GitHub监控消息提醒!!!
更新了:RCE
描述:Patches the RCE Exploit in XWorm
URL:https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC
标签:#RCE
更新了:RCE
描述:Patches the RCE Exploit in XWorm
URL:https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC
标签:#RCE
GitHub
GitHub - cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC: A critical RCE vulnerability has been identified…
A critical RCE vulnerability has been identified in the Wazuh server due to unsafe deserialization in the wazuh-manager package. This bug affects Wazuh versions ≥ 4.4.0 and has been patched in vers...
GitHub监控消息提醒!!!
更新了:RCE
描述:python exploit - Neo4j 3.4.18 - RMI based Remote Code Execution (RCE)
URL:https://github.com/tavgar/CVE-2021-34371
标签:#RCE
更新了:RCE
描述:python exploit - Neo4j 3.4.18 - RMI based Remote Code Execution (RCE)
URL:https://github.com/tavgar/CVE-2021-34371
标签:#RCE
GitHub
GitHub - tavgar/CVE-2021-34371: python exploit - Neo4j 3.4.18 - RMI based Remote Code Execution (RCE)
python exploit - Neo4j 3.4.18 - RMI based Remote Code Execution (RCE) - tavgar/CVE-2021-34371
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CrushFTP CVE-2025-31161 Exploit Tool 🔓
URL:https://github.com/TX-One/CVE-2025-31161
标签:#CVE-2025
更新了:CVE-2025
描述:CrushFTP CVE-2025-31161 Exploit Tool 🔓
URL:https://github.com/TX-One/CVE-2025-31161
标签:#CVE-2025
GitHub
GitHub - TX-One/CVE-2025-31161: CrushFTP CVE-2025-31161 Exploit Tool 🔓
CrushFTP CVE-2025-31161 Exploit Tool 🔓. Contribute to TX-One/CVE-2025-31161 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:X4RCE is a powerful AI workforce management platform that helps you create and manage specialized teams of AI agents. These agents collaborate to accomplish your tasks and projects efficiently.
URL:https://github.com/6543216543210/x4rce
标签:#RCE
更新了:RCE
描述:X4RCE is a powerful AI workforce management platform that helps you create and manage specialized teams of AI agents. These agents collaborate to accomplish your tasks and projects efficiently.
URL:https://github.com/6543216543210/x4rce
标签:#RCE
GitHub
6543216543210/x4rce
X4RCE is a powerful AI workforce management platform that helps you create and manage specialized teams of AI agents. These agents collaborate to accomplish your tasks and projects efficiently. - 6...
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025042202hvv9latrprohyvizkrwc08
URL:https://github.com/static-web-apps-testing-org/swa2025042202hvv9latrprohyvizkrwc08
标签:#hvv
更新了:hvv
描述:swa2025042202hvv9latrprohyvizkrwc08
URL:https://github.com/static-web-apps-testing-org/swa2025042202hvv9latrprohyvizkrwc08
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa2025042202hvv9latrprohyvizkrwc08: swa2025042202hvv9latrprohyvizkrwc08
swa2025042202hvv9latrprohyvizkrwc08. Contribute to static-web-apps-testing-org/swa2025042202hvv9latrprohyvizkrwc08 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/ThreatRadarAI/TRAI-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/ThreatRadarAI/TRAI-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation
标签:#RCE
GitHub
GitHub - ThreatRadarAI/TRAI-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation: A CVSS 10.0-rated vulnerability…
A CVSS 10.0-rated vulnerability in the parquet-avro Java module allows remote code execution via unsafe deserialization when parsing schemas. Tracked as CVE-2025-30065, this flaw affects Apache Par...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/cybersecplayground/CVE-2025-43919-POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/cybersecplayground/CVE-2025-43919-POC
标签:#CVE-2025
GitHub
GitHub - cybersecplayground/CVE-2025-43919-POC: A new vulnerability has been discovered in GNU Mailman 2.1.39, bundled with cPanel/WHM…
A new vulnerability has been discovered in GNU Mailman 2.1.39, bundled with cPanel/WHM, allowing unauthenticated remote attackers to read arbitrary files on the server via a directory traversal fla...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This script decodes, filters, and extracts cookies as part of the exploitation of CVE-2025-26159.
URL:https://github.com/godBADTRY/CVE-2025-26159
标签:#CVE-2025
更新了:CVE-2025
描述:This script decodes, filters, and extracts cookies as part of the exploitation of CVE-2025-26159.
URL:https://github.com/godBADTRY/CVE-2025-26159
标签:#CVE-2025
GitHub
GitHub - godBADTRY/CVE-2025-26159: This script decodes, filters, and extracts cookies as part of the exploitation of CVE-2025-26159.
This script decodes, filters, and extracts cookies as part of the exploitation of CVE-2025-26159. - godBADTRY/CVE-2025-26159
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054
URL:https://github.com/helidem/CVE-2025-24054-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054
URL:https://github.com/helidem/CVE-2025-24054-PoC
标签:#CVE-2025
GitHub
GitHub - helidem/CVE-2025-24054_CVE-2025-24071-PoC: Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE…
Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071 - helidem/CVE-2025-24054_CVE-2025-24071-PoC
GitHub监控消息提醒!!!
更新了:RCE
描述:Unauthenticated RCE and Full Device Compromise on EKSELANS by ITS Devices
URL:https://github.com/miitro/EK_SE_LANS
标签:#RCE
更新了:RCE
描述:Unauthenticated RCE and Full Device Compromise on EKSELANS by ITS Devices
URL:https://github.com/miitro/EK_SE_LANS
标签:#RCE
GitHub
GitHub - miitro/EK_SE_LANS: Unauthenticated RCE and Full Device Compromise on EKSELANS by ITS Devices
Unauthenticated RCE and Full Device Compromise on EKSELANS by ITS Devices - miitro/EK_SE_LANS
GitHub监控消息提醒!!!
更新了:反序列化
描述: 《深入JDBC安全:特殊URL构造与不出网反序列化利用技术揭秘》对应研究总结项目 \"Deep Dive into JDBC Security: Special URL Construction and Non-Networked Deserialization Exploitation Techniques Revealed\" - Research Summary Project
URL:https://github.com/Oluwaseunnn/jdbc-tricks
标签:#反序列化
更新了:反序列化
描述: 《深入JDBC安全:特殊URL构造与不出网反序列化利用技术揭秘》对应研究总结项目 \"Deep Dive into JDBC Security: Special URL Construction and Non-Networked Deserialization Exploitation Techniques Revealed\" - Research Summary Project
URL:https://github.com/Oluwaseunnn/jdbc-tricks
标签:#反序列化
GitHub
GitHub - Oluwaseunnn/jdbc-tricks: 《深入JDBC安全:特殊URL构造与不出网反序列化利用技术揭秘》对应研究总结项目 "Deep Dive into JDBC Security: Special URL Construction…
《深入JDBC安全:特殊URL构造与不出网反序列化利用技术揭秘》对应研究总结项目 "Deep Dive into JDBC Security: Special URL Construction and Non-Networked Deserialization Exploitation Techniques Revealed" - Research Su...
GitHub监控消息提醒!!!
更新了:漏洞复现
描述:某输入法EncryptWall加密漏洞复现
URL:https://github.com/g1d0yu/Vulnerability-reproduction
标签:#漏洞复现
更新了:漏洞复现
描述:某输入法EncryptWall加密漏洞复现
URL:https://github.com/g1d0yu/Vulnerability-reproduction
标签:#漏洞复现
GitHub监控消息提醒!!!
更新了:应急响应
描述:针对恶意程序的网络连接行为监控工具,特别适用于应急响应场景。通过监控特定 IP/域名的网络连接,快速定位潜伏的恶意程序,协助应急处理人员及时发现和清除威胁。
URL:https://github.com/jayimu/Network_Monitor
标签:#应急响应
更新了:应急响应
描述:针对恶意程序的网络连接行为监控工具,特别适用于应急响应场景。通过监控特定 IP/域名的网络连接,快速定位潜伏的恶意程序,协助应急处理人员及时发现和清除威胁。
URL:https://github.com/jayimu/Network_Monitor
标签:#应急响应
GitHub
GitHub - jayimu/Network_Monitor: 针对恶意程序的网络连接行为监控工具,特别适用于应急响应场景。通过监控特定 IP/域名的网络连接,快速定位潜伏的恶意程序,协助应急处理人员及时发现和清除威胁。
针对恶意程序的网络连接行为监控工具,特别适用于应急响应场景。通过监控特定 IP/域名的网络连接,快速定位潜伏的恶意程序,协助应急处理人员及时发现和清除威胁。 - jayimu/Network_Monitor
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025042218hvvq2ibzgpl6vy9g0kdde1
URL:https://github.com/static-web-apps-testing-org/swa2025042218hvvq2ibzgpl6vy9g0kdde1
标签:#hvv
更新了:hvv
描述:swa2025042218hvvq2ibzgpl6vy9g0kdde1
URL:https://github.com/static-web-apps-testing-org/swa2025042218hvvq2ibzgpl6vy9g0kdde1
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa2025042218hvvq2ibzgpl6vy9g0kdde1: swa2025042218hvvq2ibzgpl6vy9g0kdde1
swa2025042218hvvq2ibzgpl6vy9g0kdde1. Contribute to static-web-apps-testing-org/swa2025042218hvvq2ibzgpl6vy9g0kdde1 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29529
URL:https://github.com/Yoshik0xF6/CVE-2025-29529
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29529
URL:https://github.com/Yoshik0xF6/CVE-2025-29529
标签:#CVE-2025
GitHub
GitHub - Yoshik0xF6/CVE-2025-29529: SQLi ITC Multiplan v3.7.4.1002 (CVE-2025-29529)
SQLi ITC Multiplan v3.7.4.1002 (CVE-2025-29529). Contribute to Yoshik0xF6/CVE-2025-29529 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:哥斯拉反编译源码---Godzilla_native_refile 哥斯拉改编asp、java、php、cshap木马免杀版---Godzilla_native_refile.jar
URL:https://github.com/Sywanggg/Godzilla_collection
标签:#免杀
更新了:免杀
描述:哥斯拉反编译源码---Godzilla_native_refile 哥斯拉改编asp、java、php、cshap木马免杀版---Godzilla_native_refile.jar
URL:https://github.com/Sywanggg/Godzilla_collection
标签:#免杀
GitHub
GitHub - Sywanggg/Godzilla_collection: 哥斯拉反编译源码---Godzilla_native_refile 哥斯拉改编asp、java、php、cshap木马免杀版---Godzilla_native_refile.jar
哥斯拉反编译源码---Godzilla_native_refile 哥斯拉改编asp、java、php、cshap木马免杀版---Godzilla_native_refile.jar - Sywanggg/Godzilla_collection
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29927: Next.js Middleware Bypass Vulnerability
URL:https://github.com/kh4sh3i/CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29927: Next.js Middleware Bypass Vulnerability
URL:https://github.com/kh4sh3i/CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - kh4sh3i/CVE-2025-29927: CVE-2025-29927: Next.js Middleware Bypass Vulnerability
CVE-2025-29927: Next.js Middleware Bypass Vulnerability - kh4sh3i/CVE-2025-29927
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/yusufdalbudak/CVE-2025-32965-xrpl.js-Supply-Chain-Attack-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/yusufdalbudak/CVE-2025-32965-xrpl.js-Supply-Chain-Attack-PoC
标签:#CVE-2025
GitHub
GitHub - yusufdalbudak/CVE-2025-32965-xrpl-js-poc: CVE Kodu: CVE-2025-32965 Zafiyet Türü: Supply Chain Attack (CWE-506: Embedded…
CVE Kodu: CVE-2025-32965 Zafiyet Türü: Supply Chain Attack (CWE-506: Embedded Malicious Code) Hedef: xrpl.js kütüphanesinin 4.2.1–4.2.4 ve 2.14.2 versiyonları Etki: Kullanıcının cüzdan seed/secr...
GitHub监控消息提醒!!!
更新了:内存马
描述:对原版JNDIExploit进行修改增加线程和JMX注入内存马
URL:https://github.com/pap1rman/JNDIExploit-modify
标签:#内存马
更新了:内存马
描述:对原版JNDIExploit进行修改增加线程和JMX注入内存马
URL:https://github.com/pap1rman/JNDIExploit-modify
标签:#内存马
GitHub
GitHub - pap1rman/JNDIExploit-modify: 对原版JNDIExploit进行修改增加线程和JMX注入内存马
对原版JNDIExploit进行修改增加线程和JMX注入内存马. Contribute to pap1rman/JNDIExploit-modify development by creating an account on GitHub.