GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/yusufdalbudak/CVE-2025-32965-xrpl.js-Supply-Chain-Attack-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/yusufdalbudak/CVE-2025-32965-xrpl.js-Supply-Chain-Attack-PoC
标签:#CVE-2025
GitHub
GitHub - yusufdalbudak/CVE-2025-32965-xrpl-js-poc: CVE Kodu: CVE-2025-32965 Zafiyet Türü: Supply Chain Attack (CWE-506: Embedded…
CVE Kodu: CVE-2025-32965 Zafiyet Türü: Supply Chain Attack (CWE-506: Embedded Malicious Code) Hedef: xrpl.js kütüphanesinin 4.2.1–4.2.4 ve 2.14.2 versiyonları Etki: Kullanıcının cüzdan seed/secr...
GitHub监控消息提醒!!!
更新了:内存马
描述:对原版JNDIExploit进行修改增加线程和JMX注入内存马
URL:https://github.com/pap1rman/JNDIExploit-modify
标签:#内存马
更新了:内存马
描述:对原版JNDIExploit进行修改增加线程和JMX注入内存马
URL:https://github.com/pap1rman/JNDIExploit-modify
标签:#内存马
GitHub
GitHub - pap1rman/JNDIExploit-modify: 对原版JNDIExploit进行修改增加线程和JMX注入内存马
对原版JNDIExploit进行修改增加线程和JMX注入内存马. Contribute to pap1rman/JNDIExploit-modify development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/yusufdalbudak/CVE-2025-32965-xrpl-js-poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/yusufdalbudak/CVE-2025-32965-xrpl-js-poc
标签:#CVE-2025
GitHub
GitHub - yusufdalbudak/CVE-2025-32965-xrpl-js-poc: CVE Kodu: CVE-2025-32965 Zafiyet Türü: Supply Chain Attack (CWE-506: Embedded…
CVE Kodu: CVE-2025-32965 Zafiyet Türü: Supply Chain Attack (CWE-506: Embedded Malicious Code) Hedef: xrpl.js kütüphanesinin 4.2.1–4.2.4 ve 2.14.2 versiyonları Etki: Kullanıcının cüzdan seed/secr...
👍1
GitHub监控消息提醒!!!
更新了:webshell
描述:A webshell-framework
URL:https://github.com/m310ct/webshell-framework
标签:#webshell
更新了:webshell
描述:A webshell-framework
URL:https://github.com/m310ct/webshell-framework
标签:#webshell
GitHub
GitHub - m310ct/webshell-framework: A webshell-framework
A webshell-framework. Contribute to m310ct/webshell-framework development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025042318yicky7g7gyac95hvvcznje
URL:https://github.com/static-web-apps-testing-org/swa2025042318yicky7g7gyac95hvvcznje
标签:#hvv
更新了:hvv
描述:swa2025042318yicky7g7gyac95hvvcznje
URL:https://github.com/static-web-apps-testing-org/swa2025042318yicky7g7gyac95hvvcznje
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa2025042318yicky7g7gyac95hvvcznje: swa2025042318yicky7g7gyac95hvvcznje
swa2025042318yicky7g7gyac95hvvcznje. Contribute to static-web-apps-testing-org/swa2025042318yicky7g7gyac95hvvcznje development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This Python script exploits the CVE-2025-32433 vulnerability in certain versions of the Erlang SSH daemon.
URL:https://github.com/tobiasGuta/Erlang-OTP-CVE-2025-32433
标签:#CVE-2025
更新了:CVE-2025
描述:This Python script exploits the CVE-2025-32433 vulnerability in certain versions of the Erlang SSH daemon.
URL:https://github.com/tobiasGuta/Erlang-OTP-CVE-2025-32433
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: WordPress Verification SMS with TargetSMS Plugin <= 1.5 is vulnerable to Remote Code Execution (RCE)
URL:https://github.com/Nxploited/CVE-2025-3776
标签:#CVE-2025
更新了:CVE-2025
描述: WordPress Verification SMS with TargetSMS Plugin <= 1.5 is vulnerable to Remote Code Execution (RCE)
URL:https://github.com/Nxploited/CVE-2025-3776
标签:#CVE-2025
GitHub
GitHub - Nxploited/CVE-2025-3776: WordPress Verification SMS with TargetSMS Plugin <= 1.5 is vulnerable to Remote Code Execution…
WordPress Verification SMS with TargetSMS Plugin <= 1.5 is vulnerable to Remote Code Execution (RCE) - GitHub - Nxploited/CVE-2025-3776: WordPress Verification SMS with TargetSMS Plugin &a...
GitHub监控消息提醒!!!
更新了:RCE
描述:ACM Cyber Gradescope RCE workshop
URL:https://github.com/acmucsd/gradescope-griefing
标签:#RCE
更新了:RCE
描述:ACM Cyber Gradescope RCE workshop
URL:https://github.com/acmucsd/gradescope-griefing
标签:#RCE
GitHub
GitHub - acmucsd/gradescope-griefing: ACM Cyber Gradescope RCE workshop
ACM Cyber Gradescope RCE workshop. Contribute to acmucsd/gradescope-griefing development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025042408lf5jmb1hvvs37vcnq9o8nm
URL:https://github.com/static-web-apps-testing-org/swa2025042408lf5jmb1hvvs37vcnq9o8nm
标签:#hvv
更新了:hvv
描述:swa2025042408lf5jmb1hvvs37vcnq9o8nm
URL:https://github.com/static-web-apps-testing-org/swa2025042408lf5jmb1hvvs37vcnq9o8nm
标签:#hvv
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-30406
URL:https://github.com/W01fh4cker/CVE-2025-30406
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-30406
URL:https://github.com/W01fh4cker/CVE-2025-30406
标签:#CVE-2025
GitHub
GitHub - W01fh4cker/CVE-2025-30406: Exploit for CVE-2025-30406
Exploit for CVE-2025-30406. Contribute to W01fh4cker/CVE-2025-30406 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025042408ugzb3zcr834i9igk1hvv30
URL:https://github.com/static-web-apps-testing-org/swa2025042408ugzb3zcr834i9igk1hvv30
标签:#hvv
更新了:hvv
描述:swa2025042408ugzb3zcr834i9igk1hvv30
URL:https://github.com/static-web-apps-testing-org/swa2025042408ugzb3zcr834i9igk1hvv30
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa2025042408ugzb3zcr834i9igk1hvv30: swa2025042408ugzb3zcr834i9igk1hvv30
swa2025042408ugzb3zcr834i9igk1hvv30. Contribute to static-web-apps-testing-org/swa2025042408ugzb3zcr834i9igk1hvv30 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Official Nuclei template for CVE-2025-31161 (formerly CVE-2025-2825)
URL:https://github.com/SUPRAAA-1337/Nuclei_CVE-2025-31161_CVE-2025-2825
标签:#CVE-2025
更新了:CVE-2025
描述:Official Nuclei template for CVE-2025-31161 (formerly CVE-2025-2825)
URL:https://github.com/SUPRAAA-1337/Nuclei_CVE-2025-31161_CVE-2025-2825
标签:#CVE-2025
GitHub
GitHub - SUPRAAA-1337/Nuclei_CVE-2025-31161_CVE-2025-2825: Official Nuclei template for CVE-2025-31161 (formerly CVE-2025-2825)
Official Nuclei template for CVE-2025-31161 (formerly CVE-2025-2825) - SUPRAAA-1337/Nuclei_CVE-2025-31161_CVE-2025-2825
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Analysis of the Reproduction of CVE-2025-30208 Series Vulnerabilities
URL:https://github.com/r0ngy40/CVE-2025-30208-Series
标签:#CVE-2025
更新了:CVE-2025
描述:Analysis of the Reproduction of CVE-2025-30208 Series Vulnerabilities
URL:https://github.com/r0ngy40/CVE-2025-30208-Series
标签:#CVE-2025
GitHub
GitHub - r0ngy40/CVE-2025-30208-Series: Analysis of the Reproduction of CVE-2025-30208 Series Vulnerabilities
Analysis of the Reproduction of CVE-2025-30208 Series Vulnerabilities - r0ngy40/CVE-2025-30208-Series
GitHub监控消息提醒!!!
更新了:RCE
描述:Patches the RCE Exploit in XWorm
URL:https://github.com/K-ashvi/Phishing-Detection-Chrome-Extension-
标签:#RCE
更新了:RCE
描述:Patches the RCE Exploit in XWorm
URL:https://github.com/K-ashvi/Phishing-Detection-Chrome-Extension-
标签:#RCE
GitHub
GitHub - K-ashvi/Phishing-Detection-Chrome-Extension-: A browser-based phishing detection tool that checks URLs, keywords, and…
A browser-based phishing detection tool that checks URLs, keywords, and known malicious domains, uses OpenPhish data, and applies a machine learning model to flag threats. It also helps prevent Rem...
GitHub监控消息提醒!!!
更新了:绕过
描述:🎯 ChatGPT 中文助手导航站是一个专为中国国内用户打造的一站式教程平台,涵盖 ChatGPT 注册、ChatGPT Plus 升级、VPN 科学上网、机场节点、虚拟信用卡等实用指南。 🧭 所有内容均为原创编写,图文详解,亲测有效,帮助用户绕过访问、注册、支付障碍,安全顺利使用 ChatGPT 及相关 AI 工具。
URL:https://github.com/chatgpt-helper-tech/chatgpt-helper-tech.github.io
标签:#绕过
更新了:绕过
描述:🎯 ChatGPT 中文助手导航站是一个专为中国国内用户打造的一站式教程平台,涵盖 ChatGPT 注册、ChatGPT Plus 升级、VPN 科学上网、机场节点、虚拟信用卡等实用指南。 🧭 所有内容均为原创编写,图文详解,亲测有效,帮助用户绕过访问、注册、支付障碍,安全顺利使用 ChatGPT 及相关 AI 工具。
URL:https://github.com/chatgpt-helper-tech/chatgpt-helper-tech.github.io
标签:#绕过
GitHub
GitHub - chatgpt-helper-tech/chatgpt-helper-tech.github.io: 🎯 ChatGPT 中文助手导航站是一个专为中国国内用户打造的一站式教程平台,涵盖 ChatGPT 注册、ChatGPT Plus 升级、VPN…
🎯 ChatGPT 中文助手导航站是一个专为中国国内用户打造的一站式教程平台,涵盖 ChatGPT 注册、ChatGPT Plus 升级、VPN 科学上网、机场节点、虚拟信用卡等实用指南。 🧭 所有内容均为原创编写,图文详解,亲测有效,帮助用户绕过访问、注册、支付障碍,安全顺利使用 ChatGPT 及相关 AI 工具。 - chatgpt-helper-tech/chatgpt-helpe...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE lab to accompany CVE course for CVE-2025-32433
URL:https://github.com/ps-interactive/lab_CVE-2025-32433
标签:#CVE-2025
更新了:CVE-2025
描述:CVE lab to accompany CVE course for CVE-2025-32433
URL:https://github.com/ps-interactive/lab_CVE-2025-32433
标签:#CVE-2025
GitHub
GitHub - ps-interactive/lab_CVE-2025-32433: CVE lab to accompany CVE course for CVE-2025-32433
CVE lab to accompany CVE course for CVE-2025-32433 - ps-interactive/lab_CVE-2025-32433
GitHub监控消息提醒!!!
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/deve68i/sysy
标签:#信息收集
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/deve68i/sysy
标签:#信息收集
GitHub
GitHub - deve68i/sysy: 这是一个基于 Elasticsearch 的高性能信息检索与群组运营平台(telegram索引机器人),集成了分类检索、群组评分/举报/设置/采集、HTML/Markdown(含 V2)编辑与原生 Emoji…
这是一个基于 Elasticsearch 的高性能信息检索与群组运营平台(telegram索引机器人),集成了分类检索、群组评分/举报/设置/采集、HTML/Markdown(含 V2)编辑与原生 Emoji 支持;内置 OpenAI 内容审查与自动分类、免费 KD 排名功能,以及搜索广告、按钮广告、进群欢迎广告、置顶/关键词/品牌广告等多种投放方式;后台可一键导入导出带样式的 PDF/Ex...
GitHub监控消息提醒!!!
更新了:RCE
描述:Patches the RCE Exploit in XWorm
URL:https://github.com/ThreeMens/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#RCE
更新了:RCE
描述:Patches the RCE Exploit in XWorm
URL:https://github.com/ThreeMens/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#RCE
GitHub
GitHub - ThreeMens/Anydesk-Exploit-CVE-2025-12654-RCE-Builder: Exploit development targets vulnerabilities using tools like exploitation…
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gap...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Restore the integrity of the 'inetpub' folder following security implications highlighted by CVE-2025-2120.
URL:https://github.com/mmotti/Reset-inetpub
标签:#CVE-2025
更新了:CVE-2025
描述:Restore the integrity of the 'inetpub' folder following security implications highlighted by CVE-2025-2120.
URL:https://github.com/mmotti/Reset-inetpub
标签:#CVE-2025
GitHub
GitHub - mmotti/Reset-inetpub: Restore the integrity of the parent 'inetpub' folder following security implications highlighted…
Restore the integrity of the parent 'inetpub' folder following security implications highlighted by CVE-2025-21204. - mmotti/Reset-inetpub
GitHub监控消息提醒!!!
更新了:Red Team
描述:An advanced Python honeypot with SSH simulation, real-time alerts, GeoIP lookup, and automated threat reporting. Designed for Red Team, SOC, and cybersecurity research.
URL:https://github.com/burakcanbalta/honeypot
标签:#Red Team
更新了:Red Team
描述:An advanced Python honeypot with SSH simulation, real-time alerts, GeoIP lookup, and automated threat reporting. Designed for Red Team, SOC, and cybersecurity research.
URL:https://github.com/burakcanbalta/honeypot
标签:#Red Team
GitHub
GitHub - burakcanbalta/honeypot: An advanced Python honeypot with SSH simulation, real-time alerts, GeoIP lookup, and automated…
An advanced Python honeypot with SSH simulation, real-time alerts, GeoIP lookup, and automated threat reporting. Designed for Red Team, SOC, and cybersecurity research. - burakcanbalta/honeypot
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A proof-of-concept exploit for CVE-2025-32433, a critical vulnerability in Erlang's SSH library that allows pre-authenticated code execution via malformed SSH_MSG_CHANNEL_REQUEST packets.
URL:https://github.com/TeneBrae93/CVE-2025-3243
标签:#CVE-2025
更新了:CVE-2025
描述:A proof-of-concept exploit for CVE-2025-32433, a critical vulnerability in Erlang's SSH library that allows pre-authenticated code execution via malformed SSH_MSG_CHANNEL_REQUEST packets.
URL:https://github.com/TeneBrae93/CVE-2025-3243
标签:#CVE-2025
GitHub
GitHub - TeneBrae93/CVE-2025-3243: A proof-of-concept exploit for CVE-2025-32433, a critical vulnerability in Erlang's SSH library…
A proof-of-concept exploit for CVE-2025-32433, a critical vulnerability in Erlang's SSH library that allows pre-authenticated code execution via malformed SSH_MSG_CHANNEL_REQUEST packets. -...