GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC IngressNightmare (CVE-2025-1974), modified from https://github.com/yoshino-s/CVE-2025-1974
URL:https://github.com/rjhaikal/POC-IngressNightmare-CVE-2025-1974-
标签:#CVE-2025
更新了:CVE-2025
描述:POC IngressNightmare (CVE-2025-1974), modified from https://github.com/yoshino-s/CVE-2025-1974
URL:https://github.com/rjhaikal/POC-IngressNightmare-CVE-2025-1974-
标签:#CVE-2025
GitHub
GitHub - yoshino-s/CVE-2025-1974
Contribute to yoshino-s/CVE-2025-1974 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:POC of an RCE in buff.build CLI tool
URL:https://github.com/matt-/buf_poc
标签:#RCE
更新了:RCE
描述:POC of an RCE in buff.build CLI tool
URL:https://github.com/matt-/buf_poc
标签:#RCE
GitHub
GitHub - matt-/buf_poc: POC of an RCE in buff.build CLI tool
POC of an RCE in buff.build CLI tool . Contribute to matt-/buf_poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Research into systemic PDF417 validation vulnerabilities in AAMVA-compliant ID systems (CVE-2025-31336, CVE-2025-31337, scr1841160)
URL:https://github.com/coleleavitt/AAMVA-PDF417-Vulnerability-Research
标签:#CVE-2025
更新了:CVE-2025
描述:Research into systemic PDF417 validation vulnerabilities in AAMVA-compliant ID systems (CVE-2025-31336, CVE-2025-31337, scr1841160)
URL:https://github.com/coleleavitt/AAMVA-PDF417-Vulnerability-Research
标签:#CVE-2025
GitHub
GitHub - coleleavitt/AAMVA-PDF417-Vulnerability-Research: Research into systemic PDF417 validation vulnerabilities in AAMVA-compliant…
Research into systemic PDF417 validation vulnerabilities in AAMVA-compliant ID systems (CVE-2025-31336, CVE-2025-31337, scr1841160) - coleleavitt/AAMVA-PDF417-Vulnerability-Research
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Here is a simple but effective exploit for CVE-2025-29927.
URL:https://github.com/w2hcorp/CVE-2025-29927-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Here is a simple but effective exploit for CVE-2025-29927.
URL:https://github.com/w2hcorp/CVE-2025-29927-Exploit
标签:#CVE-2025
GitHub
GitHub - w2hcorp/CVE-2025-29927-PoC: Here is a simple but effective exploit for CVE-2025-29927.
Here is a simple but effective exploit for CVE-2025-29927. - w2hcorp/CVE-2025-29927-PoC
GitHub监控消息提醒!!!
更新了:RCE
描述:Apache CouchDB 3.2.1 - Remote Code Execution (RCE) Checker
URL:https://github.com/becrevex/CVE-2022-24706
标签:#RCE
更新了:RCE
描述:Apache CouchDB 3.2.1 - Remote Code Execution (RCE) Checker
URL:https://github.com/becrevex/CVE-2022-24706
标签:#RCE
GitHub
GitHub - becrevex/CVE-2022-24706: Apache CouchDB 3.2.1 - Remote Code Execution (RCE) Checker
Apache CouchDB 3.2.1 - Remote Code Execution (RCE) Checker - becrevex/CVE-2022-24706
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Next.js CVE-2025-29927 demonstration
URL:https://github.com/dante01yoon/CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:Next.js CVE-2025-29927 demonstration
URL:https://github.com/dante01yoon/CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - dante01yoon/CVE-2025-29927: Next.js CVE-2025-29927 demonstration
Next.js CVE-2025-29927 demonstration. Contribute to dante01yoon/CVE-2025-29927 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:hvv
描述:swa20250329106967k6oy7xtsop9hvvyo4c
URL:https://github.com/static-web-apps-testing-org/swa20250329106967k6oy7xtsop9hvvyo4c
标签:#hvv
更新了:hvv
描述:swa20250329106967k6oy7xtsop9hvvyo4c
URL:https://github.com/static-web-apps-testing-org/swa20250329106967k6oy7xtsop9hvvyo4c
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa20250329106967k6oy7xtsop9hvvyo4c: swa20250329106967k6oy7xtsop9hvvyo4c
swa20250329106967k6oy7xtsop9hvvyo4c. Contribute to static-web-apps-testing-org/swa20250329106967k6oy7xtsop9hvvyo4c development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-2563 PoC
URL:https://github.com/ubaydev/CVE-2025-2563
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-2563 PoC
URL:https://github.com/ubaydev/CVE-2025-2563
标签:#CVE-2025
GitHub
GitHub - ubaydev/CVE-2025-2563: CVE-2025-2563 PoC
CVE-2025-2563 PoC. Contribute to ubaydev/CVE-2025-2563 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:一款集成多种安全功能的工具箱,旨在帮助用户快速进行网络排查、主机信息收集、日志查询、IP类处理等安全相关操作
URL:https://github.com/LMcream/DD-security-tool
标签:#信息收集
更新了:信息收集
描述:一款集成多种安全功能的工具箱,旨在帮助用户快速进行网络排查、主机信息收集、日志查询、IP类处理等安全相关操作
URL:https://github.com/LMcream/DD-security-tool
标签:#信息收集
GitHub
GitHub - LMcream/DD-security-tool: 一款集成多种安全功能的工具箱,旨在帮助用户快速进行威胁情报查询、网络排查、主机信息分析、主机日志分析、IP类处理等相关操作
一款集成多种安全功能的工具箱,旨在帮助用户快速进行威胁情报查询、网络排查、主机信息分析、主机日志分析、IP类处理等相关操作 - LMcream/DD-security-tool
👍1
GitHub监控消息提醒!!!
更新了:hvv
描述:swa20250329140rdbis7y328fd4svzx6hvv
URL:https://github.com/static-web-apps-testing-org/swa20250329140rdbis7y328fd4svzx6hvv
标签:#hvv
更新了:hvv
描述:swa20250329140rdbis7y328fd4svzx6hvv
URL:https://github.com/static-web-apps-testing-org/swa20250329140rdbis7y328fd4svzx6hvv
标签:#hvv
GitHub监控消息提醒!!!
更新了:RCE
描述:Authenticated RCE exploit for Gogs, using Git hook injection to deliver a reverse shell.
URL:https://github.com/um3b0shi/gogs-hooker
标签:#RCE
更新了:RCE
描述:Authenticated RCE exploit for Gogs, using Git hook injection to deliver a reverse shell.
URL:https://github.com/um3b0shi/gogs-hooker
标签:#RCE
GitHub
GitHub - um3b0shi/gogs-hooker: Authenticated RCE exploit for Gogs, using Git hook injection to deliver a reverse shell.
Authenticated RCE exploit for Gogs, using Git hook injection to deliver a reverse shell. - um3b0shi/gogs-hooker
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Next.js Auth Bypass Lab ‐ CVE-2025-29927
URL:https://github.com/ayato-shitomi/WebLab_CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:Next.js Auth Bypass Lab ‐ CVE-2025-29927
URL:https://github.com/ayato-shitomi/WebLab_CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - ayato-shitomi/WebLab_CVE-2025-29927: Next.js Auth Bypass Lab ‐ CVE-2025-29927
Next.js Auth Bypass Lab ‐ CVE-2025-29927. Contribute to ayato-shitomi/WebLab_CVE-2025-29927 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:这是一个使用FOFA API进行信息收集的Python工具,可以通过FOFA搜索引擎收集域名、子域名、IP和URL信息。
URL:https://github.com/mcafeexasd/fofa_collector
标签:#信息收集
更新了:信息收集
描述:这是一个使用FOFA API进行信息收集的Python工具,可以通过FOFA搜索引擎收集域名、子域名、IP和URL信息。
URL:https://github.com/mcafeexasd/fofa_collector
标签:#信息收集
GitHub
GitHub - mcafeexasd/fofa_collector: 这是一个使用FOFA API进行信息收集的Python工具,可以通过FOFA搜索引擎收集域名、子域名、IP和URL信息。
这是一个使用FOFA API进行信息收集的Python工具,可以通过FOFA搜索引擎收集域名、子域名、IP和URL信息。 - mcafeexasd/fofa_collector
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Scan-X是一款高效的Web安全扫描工具,专注于快速识别常见Web漏洞,包括SQL注入、越权访问、未授权访问等。通过代理模式自动分析HTTP流量,实现被动扫描,适合大规模资产安全评估与渗透测试场景。\"
URL:https://github.com/kk12-30/Scan-X
标签:#渗透测试
更新了:渗透测试
描述:Scan-X是一款高效的Web安全扫描工具,专注于快速识别常见Web漏洞,包括SQL注入、越权访问、未授权访问等。通过代理模式自动分析HTTP流量,实现被动扫描,适合大规模资产安全评估与渗透测试场景。\"
URL:https://github.com/kk12-30/Scan-X
标签:#渗透测试
GitHub
GitHub - kk12-30/Scan-X: 【AI漏洞扫描器】【多功能Web扫描器】Scan-X是一款基于mitmproxy高效的被动扫描器,专注于快速识别常见Web漏洞,包括SQL注入、越权访问、未授权访问等,支持AI漏洞扫描。通过代理模式自动…
【AI漏洞扫描器】【多功能Web扫描器】Scan-X是一款基于mitmproxy高效的被动扫描器,专注于快速识别常见Web漏洞,包括SQL注入、越权访问、未授权访问等,支持AI漏洞扫描。通过代理模式自动分析HTTP流量,实现被动扫描,适合大规模资产安全评估与渗透测试场景。 - kk12-30/Scan-X
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:IngressNightmare-PoC: (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) PoC ,One-click script 。 一键脚本
URL:https://github.com/lufeirider/IngressNightmare-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:IngressNightmare-PoC: (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) PoC ,One-click script 。 一键脚本
URL:https://github.com/lufeirider/IngressNightmare-PoC
标签:#CVE-2025
GitHub
GitHub - lufeirider/IngressNightmare-PoC: IngressNightmare-PoC: (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) …
IngressNightmare-PoC: (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) PoC ,One-click script 。 一键脚本 - GitHub - lufeirider/IngressNightmare-PoC: IngressNightmare-PoC: (CVE-2025-1097, ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Demonstration of CVE-2025-27152
URL:https://github.com/andreglock/axios-ssrf
标签:#CVE-2025
更新了:CVE-2025
描述:Demonstration of CVE-2025-27152
URL:https://github.com/andreglock/axios-ssrf
标签:#CVE-2025
GitHub
GitHub - andreglock/axios-ssrf: Demonstration of CVE-2025-27152
Demonstration of CVE-2025-27152. Contribute to andreglock/axios-ssrf development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30208-EXP
URL:https://github.com/Ahmed-mostafa03/CVE-2025-30208-EXP
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30208-EXP
URL:https://github.com/Ahmed-mostafa03/CVE-2025-30208-EXP
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Bitcoin Cryptanalysis: CVE-2025-27840 Vulnerability in ESP32 Microcontrollers Puts Billions of IoT Devices at Risk via Wi-Fi & Bluetooth
URL:https://github.com/demining/Bluetooth-Attacks-CVE-2025-27840
标签:#CVE-2025
更新了:CVE-2025
描述:Bitcoin Cryptanalysis: CVE-2025-27840 Vulnerability in ESP32 Microcontrollers Puts Billions of IoT Devices at Risk via Wi-Fi & Bluetooth
URL:https://github.com/demining/Bluetooth-Attacks-CVE-2025-27840
标签:#CVE-2025
GitHub
GitHub - demining/Bluetooth-Attacks-CVE-2025-27840: Bitcoin Cryptanalysis: CVE-2025-27840 Vulnerability in ESP32 Microcontrollers…
Bitcoin Cryptanalysis: CVE-2025-27840 Vulnerability in ESP32 Microcontrollers Puts Billions of IoT Devices at Risk via Wi-Fi & Bluetooth - demining/Bluetooth-Attacks-CVE-2025-27840
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-0011 (CVE not assigned yet)
URL:https://github.com/binarywarm/kentico-xperience13-AuthBypass-CVE-2025-0011
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-0011 (CVE not assigned yet)
URL:https://github.com/binarywarm/kentico-xperience13-AuthBypass-CVE-2025-0011
标签:#CVE-2025
GitHub
GitHub - binarywarm/kentico-xperience13-AuthBypass-CVE-2025-0011: CVE-2025-0011 (CVE not assigned yet)
CVE-2025-0011 (CVE not assigned yet). Contribute to binarywarm/kentico-xperience13-AuthBypass-CVE-2025-0011 development by creating an account on GitHub.