GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Swift exploit port of the CVE-2025-24203 iOS vulnerability by Ian Beer of Google Project Zero
URL:https://github.com/GeoSn0w/CVE-2025-24203-iOS-Exploit-in-Swift
标签:#CVE-2025
更新了:CVE-2025
描述:A Swift exploit port of the CVE-2025-24203 iOS vulnerability by Ian Beer of Google Project Zero
URL:https://github.com/GeoSn0w/CVE-2025-24203-iOS-Exploit-in-Swift
标签:#CVE-2025
GitHub
GitHub - GeoSn0w/CVE-2025-24203-iOS-Exploit-With-Error-Logging: Slightly improved exploit of the CVE-2025-24203 iOS vulnerability…
Slightly improved exploit of the CVE-2025-24203 iOS vulnerability by Ian Beer of Google Project Zero - GeoSn0w/CVE-2025-24203-iOS-Exploit-With-Error-Logging
GitHub监控消息提醒!!!
更新了:RCE
描述:Scanner web leve, rápido e modular pra caçar XSS, SQLi, RCE e mais. Feito em Python + C, com suporte a WAF bypass, multi-thread e payloads custom.
URL:https://github.com/JuaanReis/Lynx
标签:#RCE
更新了:RCE
描述:Scanner web leve, rápido e modular pra caçar XSS, SQLi, RCE e mais. Feito em Python + C, com suporte a WAF bypass, multi-thread e payloads custom.
URL:https://github.com/JuaanReis/Lynx
标签:#RCE
GitHub
GitHub - JuaanReis/Lynx: Scanner web leve, rápido e modular pra caçar XSS, SQLi, RCE e mais. Feito em Python + C, com suporte a…
Scanner web leve, rápido e modular pra caçar XSS, SQLi, RCE e mais. Feito em Python + C, com suporte a WAF bypass, multi-thread e payloads custom. - JuaanReis/Lynx
GitHub监控消息提醒!!!
更新了:RCE
描述:Describe RCE foundations and principles
URL:https://github.com/reversed-chaos-engineering/foundation
标签:#RCE
更新了:RCE
描述:Describe RCE foundations and principles
URL:https://github.com/reversed-chaos-engineering/foundation
标签:#RCE
GitHub
GitHub - reversed-chaos-engineering/foundation: Describe RCE foundations and principles
Describe RCE foundations and principles. Contribute to reversed-chaos-engineering/foundation development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24085漏洞 和 Schemeshare漏洞
URL:https://github.com/pxx917144686/12345
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24085漏洞 和 Schemeshare漏洞
URL:https://github.com/pxx917144686/12345
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Repositório para a Análise de Dados do projeto RCEPRS.
URL:https://github.com/mariaeduardabe/RCEPRS
标签:#RCE
更新了:RCE
描述:Repositório para a Análise de Dados do projeto RCEPRS.
URL:https://github.com/mariaeduardabe/RCEPRS
标签:#RCE
GitHub
GitHub - mariaeduardabe/RCEPRS: Repositório para a Análise de Dados do projeto RCEPRS.
Repositório para a Análise de Dados do projeto RCEPRS. - GitHub - mariaeduardabe/RCEPRS: Repositório para a Análise de Dados do projeto RCEPRS.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Basic customization app using CVE-2025-24203. Patched in iOS 18.4.
URL:https://github.com/vigilante-1337/CVE-2025-3248
标签:#CVE-2025
更新了:CVE-2025
描述:Basic customization app using CVE-2025-24203. Patched in iOS 18.4.
URL:https://github.com/vigilante-1337/CVE-2025-3248
标签:#CVE-2025
GitHub
GitHub - vigilante-1337/CVE-2025-3248: CVE-2025-3248: A critical flaw has been discovered in Langflow that allows malicious actors…
CVE-2025-3248: A critical flaw has been discovered in Langflow that allows malicious actors to execute arbitrary Python code on the target system. This can lead to full remote code execution withou...
GitHub监控消息提醒!!!
更新了:RCE
描述:A Python-based static vulnerability scanner for PHP files that detects common issues like XSS, SQLi, and RCE
URL:https://github.com/SrLiath/vuln-scan
标签:#RCE
更新了:RCE
描述:A Python-based static vulnerability scanner for PHP files that detects common issues like XSS, SQLi, and RCE
URL:https://github.com/SrLiath/vuln-scan
标签:#RCE
GitHub
GitHub - SrLiath/vuln-scan: A Python-based static vulnerability scanner for PHP files that detects common issues like XSS, SQLi…
A Python-based static vulnerability scanner for PHP files that detects common issues like XSS, SQLi, and RCE - SrLiath/vuln-scan
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC for RCE vulnerability in cloudflare/workers-sdk
URL:https://github.com/UnknownAirtist/rce-poc-workers-sdk
标签:#RCE
更新了:RCE
描述:PoC for RCE vulnerability in cloudflare/workers-sdk
URL:https://github.com/UnknownAirtist/rce-poc-workers-sdk
标签:#RCE
GitHub
unkn0wn-artist/rce-poc-workers-sdk
PoC for RCE vulnerability in cloudflare/workers-sdk - unkn0wn-artist/rce-poc-workers-sdk
GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试报告生成工具 - 自动化生成专业渗透测试报告
URL:https://github.com/ifraise/PenTestReportGen
标签:#渗透测试
更新了:渗透测试
描述:渗透测试报告生成工具 - 自动化生成专业渗透测试报告
URL:https://github.com/ifraise/PenTestReportGen
标签:#渗透测试
GitHub
GitHub - ifraise/PenTestReportGen: 渗透测试报告生成工具 - 自动化生成专业渗透测试报告
渗透测试报告生成工具 - 自动化生成专业渗透测试报告. Contribute to ifraise/PenTestReportGen development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:subfinder-x是一款高性能的子域名爆破工具,使用 Go 语言开发,专为信息收集和渗透测试场景设计。该工具能够快速发现目标域名的子域名,并支持多级子域名扫描、HTTP服务识别和指纹识别等功能。
URL:https://github.com/kk12-30/subfinder-x
标签:#信息收集
更新了:信息收集
描述:subfinder-x是一款高性能的子域名爆破工具,使用 Go 语言开发,专为信息收集和渗透测试场景设计。该工具能够快速发现目标域名的子域名,并支持多级子域名扫描、HTTP服务识别和指纹识别等功能。
URL:https://github.com/kk12-30/subfinder-x
标签:#信息收集
GitHub
GitHub - kk12-30/subfinder-x: subfinder-x是一款高性能的子域名爆破工具,使用 Go 语言开发,专为信息收集和渗透测试场景设计。该工具能够快速发现目标域名的子域名,并支持多级子域名扫描、HTTP服务识别和指纹识别等功能。
subfinder-x是一款高性能的子域名爆破工具,使用 Go 语言开发,专为信息收集和渗透测试场景设计。该工具能够快速发现目标域名的子域名,并支持多级子域名扫描、HTTP服务识别和指纹识别等功能。 - kk12-30/subfinder-x
GitHub监控消息提醒!!!
更新了:信息收集
描述:基于Vibe Coding理念开发(Cursor 与 Claude 3.7),实现高效深度研究和信息收集的Agent。
URL:https://github.com/libxee/vibe-researcher
标签:#信息收集
更新了:信息收集
描述:基于Vibe Coding理念开发(Cursor 与 Claude 3.7),实现高效深度研究和信息收集的Agent。
URL:https://github.com/libxee/vibe-researcher
标签:#信息收集
GitHub
GitHub - libxee/vibe-researcher: 基于Vibe Coding理念开发(Cursor 与 Claude 3.7),实现高效深度研究和信息收集的Agent。
基于Vibe Coding理念开发(Cursor 与 Claude 3.7),实现高效深度研究和信息收集的Agent。 - libxee/vibe-researcher
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32407 PoC
URL:https://github.com/diegovargasj/CVE-2025-32407
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32407 PoC
URL:https://github.com/diegovargasj/CVE-2025-32407
标签:#CVE-2025
GitHub
GitHub - diegovargasj/CVE-2025-32407: CVE-2025-32407 PoC
CVE-2025-32407 PoC. Contribute to diegovargasj/CVE-2025-32407 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32756 — Fortinet FortiVoice Unauthenticated RCE (PoC)
URL:https://github.com/m4s1um/CVE-2025-32756-RCE-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32756 — Fortinet FortiVoice Unauthenticated RCE (PoC)
URL:https://github.com/m4s1um/CVE-2025-32756-RCE-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-4094 – WordPress Digits Plugin < 8.4.6.1 - OTP Authentication Bypass
URL:https://github.com/starawneh/CVE-2025-4094
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-4094 – WordPress Digits Plugin < 8.4.6.1 - OTP Authentication Bypass
URL:https://github.com/starawneh/CVE-2025-4094
标签:#CVE-2025
GitHub
GitHub - starawneh/CVE-2025-4094: CVE-2025-4094 – WordPress Digits Plugin < 8.4.6.1 - OTP Authentication Bypass
CVE-2025-4094 – WordPress Digits Plugin < 8.4.6.1 - OTP Authentication Bypass - starawneh/CVE-2025-4094
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/pilgrimage233/Minecraft-Rcon-Manage
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/pilgrimage233/Minecraft-Rcon-Manage
标签:#护网
GitHub
GitHub - pilgrimage233/Minecraft-Rcon-Manage: 🔥 全新开源!专为Minecraft服务器主打造的全能管理方案,基于RuoYi-Vue框架开发,三大核心功能助力高效运维: ✨ 核心亮点: ✅ 多服务器统一仪表盘…
🔥 全新开源!专为Minecraft服务器主打造的全能管理方案,基于RuoYi-Vue框架开发,三大核心功能助力高效运维: ✨ 核心亮点: ✅ 多服务器统一仪表盘 - 实时状态/在线玩家/远程指令一站式管理 ✅ 智能白名单系统 - 正版验证+自动审核+邮件通知+IP防护 ✅ 全维度玩家管理 - 游戏行为追踪/时长统计/地理分布/封禁系统 💻 进阶功能: RCON远程控制 + 网页版终端 OP...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC para o CVE-2025-24813
URL:https://github.com/maliqto/PoC-CVE-2025-24813
标签:#CVE-2025
更新了:CVE-2025
描述:PoC para o CVE-2025-24813
URL:https://github.com/maliqto/PoC-CVE-2025-24813
标签:#CVE-2025
GitHub
GitHub - maliqto/PoC-CVE-2025-24813: PoC para o CVE-2025-24813
PoC para o CVE-2025-24813. Contribute to maliqto/PoC-CVE-2025-24813 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:WordPress Plugin Digits < 8.4.6.1 - OTP Auth Bypass via Bruteforce (CVE-2025-4094)
URL:https://github.com/POCPioneer/CVE-2025-4094-POC
标签:#CVE-2025
更新了:CVE-2025
描述:WordPress Plugin Digits < 8.4.6.1 - OTP Auth Bypass via Bruteforce (CVE-2025-4094)
URL:https://github.com/POCPioneer/CVE-2025-4094-POC
标签:#CVE-2025
GitHub
GitHub - POCPioneer/CVE-2025-4094-POC: WordPress Plugin Digits < 8.4.6.1 - OTP Auth Bypass via Bruteforce (CVE-2025-4094)
WordPress Plugin Digits < 8.4.6.1 - OTP Auth Bypass via Bruteforce (CVE-2025-4094) - POCPioneer/CVE-2025-4094-POC
GitHub监控消息提醒!!!
更新了:RCE
描述:Nacos Derby命令执行漏洞利用脚本,支持 jMG 生成的内存马
URL:https://github.com/want2live233/nacos_derby_rce_custom_memshell
标签:#RCE
更新了:RCE
描述:Nacos Derby命令执行漏洞利用脚本,支持 jMG 生成的内存马
URL:https://github.com/want2live233/nacos_derby_rce_custom_memshell
标签:#RCE
GitHub
GitHub - want2live233/nacos_derby_rce_custom_memshell: Nacos Derby命令执行漏洞利用脚本,支持 jMG 生成的内存马
Nacos Derby命令执行漏洞利用脚本,支持 jMG 生成的内存马. Contribute to want2live233/nacos_derby_rce_custom_memshell development by creating an account on GitHub.