GitHub监控消息提醒!!!
更新了:RCE
描述:Sensor for fetching RCE price from external API
URL:https://github.com/dawmagoo/rce-price-sensor
标签:#RCE
更新了:RCE
描述:Sensor for fetching RCE price from external API
URL:https://github.com/dawmagoo/rce-price-sensor
标签:#RCE
GitHub
GitHub - dawmagoo/rce-price-sensor: Sensor for fetching RCE price from external API
Sensor for fetching RCE price from external API. Contribute to dawmagoo/rce-price-sensor development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This project is a deliberately vulnerable Flask web application designed to demonstrate Insecure Deserialization attacks, including Privilege Escalation & Remote Code Execution (RCE).
URL:https://github.com/Sudo-Sakib/Insecure-Deserialization-Lab
标签:#RCE
更新了:RCE
描述:This project is a deliberately vulnerable Flask web application designed to demonstrate Insecure Deserialization attacks, including Privilege Escalation & Remote Code Execution (RCE).
URL:https://github.com/Sudo-Sakib/Insecure-Deserialization-Lab
标签:#RCE
GitHub
GitHub - Sudo-Sakib/Insecure-Deserialization-Lab: This project is a deliberately vulnerable Flask web application designed to demonstrate…
This project is a deliberately vulnerable Flask web application designed to demonstrate Insecure Deserialization attacks, including Privilege Escalation & Remote Code Execution (RCE). - Sud...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: Detects an authentication bypass vulnerability in Palo Alto PAN-OS (CVE-2025-0108).
URL:https://github.com/fr4nc1stein/CVE-2025-0108-SCAN
标签:#CVE-2025
更新了:CVE-2025
描述: Detects an authentication bypass vulnerability in Palo Alto PAN-OS (CVE-2025-0108).
URL:https://github.com/fr4nc1stein/CVE-2025-0108-SCAN
标签:#CVE-2025
GitHub
GitHub - fr4nc1stein/CVE-2025-0108-SCAN: Detects an authentication bypass vulnerability in Palo Alto PAN-OS (CVE-2025-0108).
Detects an authentication bypass vulnerability in Palo Alto PAN-OS (CVE-2025-0108). - fr4nc1stein/CVE-2025-0108-SCAN
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: Detects an authentication bypass vulnerability in Palo Alto PAN-OS (CVE-2025-0108).
URL:https://github.com/rootharpy/CVE-2025-25163-Nuclei-Template
标签:#CVE-2025
更新了:CVE-2025
描述: Detects an authentication bypass vulnerability in Palo Alto PAN-OS (CVE-2025-0108).
URL:https://github.com/rootharpy/CVE-2025-25163-Nuclei-Template
标签:#CVE-2025
GitHub
GitHub - RootHarpy/CVE-2025-25163-Nuclei-Template: This repository features a Nuclei template specifically designed to detect the…
This repository features a Nuclei template specifically designed to detect the Path Traversal vulnerability (CVE-2025-25163) in the Plugin A/B Image Optimizer for WordPress. This vulnerability pose...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-26466 POC
URL:https://github.com/walidpyh/CVE-2025-26466
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-26466 POC
URL:https://github.com/walidpyh/CVE-2025-26466
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Bash implementation of IPFire 2.19 RCE PoC
URL:https://github.com/davimoreno/ipfire_rce
标签:#RCE
更新了:RCE
描述:Bash implementation of IPFire 2.19 RCE PoC
URL:https://github.com/davimoreno/ipfire_rce
标签:#RCE
GitHub
GitHub - davimoreno/ipfire_rce: Bash implementation of IPFire 2.19 RCE PoC
Bash implementation of IPFire 2.19 RCE PoC. Contribute to davimoreno/ipfire_rce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:NSE script that checks for CVE-2025-0108 vulnerability in Palo Alto Networks PAN-OS
URL:https://github.com/becrevex/CVE-2025-0108
标签:#CVE-2025
更新了:CVE-2025
描述:NSE script that checks for CVE-2025-0108 vulnerability in Palo Alto Networks PAN-OS
URL:https://github.com/becrevex/CVE-2025-0108
标签:#CVE-2025
GitHub
GitHub - becrevex/CVE-2025-0108: NSE script that checks for CVE-2025-0108 vulnerability in Palo Alto Networks PAN-OS
NSE script that checks for CVE-2025-0108 vulnerability in Palo Alto Networks PAN-OS - becrevex/CVE-2025-0108
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploiting a vulnerability in Windows Disk Cleanup to elevate privileges and provide access to protected data in Edge by bypassing the security feature. CVE-2025-21420 and CVE-2025-21401.
URL:https://github.com/toxy4ny/edge-maradeur
标签:#CVE-2025
更新了:CVE-2025
描述:Exploiting a vulnerability in Windows Disk Cleanup to elevate privileges and provide access to protected data in Edge by bypassing the security feature. CVE-2025-21420 and CVE-2025-21401.
URL:https://github.com/toxy4ny/edge-maradeur
标签:#CVE-2025
GitHub
GitHub - toxy4ny/edge-maradeur: Exploiting a vulnerability in Windows Disk Cleanup to elevate privileges and provide access to…
Exploiting a vulnerability in Windows Disk Cleanup to elevate privileges and provide access to protected data in Edge by bypassing the security feature. CVE-2025-21420 and CVE-2025-21401. - toxy4ny...
GitHub监控消息提醒!!!
更新了:RCE
描述:OpenSSH 7.2p2 - Username Enumeration & Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated)
URL:https://github.com/Ed-Neema/Ethical_Hacking-Challenge3
标签:#RCE
更新了:RCE
描述:OpenSSH 7.2p2 - Username Enumeration & Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated)
URL:https://github.com/Ed-Neema/Ethical_Hacking-Challenge3
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24971 exploit
URL:https://github.com/be4zad/CVE-2025-24971
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24971 exploit
URL:https://github.com/be4zad/CVE-2025-24971
标签:#CVE-2025
GitHub
GitHub - be4zad/CVE-2025-24971: CVE-2025-24971 exploit
CVE-2025-24971 exploit. Contribute to be4zad/CVE-2025-24971 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Over 207,000 Remote Code Execution (RCE) payloads
URL:https://github.com/inpentest/rce
标签:#RCE
更新了:RCE
描述:Over 207,000 Remote Code Execution (RCE) payloads
URL:https://github.com/inpentest/rce
标签:#RCE
GitHub
GitHub - kabiri-labs/rcpayloadgen: RCEPayloadGen - Advanced RCE Payload Generator - Over 16500 Remote Code Execution (RCE) payloads
RCEPayloadGen - Advanced RCE Payload Generator - Over 16500 Remote Code Execution (RCE) payloads - kabiri-labs/rcpayloadgen
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24016: RCE in Wazuh server! Remote Code Execution
URL:https://github.com/MuhammadWaseem29/CVE-2025-24016
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24016: RCE in Wazuh server! Remote Code Execution
URL:https://github.com/MuhammadWaseem29/CVE-2025-24016
标签:#CVE-2025
GitHub
GitHub - MuhammadWaseem29/CVE-2025-24016: CVE-2025-24016: RCE in Wazuh server! Remote Code Execution
CVE-2025-24016: RCE in Wazuh server! Remote Code Execution - GitHub - MuhammadWaseem29/CVE-2025-24016: CVE-2025-24016: RCE in Wazuh server! Remote Code Execution
GitHub监控消息提醒!!!
更新了:渗透测试
描述:基于 Vue + SpringBoot 构建的 Java 安全靶场,一个专为安全爱好者、开发人员和渗透测试人员打造的实战演练平台。
URL:https://github.com/bansh2eBreak/SpringVulnBoot-backend
标签:#渗透测试
更新了:渗透测试
描述:基于 Vue + SpringBoot 构建的 Java 安全靶场,一个专为安全爱好者、开发人员和渗透测试人员打造的实战演练平台。
URL:https://github.com/bansh2eBreak/SpringVulnBoot-backend
标签:#渗透测试
GitHub
GitHub - bansh2eBreak/SpringVulnBoot-backend: 基于 Vue + SpringBoot 构建的 Java 安全靶场,一个专为安全爱好者、渗透测试和代码审计人员打造的前后端分离的实战演练平台。
基于 Vue + SpringBoot 构建的 Java 安全靶场,一个专为安全爱好者、渗透测试和代码审计人员打造的前后端分离的实战演练平台。 - bansh2eBreak/SpringVulnBoot-backend
👍1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Patch Manual para a correção das CVE-2025-26465-e-CVE-2025-26466, para sistemas sem update do OpenSSH
URL:https://github.com/dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466
标签:#CVE-2025
更新了:CVE-2025
描述:Patch Manual para a correção das CVE-2025-26465-e-CVE-2025-26466, para sistemas sem update do OpenSSH
URL:https://github.com/dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466
标签:#CVE-2025
GitHub
GitHub - dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466: Patch Manual para a correção das CVE-2025-26465-e-CVE-2025-26466…
Patch Manual para a correção das CVE-2025-26465-e-CVE-2025-26466, para sistemas sem update do OpenSSH - dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-26794: SQLite (DBM) injection in Exim 4.98 - exploit writeup
URL:https://github.com/OscarBataille/CVE-2025-26794
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-26794: SQLite (DBM) injection in Exim 4.98 - exploit writeup
URL:https://github.com/OscarBataille/CVE-2025-26794
标签:#CVE-2025
GitHub
GitHub - OscarBataille/CVE-2025-26794: CVE-2025-26794: Blind SQL injection in Exim 4.98 (SQLite DBM)- exploit writeup
CVE-2025-26794: Blind SQL injection in Exim 4.98 (SQLite DBM)- exploit writeup - OscarBataille/CVE-2025-26794
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-26794: SQLite (DBM) injection in Exim 4.98 - exploit writeup
URL:https://github.com/Joe-RayG/CVE-2025-24085-Disclosure
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-26794: SQLite (DBM) injection in Exim 4.98 - exploit writeup
URL:https://github.com/Joe-RayG/CVE-2025-24085-Disclosure
标签:#CVE-2025
GitHub
GitHub - Joe-RayG/CVE-2025-24085-Disclosure: Formal disclosure of CVE-2025-24085 – a critical zero-click remote code execution…
Formal disclosure of CVE-2025-24085 – a critical zero-click remote code execution (RCE) vulnerability affecting iMessage on iOS 18.2.1 (iPhone 14 Pro Max) and iOS 18.3.1 (iPhone 15 Pro Max). Apple ...
GitHub监控消息提醒!!!
更新了:sql注入
描述:ruuoyi_vulnscan 是一款基于 Python 和 Tkinter 开发的图形化界面工具,用于检测若依 Vue 框架应用程序中的常见漏洞。该工具提供了多种漏洞检测模块,包括 Swagger 检测、Druid 检测、文件下载漏洞检测、SQL 注入检测、定时任务漏洞检测和任意密码修改漏洞检测等,同时支持全面检测和扫描停止、结果清空等操作。
URL:https://github.com/steveopen1/ruoyi_vulnscan
标签:#sql注入
更新了:sql注入
描述:ruuoyi_vulnscan 是一款基于 Python 和 Tkinter 开发的图形化界面工具,用于检测若依 Vue 框架应用程序中的常见漏洞。该工具提供了多种漏洞检测模块,包括 Swagger 检测、Druid 检测、文件下载漏洞检测、SQL 注入检测、定时任务漏洞检测和任意密码修改漏洞检测等,同时支持全面检测和扫描停止、结果清空等操作。
URL:https://github.com/steveopen1/ruoyi_vulnscan
标签:#sql注入
GitHub
GitHub - steveopen1/ruoyi_vulnscan: ruuoyi_vulnscan 是一款基于 Python 和 Tkinter 开发的图形化界面工具,用于检测若依 Vue 框架应用程序中的常见漏洞。该工具提供了多种漏洞检测模块,包括…
ruuoyi_vulnscan 是一款基于 Python 和 Tkinter 开发的图形化界面工具,用于检测若依 Vue 框架应用程序中的常见漏洞。该工具提供了多种漏洞检测模块,包括 Swagger 检测、Druid 检测、文件下载漏洞检测、SQL 注入检测、定时任务漏洞检测和任意密码修改漏洞检测等,同时支持全面检测和扫描停止、结果清空等操作。 - steveopen1/ruoyi_vuln...
GitHub监控消息提醒!!!
更新了:信息收集
描述:一种基于playwright对招标网进行水务信息收集工作的爬虫
URL:https://github.com/xiedaoyuan/water-affairs-crawl
标签:#信息收集
更新了:信息收集
描述:一种基于playwright对招标网进行水务信息收集工作的爬虫
URL:https://github.com/xiedaoyuan/water-affairs-crawl
标签:#信息收集
GitHub
GitHub - xiedaoyuan/water-affairs-crawl: 一种基于playwright对招标网进行水务信息收集工作的爬虫
一种基于playwright对招标网进行水务信息收集工作的爬虫. Contribute to xiedaoyuan/water-affairs-crawl development by creating an account on GitHub.