GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Written for deepening my understanding of CVE-2025-32433, and more practice in Go.
URL:https://github.com/meloppeitreet/CVE-2025-32433-Remote-Shell
标签:#CVE-2025
更新了:CVE-2025
描述:Written for deepening my understanding of CVE-2025-32433, and more practice in Go.
URL:https://github.com/meloppeitreet/CVE-2025-32433-Remote-Shell
标签:#CVE-2025
GitHub
GitHub - meloppeitreet/CVE-2025-32433-Remote-Shell: Go-based exploit for CVE-2025-32433
Go-based exploit for CVE-2025-32433. Contribute to meloppeitreet/CVE-2025-32433-Remote-Shell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:红蓝对抗
描述:Red-Blue Arsenal - Lightweight network security monitoring and penetration toolkit, a digital sentinel for both offense and defense 红蓝对抗利器 - 轻量级网络安全监控与渗透辅助系统,攻防两用的数字哨兵
URL:https://github.com/ksitigarbha4love/acalaguard
标签:#红蓝对抗
更新了:红蓝对抗
描述:Red-Blue Arsenal - Lightweight network security monitoring and penetration toolkit, a digital sentinel for both offense and defense 红蓝对抗利器 - 轻量级网络安全监控与渗透辅助系统,攻防两用的数字哨兵
URL:https://github.com/ksitigarbha4love/acalaguard
标签:#红蓝对抗
GitHub
GitHub - ksitigarbha4love/acalaguard: Red-Blue Arsenal - Lightweight network security monitoring and penetration toolkit, a digital…
Red-Blue Arsenal - Lightweight network security monitoring and penetration toolkit, a digital sentinel for both offense and defense 红蓝对抗利器 - 轻量级网络安全监控与渗透辅助系统,攻防两用的数字哨兵 - ksitigarbha4love/acalaguard
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Robust Cobalt Strike shellcode loader with multiple advanced evasion features
URL:https://github.com/cordvr/koneko
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Robust Cobalt Strike shellcode loader with multiple advanced evasion features
URL:https://github.com/cordvr/koneko
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:Red Team
描述:Certified Red Team Analyst Commands
URL:https://github.com/Fernandez99fc/CRTA
标签:#Red Team
更新了:Red Team
描述:Certified Red Team Analyst Commands
URL:https://github.com/Fernandez99fc/CRTA
标签:#Red Team
GitHub
GitHub - Fernandez99fc/CRTA: Certified Red Team Analyst Commands
Certified Red Team Analyst Commands. Contribute to Fernandez99fc/CRTA development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!
URL:https://github.com/hoefler02/CVE-2025-21756
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!
URL:https://github.com/hoefler02/CVE-2025-21756
标签:#CVE-2025
GitHub
GitHub - hoefler02/CVE-2025-21756: Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!
Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit! - hoefler02/CVE-2025-21756
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-43919: Directory Traversal Vulnerability in GNU Mailman 2.1.39
URL:https://github.com/0NYX-MY7H/CVE-2025-43919
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-43919: Directory Traversal Vulnerability in GNU Mailman 2.1.39
URL:https://github.com/0NYX-MY7H/CVE-2025-43919
标签:#CVE-2025
GitHub
GitHub - 0NYX-MY7H/CVE-2025-43919
Contribute to 0NYX-MY7H/CVE-2025-43919 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-43921: Unauthorized Mailing List Creation in GNU Mailman 2.1.39
URL:https://github.com/0NYX-MY7H/CVE-2025-43921
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-43921: Unauthorized Mailing List Creation in GNU Mailman 2.1.39
URL:https://github.com/0NYX-MY7H/CVE-2025-43921
标签:#CVE-2025
GitHub
GitHub - 0NYX-MY7H/CVE-2025-43921
Contribute to 0NYX-MY7H/CVE-2025-43921 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:PHP 8.1.0-dev RCE exploit
URL:https://github.com/RajChowdhury240/PHP-8.1.0-dev-RCE
标签:#RCE
更新了:RCE
描述:PHP 8.1.0-dev RCE exploit
URL:https://github.com/RajChowdhury240/PHP-8.1.0-dev-RCE
标签:#RCE
GitHub
GitHub - RajChowdhury240/PHP-8.1.0-dev-RCE: PHP 8.1.0-dev RCE exploit
PHP 8.1.0-dev RCE exploit. Contribute to RajChowdhury240/PHP-8.1.0-dev-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-43920: Remote Command Injection via Email Subject in GNU Mailman 2.1.39
URL:https://github.com/0NYX-MY7H/CVE-2025-43920
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-43920: Remote Command Injection via Email Subject in GNU Mailman 2.1.39
URL:https://github.com/0NYX-MY7H/CVE-2025-43920
标签:#CVE-2025
GitHub
GitHub - 0NYX-MY7H/CVE-2025-43920
Contribute to 0NYX-MY7H/CVE-2025-43920 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:卡门涡街(Kármán vortex street)是流体动力学中,当流体绕过障碍物时在其后方形成的一系列交替旋转的涡流结构。
URL:https://github.com/Chinaduanyun/karman_vortex_visualization
标签:#绕过
更新了:绕过
描述:卡门涡街(Kármán vortex street)是流体动力学中,当流体绕过障碍物时在其后方形成的一系列交替旋转的涡流结构。
URL:https://github.com/Chinaduanyun/karman_vortex_visualization
标签:#绕过
GitHub
GitHub - Chinaduanyun/karman_vortex_visualization: 卡门涡街(Kármán vortex street)是流体动力学中,当流体绕过障碍物时在其后方形成的一系列交替旋转的涡流结构。
卡门涡街(Kármán vortex street)是流体动力学中,当流体绕过障碍物时在其后方形成的一系列交替旋转的涡流结构。 - Chinaduanyun/karman_vortex_visualization
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025042019f8hvvxo2xa1a5lowtk5i8k
URL:https://github.com/static-web-apps-testing-org/swa2025042019f8hvvxo2xa1a5lowtk5i8k
标签:#hvv
更新了:hvv
描述:swa2025042019f8hvvxo2xa1a5lowtk5i8k
URL:https://github.com/static-web-apps-testing-org/swa2025042019f8hvvxo2xa1a5lowtk5i8k
标签:#hvv
GitHub监控消息提醒!!!
更新了:RCE
描述:PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteam
URL:https://github.com/cheerfulempl/CVE-2024-4577-PHP-RCE
标签:#RCE
更新了:RCE
描述:PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteam
URL:https://github.com/cheerfulempl/CVE-2024-4577-PHP-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30208 vite file read nuclei template
URL:https://github.com/imbas007/CVE-2025-30208-template
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30208 vite file read nuclei template
URL:https://github.com/imbas007/CVE-2025-30208-template
标签:#CVE-2025
GitHub
GitHub - imbas007/CVE-2025-30208-template: CVE-2025-30208 vite file read nuclei template
CVE-2025-30208 vite file read nuclei template. Contribute to imbas007/CVE-2025-30208-template development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:为AWD竞赛开发的webshell管理器,支持扫描,探活,批量执行命令
URL:https://github.com/Rt8848666/AWD_webshell-manager
标签:#webshell
更新了:webshell
描述:为AWD竞赛开发的webshell管理器,支持扫描,探活,批量执行命令
URL:https://github.com/Rt8848666/AWD_webshell-manager
标签:#webshell
GitHub
GitHub - Rt8848666/AWD_webshell-manager: 为AWD竞赛开发的webshell管理器,支持扫描,探活,批量执行命令
为AWD竞赛开发的webshell管理器,支持扫描,探活,批量执行命令. Contribute to Rt8848666/AWD_webshell-manager development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:looking into CVE-2025-31200 - can't figure it out yet
URL:https://github.com/zhuowei/apple-positional-audio-codec-invalid-header
标签:#CVE-2025
更新了:CVE-2025
描述:looking into CVE-2025-31200 - can't figure it out yet
URL:https://github.com/zhuowei/apple-positional-audio-codec-invalid-header
标签:#CVE-2025
GitHub
GitHub - zhuowei/apple-positional-audio-codec-invalid-header: CVE-2025-31200 - @Noahhw46 figured it out
CVE-2025-31200 - @Noahhw46 figured it out. Contribute to zhuowei/apple-positional-audio-codec-invalid-header development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Robust Cobalt Strike shellcode loader with multiple advanced evasion features
URL:https://github.com/Sumiran-dev/Threat-Intelligence-case-study
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Robust Cobalt Strike shellcode loader with multiple advanced evasion features
URL:https://github.com/Sumiran-dev/Threat-Intelligence-case-study
标签:#Cobalt Strike
GitHub
GitHub - Sumiran-dev/Threat-Intelligence-case-study: End-to-end threat intelligence investigation using real-world IOCs, OSINT…
End-to-end threat intelligence investigation using real-world IOCs, OSINT tools, Gnumeric, Linux CLI, Text Editor and malware sandboxes to analyze phishing, Cobalt Strike beacons, Discord abuse, an...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/ThreatRadarAI/TRA-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/ThreatRadarAI/TRA-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation-
标签:#CVE-2025
GitHub
GitHub - ThreatRadarAI/TRAI-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation: A CVSS 10.0-rated vulnerability…
A CVSS 10.0-rated vulnerability in the parquet-avro Java module allows remote code execution via unsafe deserialization when parsing schemas. Tracked as CVE-2025-30065, this flaw affects Apache Par...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE---PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE---PoC
标签:#CVE-2025
GitHub
GitHub - cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC: A critical RCE vulnerability has been identified…
A critical RCE vulnerability has been identified in the Wazuh server due to unsafe deserialization in the wazuh-manager package. This bug affects Wazuh versions ≥ 4.4.0 and has been patched in vers...
GitHub监控消息提醒!!!
更新了:RCE
描述:Patches the RCE Exploit in XWorm
URL:https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC
标签:#RCE
更新了:RCE
描述:Patches the RCE Exploit in XWorm
URL:https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC
标签:#RCE
GitHub
GitHub - cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC: A critical RCE vulnerability has been identified…
A critical RCE vulnerability has been identified in the Wazuh server due to unsafe deserialization in the wazuh-manager package. This bug affects Wazuh versions ≥ 4.4.0 and has been patched in vers...
GitHub监控消息提醒!!!
更新了:RCE
描述:python exploit - Neo4j 3.4.18 - RMI based Remote Code Execution (RCE)
URL:https://github.com/tavgar/CVE-2021-34371
标签:#RCE
更新了:RCE
描述:python exploit - Neo4j 3.4.18 - RMI based Remote Code Execution (RCE)
URL:https://github.com/tavgar/CVE-2021-34371
标签:#RCE
GitHub
GitHub - tavgar/CVE-2021-34371: python exploit - Neo4j 3.4.18 - RMI based Remote Code Execution (RCE)
python exploit - Neo4j 3.4.18 - RMI based Remote Code Execution (RCE) - tavgar/CVE-2021-34371