GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Work-In-Progress for CVE-2025-27840
URL:https://github.com/ladyg00se/CVE-2025-27840-WIP
标签:#CVE-2025
更新了:CVE-2025
描述:A Work-In-Progress for CVE-2025-27840
URL:https://github.com/ladyg00se/CVE-2025-27840-WIP
标签:#CVE-2025
GitHub
GitHub - ladyg00se/CVE-2025-27840-WIP: A Work-In-Progress for CVE-2025-27840
A Work-In-Progress for CVE-2025-27840 . Contribute to ladyg00se/CVE-2025-27840-WIP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3
URL:https://github.com/tdeerenberg/InlineWhispers3
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3
URL:https://github.com/tdeerenberg/InlineWhispers3
标签:#Cobalt Strike
GitHub
GitHub - tdeerenberg/InlineWhispers3: Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF)…
Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion - tdeerenberg/InlineWhispers3
GitHub监控消息提醒!!!
更新了:RCE
描述:php-in-jpg is a simple yet flexible tool that generates .jpg image files embedding PHP payloads, designed to support PHP RCE polyglot techniques.
URL:https://github.com/nemmusu/php-in-jpg
标签:#RCE
更新了:RCE
描述:php-in-jpg is a simple yet flexible tool that generates .jpg image files embedding PHP payloads, designed to support PHP RCE polyglot techniques.
URL:https://github.com/nemmusu/php-in-jpg
标签:#RCE
GitHub
GitHub - nemmusu/php-in-jpg: php-in-jpg is a simple yet flexible tool that generates .jpg image files embedding PHP payloads, designed…
php-in-jpg is a simple yet flexible tool that generates .jpg image files embedding PHP payloads, designed to support PHP RCE polyglot techniques. - nemmusu/php-in-jpg
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Security Advisory and PoC for CVE-2025-32013
URL:https://github.com/Mohith-T/CVE-2025-32013
标签:#CVE-2025
更新了:CVE-2025
描述:Security Advisory and PoC for CVE-2025-32013
URL:https://github.com/Mohith-T/CVE-2025-32013
标签:#CVE-2025
GitHub
GitHub - Mohith-T/CVE-2025-32013: Security Advisory and PoC for CVE-2025-32013
Security Advisory and PoC for CVE-2025-32013. Contribute to Mohith-T/CVE-2025-32013 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025040903hvvhdt0zsfn7zqxwysbvoj
URL:https://github.com/static-web-apps-testing-org/swa2025040903hvvhdt0zsfn7zqxwysbvoj
标签:#hvv
更新了:hvv
描述:swa2025040903hvvhdt0zsfn7zqxwysbvoj
URL:https://github.com/static-web-apps-testing-org/swa2025040903hvvhdt0zsfn7zqxwysbvoj
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa2025040903hvvhdt0zsfn7zqxwysbvoj: swa2025040903hvvhdt0zsfn7zqxwysbvoj
swa2025040903hvvhdt0zsfn7zqxwysbvoj. Contribute to static-web-apps-testing-org/swa2025040903hvvhdt0zsfn7zqxwysbvoj development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:使用graalvm编译的本地文件敏感信息收集工具,依靠hae的规则配置文件
URL:https://github.com/hikeny666/ezmm
标签:#信息收集
更新了:信息收集
描述:使用graalvm编译的本地文件敏感信息收集工具,依靠hae的规则配置文件
URL:https://github.com/hikeny666/ezmm
标签:#信息收集
GitHub
GitHub - hikeny666/ezmm: 使用graalvm编译的本地文件敏感信息收集工具,依靠hae的规则配置文件
使用graalvm编译的本地文件敏感信息收集工具,依靠hae的规则配置文件. Contribute to hikeny666/ezmm development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:CVE-2024-3640绕过Waf进行漏洞利用
URL:https://github.com/H1ng007/CVE-2024-3640_WafBypass
标签:#绕过
更新了:绕过
描述:CVE-2024-3640绕过Waf进行漏洞利用
URL:https://github.com/H1ng007/CVE-2024-3640_WafBypass
标签:#绕过
GitHub
GitHub - H1ng007/CVE-2024-3640_WafBypass: CVE-2024-3640绕过Waf进行漏洞利用
CVE-2024-3640绕过Waf进行漏洞利用. Contribute to H1ng007/CVE-2024-3640_WafBypass development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24221: Sensitive keychain data may be accessible from an iOS backup
URL:https://github.com/AnonymousDeveloper69/CVE-2025-24221
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24221: Sensitive keychain data may be accessible from an iOS backup
URL:https://github.com/AnonymousDeveloper69/CVE-2025-24221
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:针对CVE-2025-30208和CVE-2025-31125的漏洞利用
URL:https://github.com/jackieya/ViteVulScan
标签:#CVE-2025
更新了:CVE-2025
描述:针对CVE-2025-30208和CVE-2025-31125的漏洞利用
URL:https://github.com/jackieya/ViteVulScan
标签:#CVE-2025
GitHub
GitHub - jackieya/ViteVulScan: 针对CVE-2025-30208和CVE-2025-31125的漏洞利用
针对CVE-2025-30208和CVE-2025-31125的漏洞利用. Contribute to jackieya/ViteVulScan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Research on Next.js middleware vulnerability (CVE-2025-29927) allowing authorization bypass and potential exploits.
URL:https://github.com/l1uk/nextjs-middleware-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Research on Next.js middleware vulnerability (CVE-2025-29927) allowing authorization bypass and potential exploits.
URL:https://github.com/l1uk/nextjs-middleware-exploit
标签:#CVE-2025
GitHub
GitHub - l1uk/nextjs-middleware-exploit: Research on Next.js middleware vulnerability (CVE-2025-29927) allowing authorization bypass…
Research on Next.js middleware vulnerability (CVE-2025-29927) allowing authorization bypass and potential exploits. - l1uk/nextjs-middleware-exploit
GitHub监控消息提醒!!!
更新了:Red Team
描述:A list of curated resources for people interested in AI Red Teaming, Jailbreaking, and Prompt Injection
URL:https://github.com/PromptLabs/Prompt-Hacking-Resources
标签:#Red Team
更新了:Red Team
描述:A list of curated resources for people interested in AI Red Teaming, Jailbreaking, and Prompt Injection
URL:https://github.com/PromptLabs/Prompt-Hacking-Resources
标签:#Red Team
GitHub
GitHub - PromptLabs/Prompt-Hacking-Resources: A list of curated resources for people interested in AI Red Teaming, Jailbreaking…
A list of curated resources for people interested in AI Red Teaming, Jailbreaking, and Prompt Injection - PromptLabs/Prompt-Hacking-Resources
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/housam123456789/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/housam123456789/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:信息收集
描述:MCP 信息收集客户端 是一个轻量级的信息收集工具,可以扩展使用mcp服务,进行静默信息收集。它无需用户交互或聊天
URL:https://github.com/Dont-Chat/mcp-collector
标签:#信息收集
更新了:信息收集
描述:MCP 信息收集客户端 是一个轻量级的信息收集工具,可以扩展使用mcp服务,进行静默信息收集。它无需用户交互或聊天
URL:https://github.com/Dont-Chat/mcp-collector
标签:#信息收集
GitHub
GitHub - Dont-Chat/mcp-collector: MCP 信息收集客户端 是一个轻量级的信息收集工具,可以扩展使用mcp服务,进行静默信息收集。它无需用户交互或聊天
MCP 信息收集客户端 是一个轻量级的信息收集工具,可以扩展使用mcp服务,进行静默信息收集。它无需用户交互或聊天 - Dont-Chat/mcp-collector
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025041002t31qcpv3hvv0ygx8n3vs0s
URL:https://github.com/static-web-apps-testing-org/swa2025041002t31qcpv3hvv0ygx8n3vs0s
标签:#hvv
更新了:hvv
描述:swa2025041002t31qcpv3hvv0ygx8n3vs0s
URL:https://github.com/static-web-apps-testing-org/swa2025041002t31qcpv3hvv0ygx8n3vs0s
标签:#hvv
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE
URL:https://github.com/securekomodo/CVE-2025-22457
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE
URL:https://github.com/securekomodo/CVE-2025-22457
标签:#CVE-2025
GitHub
GitHub - securekomodo/CVE-2025-22457: CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE
CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE - securekomodo/CVE-2025-22457
👍2
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit CVE-2025-1974 with a single file.
URL:https://github.com/Rubby2001/CVE-2025-1974-go
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit CVE-2025-1974 with a single file.
URL:https://github.com/Rubby2001/CVE-2025-1974-go
标签:#CVE-2025
GitHub
GitHub - Rubby2001/CVE-2025-1974-go: Exploit CVE-2025-1974 with a single file.
Exploit CVE-2025-1974 with a single file. Contribute to Rubby2001/CVE-2025-1974-go development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一个基于 Python 和 Tkinter 的模块化渗透测试工具箱,支持多种工具类型和环境配置。
URL:https://github.com/AiENG07/My_ToolBox
标签:#渗透测试
更新了:渗透测试
描述:一个基于 Python 和 Tkinter 的模块化渗透测试工具箱,支持多种工具类型和环境配置。
URL:https://github.com/AiENG07/My_ToolBox
标签:#渗透测试
GitHub
GitHub - AiENG07/My_ToolBox: 一个基于 Python 和 Tkinter 的模块化渗透测试工具箱,支持多种工具类型和环境配置。
一个基于 Python 和 Tkinter 的模块化渗透测试工具箱,支持多种工具类型和环境配置。. Contribute to AiENG07/My_ToolBox development by creating an account on GitHub.