GitHub监控消息提醒!!!
更新了:CVE-2025
描述:KQL para deteccion de CVE-2025-21333 en Sentinel
URL:https://github.com/aleongx/KQL_sentinel_CVE-2025-21333
标签:#CVE-2025
更新了:CVE-2025
描述:KQL para deteccion de CVE-2025-21333 en Sentinel
URL:https://github.com/aleongx/KQL_sentinel_CVE-2025-21333
标签:#CVE-2025
GitHub
GitHub - aleongx/KQL_sentinel_CVE-2025-21333: KQL para deteccion de CVE-2025-21333 en Sentinel
KQL para deteccion de CVE-2025-21333 en Sentinel. Contribute to aleongx/KQL_sentinel_CVE-2025-21333 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for CVE-2025-26240
URL:https://github.com/Habuon/CVE-2025-26240
标签:#CVE-2025
更新了:CVE-2025
描述:POC for CVE-2025-26240
URL:https://github.com/Habuon/CVE-2025-26240
标签:#CVE-2025
GitHub
GitHub - Habuon/CVE-2025-26240: POC for CVE-2025-26240
POC for CVE-2025-26240. Contribute to Habuon/CVE-2025-26240 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:RCE
描述:SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)
URL:https://github.com/mohamed-ali-youssef/SOPlanning-1.52.01
标签:#RCE
更新了:RCE
描述:SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)
URL:https://github.com/mohamed-ali-youssef/SOPlanning-1.52.01
标签:#RCE
GitHub
GitHub - mohamed-ali-youssef/SOPlanning-1.52.01: SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE)…
SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) - mohamed-ali-youssef/SOPlanning-1.52.01
GitHub监控消息提醒!!!
更新了:RCE
描述:AI-Assisted Tools for RCE Vulnerability Test, Discovery & Exploitation
URL:https://github.com/Michael-Obs66/BlackClown
标签:#RCE
更新了:RCE
描述:AI-Assisted Tools for RCE Vulnerability Test, Discovery & Exploitation
URL:https://github.com/Michael-Obs66/BlackClown
标签:#RCE
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Secondary development function(毕业设计-基于Gophish的钓鱼渗透测试平台)
URL:https://github.com/L-69/gophish_2development
标签:#渗透测试
更新了:渗透测试
描述:Secondary development function(毕业设计-基于Gophish的钓鱼渗透测试平台)
URL:https://github.com/L-69/gophish_2development
标签:#渗透测试
GitHub
GitHub - L-69/gophish_2development: Secondary development function(毕业设计-基于Gophish的钓鱼渗透测试平台)
Secondary development function(毕业设计-基于Gophish的钓鱼渗透测试平台) - L-69/gophish_2development
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)
URL:https://github.com/iSee857/CVE-2025-24813-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)
URL:https://github.com/iSee857/CVE-2025-24813-PoC
标签:#CVE-2025
GitHub
GitHub - iSee857/CVE-2025-24813-PoC: Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)
Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813). Contribute to iSee857/CVE-2025-24813-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:一种绕过杀软加载执行远程powershell命令的badusb制作方法
URL:https://github.com/xmexg/winbadusb
标签:#绕过
更新了:绕过
描述:一种绕过杀软加载执行远程powershell命令的badusb制作方法
URL:https://github.com/xmexg/winbadusb
标签:#绕过
GitHub
GitHub - xmexg/winbadusb: 一种绕过杀软加载执行远程powershell命令的badusb制作方法
一种绕过杀软加载执行远程powershell命令的badusb制作方法. Contribute to xmexg/winbadusb development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:大禹:Android App崩溃信息收集以及可配置动态治理
URL:https://github.com/xunmaw001/Collection-and-selection-system-for-ideological-and-political-elements-in-courses
标签:#信息收集
更新了:信息收集
描述:大禹:Android App崩溃信息收集以及可配置动态治理
URL:https://github.com/xunmaw001/Collection-and-selection-system-for-ideological-and-political-elements-in-courses
标签:#信息收集
GitHub
GitHub - xunmaw001/Collection-and-selection-system-for-ideological-and-political-elements-in-courses: 基于 SSM(Spring、Spring MVC…
基于 SSM(Spring、Spring MVC、MyBatis)的课程思政元素收集遴选系统,依托 SSM 框架保障稳定高效运行。教师可上传思政元素案例,涵盖名人故事、时事热点等,为课程注入思政活力。系统支持对元素进行分类管理、关键词搜索,方便快速查找。具备审核机制,确保元素质量与适用性。利用 MyBatis 实现数据的存储与管理,保障信息安全。通过该系统,能有效整合思政资源,助力教师在教学...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Evil-Droid 是一款专为 Android 平台设计的自动化渗透测试框架,由原开发者Mascerano Bachir 维护,现有国区开发者sethaion维护
URL:https://github.com/SethAion/Evil-Droid_CN-sethaion
标签:#渗透测试
更新了:渗透测试
描述:Evil-Droid 是一款专为 Android 平台设计的自动化渗透测试框架,由原开发者Mascerano Bachir 维护,现有国区开发者sethaion维护
URL:https://github.com/SethAion/Evil-Droid_CN-sethaion
标签:#渗透测试
GitHub
GitHub - SethAion/Evil-Droid_CN-sethaion: Evil-Droid 是一款专为 Android 平台设计的自动化渗透测试框架,由原开发者Mascerano Bachir 维护,现有国区开发者sethaion维护
Evil-Droid 是一款专为 Android 平台设计的自动化渗透测试框架,由原开发者Mascerano Bachir 维护,现有国区开发者sethaion维护 - SethAion/Evil-Droid_CN-sethaion
GitHub监控消息提醒!!!
更新了:RCE
描述:HackTheBox Writeup: Advanced XML External Entity (XXE) Exploitation: File Disclosure, Blind OOB Exfiltration, and Remote Code Execution (RCE) via Misconfigured XML Parsers.
URL:https://github.com/ramyardaneshgar/HTB-Writeup-XML-External-Entity-XXE-Exploitation
标签:#RCE
更新了:RCE
描述:HackTheBox Writeup: Advanced XML External Entity (XXE) Exploitation: File Disclosure, Blind OOB Exfiltration, and Remote Code Execution (RCE) via Misconfigured XML Parsers.
URL:https://github.com/ramyardaneshgar/HTB-Writeup-XML-External-Entity-XXE-Exploitation
标签:#RCE
GitHub
GitHub - ramyardaneshgar/HTB-Writeup-XML-External-Entity-XXE-Exploitation: HackTheBox Writeup: Advanced XML External Entity (XXE)…
HackTheBox Writeup: Advanced XML External Entity (XXE) Exploitation: File Disclosure, Blind OOB Exfiltration, and Remote Code Execution (RCE) via Misconfigured XML Parsers. - ramyardaneshgar/HTB-Wr...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/dpextreme/7-Zip-CVE-2025-0411-POC
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/dpextreme/7-Zip-CVE-2025-0411-POC
标签:#CVE-2025
GitHub
GitHub - dpextreme/7-Zip-CVE-2025-0411-POC: This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass. - dpextreme/7-Zip-CVE-2025-0411-POC
GitHub监控消息提醒!!!
更新了:RCE
描述:Vulnerable application for basic RCE and Code Injection
URL:https://github.com/Sushahuja7/Vulnerable-code
标签:#RCE
更新了:RCE
描述:Vulnerable application for basic RCE and Code Injection
URL:https://github.com/Sushahuja7/Vulnerable-code
标签:#RCE
GitHub
GitHub - Sushahuja7/Vulnerable-code: Vulnerable application for basic RCE and Code Injection
Vulnerable application for basic RCE and Code Injection - Sushahuja7/Vulnerable-code
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24813_POC
URL:https://github.com/N0c1or/CVE-2025-24813_POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24813_POC
URL:https://github.com/N0c1or/CVE-2025-24813_POC
标签:#CVE-2025
GitHub
GitHub - N0c1or/CVE-2025-24813_POC: CVE-2025-24813_POC
CVE-2025-24813_POC. Contribute to N0c1or/CVE-2025-24813_POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/absholi7ly/POC-CVE-2025-24813
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/absholi7ly/POC-CVE-2025-24813
标签:#RCE
GitHub
GitHub - absholi7ly/POC-CVE-2025-24813: his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE…
his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attac...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24813漏洞验证
URL:https://github.com/FY036/cve-2025-24813_poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24813漏洞验证
URL:https://github.com/FY036/cve-2025-24813_poc
标签:#CVE-2025
GitHub
GitHub - FY036/cve-2025-24813_poc: cve-2025-24813验证脚本
cve-2025-24813验证脚本. Contribute to FY036/cve-2025-24813_poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:EternalWhite – A WhatsApp sticker vulnerability exploit enabling RCE, DoS, and data manipulation via malformed sticker metadata. Affects Android & iOS. For research/educational purposes only.
URL:https://github.com/sylvaIII/Eternal-white-
标签:#RCE
更新了:RCE
描述:EternalWhite – A WhatsApp sticker vulnerability exploit enabling RCE, DoS, and data manipulation via malformed sticker metadata. Affects Android & iOS. For research/educational purposes only.
URL:https://github.com/sylvaIII/Eternal-white-
标签:#RCE
GitHub
GitHub - sylvaIII/Eternal-white-: EternalWhite – A WhatsApp sticker vulnerability exploit enabling RCE, DoS, and data manipulation…
EternalWhite – A WhatsApp sticker vulnerability exploit enabling RCE, DoS, and data manipulation via malformed sticker metadata. Affects Android & iOS. For research/educational purposes onl...
👍1