更新了:RCE
描述:Sensor for fetching RCE price from external API
URL:https://github.com/dawmagoo/rce-price-sensor
标签:#RCE
GitHub
GitHub - dawmagoo/rce-price-sensor: Sensor for fetching RCE price from external API
Sensor for fetching RCE price from external API. Contribute to dawmagoo/rce-price-sensor development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This project is a deliberately vulnerable Flask web application designed to demonstrate Insecure Deserialization attacks, including Privilege Escalation & Remote Code Execution (RCE).
URL:https://github.com/Sudo-Sakib/Insecure-Deserialization-Lab
标签:#RCE
更新了:RCE
描述:This project is a deliberately vulnerable Flask web application designed to demonstrate Insecure Deserialization attacks, including Privilege Escalation & Remote Code Execution (RCE).
URL:https://github.com/Sudo-Sakib/Insecure-Deserialization-Lab
标签:#RCE
GitHub
GitHub - Sudo-Sakib/Insecure-Deserialization-Lab: This project is a deliberately vulnerable Flask web application designed to demonstrate…
This project is a deliberately vulnerable Flask web application designed to demonstrate Insecure Deserialization attacks, including Privilege Escalation & Remote Code Execution (RCE). - Sud...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: Detects an authentication bypass vulnerability in Palo Alto PAN-OS (CVE-2025-0108).
URL:https://github.com/fr4nc1stein/CVE-2025-0108-SCAN
标签:#CVE-2025
更新了:CVE-2025
描述: Detects an authentication bypass vulnerability in Palo Alto PAN-OS (CVE-2025-0108).
URL:https://github.com/fr4nc1stein/CVE-2025-0108-SCAN
标签:#CVE-2025
GitHub
GitHub - fr4nc1stein/CVE-2025-0108-SCAN: Detects an authentication bypass vulnerability in Palo Alto PAN-OS (CVE-2025-0108).
Detects an authentication bypass vulnerability in Palo Alto PAN-OS (CVE-2025-0108). - fr4nc1stein/CVE-2025-0108-SCAN
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: Detects an authentication bypass vulnerability in Palo Alto PAN-OS (CVE-2025-0108).
URL:https://github.com/rootharpy/CVE-2025-25163-Nuclei-Template
标签:#CVE-2025
更新了:CVE-2025
描述: Detects an authentication bypass vulnerability in Palo Alto PAN-OS (CVE-2025-0108).
URL:https://github.com/rootharpy/CVE-2025-25163-Nuclei-Template
标签:#CVE-2025
GitHub
GitHub - RootHarpy/CVE-2025-25163-Nuclei-Template: This repository features a Nuclei template specifically designed to detect the…
This repository features a Nuclei template specifically designed to detect the Path Traversal vulnerability (CVE-2025-25163) in the Plugin A/B Image Optimizer for WordPress. This vulnerability pose...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-26466 POC
URL:https://github.com/walidpyh/CVE-2025-26466
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-26466 POC
URL:https://github.com/walidpyh/CVE-2025-26466
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Bash implementation of IPFire 2.19 RCE PoC
URL:https://github.com/davimoreno/ipfire_rce
标签:#RCE
更新了:RCE
描述:Bash implementation of IPFire 2.19 RCE PoC
URL:https://github.com/davimoreno/ipfire_rce
标签:#RCE
GitHub
GitHub - davimoreno/ipfire_rce: Bash implementation of IPFire 2.19 RCE PoC
Bash implementation of IPFire 2.19 RCE PoC. Contribute to davimoreno/ipfire_rce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:NSE script that checks for CVE-2025-0108 vulnerability in Palo Alto Networks PAN-OS
URL:https://github.com/becrevex/CVE-2025-0108
标签:#CVE-2025
更新了:CVE-2025
描述:NSE script that checks for CVE-2025-0108 vulnerability in Palo Alto Networks PAN-OS
URL:https://github.com/becrevex/CVE-2025-0108
标签:#CVE-2025
GitHub
GitHub - becrevex/CVE-2025-0108: NSE script that checks for CVE-2025-0108 vulnerability in Palo Alto Networks PAN-OS
NSE script that checks for CVE-2025-0108 vulnerability in Palo Alto Networks PAN-OS - becrevex/CVE-2025-0108
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploiting a vulnerability in Windows Disk Cleanup to elevate privileges and provide access to protected data in Edge by bypassing the security feature. CVE-2025-21420 and CVE-2025-21401.
URL:https://github.com/toxy4ny/edge-maradeur
标签:#CVE-2025
更新了:CVE-2025
描述:Exploiting a vulnerability in Windows Disk Cleanup to elevate privileges and provide access to protected data in Edge by bypassing the security feature. CVE-2025-21420 and CVE-2025-21401.
URL:https://github.com/toxy4ny/edge-maradeur
标签:#CVE-2025
GitHub
GitHub - toxy4ny/edge-maradeur: Exploiting a vulnerability in Windows Disk Cleanup to elevate privileges and provide access to…
Exploiting a vulnerability in Windows Disk Cleanup to elevate privileges and provide access to protected data in Edge by bypassing the security feature. CVE-2025-21420 and CVE-2025-21401. - toxy4ny...
GitHub监控消息提醒!!!
更新了:RCE
描述:OpenSSH 7.2p2 - Username Enumeration & Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated)
URL:https://github.com/Ed-Neema/Ethical_Hacking-Challenge3
标签:#RCE
更新了:RCE
描述:OpenSSH 7.2p2 - Username Enumeration & Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated)
URL:https://github.com/Ed-Neema/Ethical_Hacking-Challenge3
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24971 exploit
URL:https://github.com/be4zad/CVE-2025-24971
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24971 exploit
URL:https://github.com/be4zad/CVE-2025-24971
标签:#CVE-2025
GitHub
GitHub - be4zad/CVE-2025-24971: CVE-2025-24971 exploit
CVE-2025-24971 exploit. Contribute to be4zad/CVE-2025-24971 development by creating an account on GitHub.