GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Demonstrates a real-world zero-trust bypass by exploiting BIND CVE-2025-40775 to disrupt DNS, break secret rotation, and expose static credentials in a cloud-native lab.
URL:https://github.com/AlexSvobo/nhi-zero-trust-bypass
标签:#CVE-2025
更新了:CVE-2025
描述:Demonstrates a real-world zero-trust bypass by exploiting BIND CVE-2025-40775 to disrupt DNS, break secret rotation, and expose static credentials in a cloud-native lab.
URL:https://github.com/AlexSvobo/nhi-zero-trust-bypass
标签:#CVE-2025
GitHub
GitHub - AlexSvobo/nhi-zero-trust-bypass: Demonstrates a real-world zero-trust bypass by exploiting BIND CVE-2025-40775 to disrupt…
Demonstrates a real-world zero-trust bypass by exploiting BIND CVE-2025-40775 to disrupt DNS, break secret rotation, and expose static credentials in a cloud-native lab. - AlexSvobo/nhi-zero-trust-...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-4611
URL:https://github.com/x6vrn/CVE-2025-4611-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-4611
URL:https://github.com/x6vrn/CVE-2025-4611-PoC
标签:#CVE-2025
GitHub
GitHub - x6vrn/CVE-2025-4611-PoC: PoC for CVE-2025-4611
PoC for CVE-2025-4611. Contribute to x6vrn/CVE-2025-4611-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-46801 – Pgpool-II Authentication Bypass PoC
URL:https://github.com/korden-c/CVE-2025-46801
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-46801 – Pgpool-II Authentication Bypass PoC
URL:https://github.com/korden-c/CVE-2025-46801
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Remote Code Execution (RCE) exploit for Mobile Mouse 3.6.0.4 – fully automated payload generation, upload, and execution with integrated HTTP server support.
URL:https://github.com/CSpanias/mobile-mouse-rce
标签:#RCE
更新了:RCE
描述:Remote Code Execution (RCE) exploit for Mobile Mouse 3.6.0.4 – fully automated payload generation, upload, and execution with integrated HTTP server support.
URL:https://github.com/CSpanias/mobile-mouse-rce
标签:#RCE
GitHub
GitHub - CSpanias/mobile-mouse-rce: Remote Code Execution (RCE) exploit for Mobile Mouse 3.6.0.4 – fully automated payload generation…
Remote Code Execution (RCE) exploit for Mobile Mouse 3.6.0.4 – fully automated payload generation, upload, and execution with integrated HTTP server support. - CSpanias/mobile-mouse-rce
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2019-25137 is an Umbraco RCE vulnerability, the script within this repo is slightly altered
URL:https://github.com/dact91/CVE-2019-25137-RCE
标签:#RCE
更新了:RCE
描述:CVE-2019-25137 is an Umbraco RCE vulnerability, the script within this repo is slightly altered
URL:https://github.com/dact91/CVE-2019-25137-RCE
标签:#RCE
GitHub
GitHub - dact91/CVE-2019-25137-RCE: CVE-2019-25137 is an Umbraco RCE vulnerability, the script within this repo is slightly altered
CVE-2019-25137 is an Umbraco RCE vulnerability, the script within this repo is slightly altered - dact91/CVE-2019-25137-RCE
GitHub监控消息提醒!!!
更新了:红队
描述:SecureCheck 是一款适用于 macOS 系统的本地安全检测与清理工具,支持图形界面和命令行执行,具备中英文语言切换,适合开发者、红蓝队、企业终端合规自查。
URL:https://github.com/szwei8023/Secure-Check-App
标签:#红队
更新了:红队
描述:SecureCheck 是一款适用于 macOS 系统的本地安全检测与清理工具,支持图形界面和命令行执行,具备中英文语言切换,适合开发者、红蓝队、企业终端合规自查。
URL:https://github.com/szwei8023/Secure-Check-App
标签:#红队
GitHub
GitHub - szwei8023/Secure-Check-App: SecureCheck 是一款适用于 macOS 系统的本地安全检测与清理工具,支持图形界面和命令行执行,具备中英文语言切换,适合开发者、红蓝队、企业终端合规自查。
SecureCheck 是一款适用于 macOS 系统的本地安全检测与清理工具,支持图形界面和命令行执行,具备中英文语言切换,适合开发者、红蓝队、企业终端合规自查。 - szwei8023/Secure-Check-App
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ CVE-2025-31161 - CrushFTP User Creation Authentication Bypass Exploit
URL:https://github.com/0xgh057r3c0n/CVE-2025-31161
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ CVE-2025-31161 - CrushFTP User Creation Authentication Bypass Exploit
URL:https://github.com/0xgh057r3c0n/CVE-2025-31161
标签:#CVE-2025
GitHub
GitHub - 0xgh057r3c0n/CVE-2025-31161: 🛡️ CVE-2025-31161 - CrushFTP User Creation Authentication Bypass Exploit
🛡️ CVE-2025-31161 - CrushFTP User Creation Authentication Bypass Exploit - 0xgh057r3c0n/CVE-2025-31161
GitHub监控消息提醒!!!
更新了:RCE
描述:Non-RCE XWorm V5.6
URL:https://github.com/fortnitemodder/XWorm-Patched
标签:#RCE
更新了:RCE
描述:Non-RCE XWorm V5.6
URL:https://github.com/fortnitemodder/XWorm-Patched
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-4123
URL:https://github.com/kk12-30/CVE-2025-4123
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-4123
URL:https://github.com/kk12-30/CVE-2025-4123
标签:#CVE-2025
GitHub
GitHub - kk12-30/CVE-2025-4123: CVE-2025-4123
CVE-2025-4123. Contribute to kk12-30/CVE-2025-4123 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop
URL:https://github.com/akihi0342/Python-
标签:#渗透测试
更新了:渗透测试
描述:Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop
URL:https://github.com/akihi0342/Python-
标签:#渗透测试
GitHub
GitHub - akihi0342/Python-: 本项目致力于使用Python 3.9对常用渗透测试工具进行全面复现,是渗透测试与Python安全编程学习的优质资源。项目遵循"权衡工具与编程,实现最高效渗透测试"的理念,同时追求"不依赖工具,达到渗透测试最高境界"的目标。…
本项目致力于使用Python 3.9对常用渗透测试工具进行全面复现,是渗透测试与Python安全编程学习的优质资源。项目遵循"权衡工具与编程,实现最高效渗透测试"的理念,同时追求"不依赖工具,达到渗透测试最高境界"的目标。 所有工具和脚本均可直接用于实战环境,同时也是学习Python安全编程的理想范例。代码设计注重模块...
GitHub监控消息提醒!!!
更新了:RCE
描述:Authenticated RCE to Root Exploit for VestaCP using mailbox injection + webshell (standalone version based on rekter0’s PoC)
URL:https://github.com/CSpanias/vesta-rce-exploit
标签:#RCE
更新了:RCE
描述:Authenticated RCE to Root Exploit for VestaCP using mailbox injection + webshell (standalone version based on rekter0’s PoC)
URL:https://github.com/CSpanias/vesta-rce-exploit
标签:#RCE
GitHub
GitHub - CSpanias/vesta-rce-exploit: Authenticated RCE to Root Exploit for VestaCP using mailbox injection + webshell (standalone…
Authenticated RCE to Root Exploit for VestaCP using mailbox injection + webshell (standalone version based on rekter0’s PoC) - CSpanias/vesta-rce-exploit
GitHub监控消息提醒!!!
更新了:RCE
描述:The Official 2021 Synapse X RCE
URL:https://github.com/EchoDawnGhost32/GiftToHumanity
标签:#RCE
更新了:RCE
描述:The Official 2021 Synapse X RCE
URL:https://github.com/EchoDawnGhost32/GiftToHumanity
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:The Official 2021 Synapse X RCE
URL:https://github.com/BlackHatModed/GiftToHumanity
标签:#RCE
更新了:RCE
描述:The Official 2021 Synapse X RCE
URL:https://github.com/BlackHatModed/GiftToHumanity
标签:#RCE
GitHub
GitHub - BlackHatModed/GiftToHumanity: The Official 2021 Synapse X RCE
The Official 2021 Synapse X RCE. Contribute to BlackHatModed/GiftToHumanity development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Pluck v4.7.18 - Remote Code Execution (RCE)
URL:https://github.com/glynzr/CVE-2023-50564
标签:#RCE
更新了:RCE
描述:Pluck v4.7.18 - Remote Code Execution (RCE)
URL:https://github.com/glynzr/CVE-2023-50564
标签:#RCE
GitHub
GitHub - glynzr/CVE-2023-50564: Pluck v4.7.18 - Remote Code Execution (RCE)
Pluck v4.7.18 - Remote Code Execution (RCE). Contribute to glynzr/CVE-2023-50564 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/small-bears/yanglaoyuan
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/small-bears/yanglaoyuan
标签:#护网
GitHub
GitHub - small-bears/yanglaoyuan: 基于SpringBoot Vue养老院管理系统 java毕业设计,基于微信小程序,基于安卓App,机器学习,大数据毕业设计,Python+Django+Vue ,php ,node.js…
基于SpringBoot Vue养老院管理系统 java毕业设计,基于微信小程序,基于安卓App,机器学习,大数据毕业设计,Python+Django+Vue ,php ,node.js ,SpringBoot Vue,SSM,JSP ,Uniapp,hadoop和spark框架,hive框架,koa,go,springcloud,lavarel 角色:管理员、前台家属、护工 管理员:管理...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-36535 – AutomationDirect MB-Gateway Unauthenticated Remote Access Exploit
URL:https://github.com/korden-c/CVE-2025-36535
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-36535 – AutomationDirect MB-Gateway Unauthenticated Remote Access Exploit
URL:https://github.com/korden-c/CVE-2025-36535
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage
URL:https://github.com/B1tBreaker/CVE-2025-48708
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage
URL:https://github.com/B1tBreaker/CVE-2025-48708
标签:#CVE-2025
GitHub
GitHub - B1tBreaker/CVE-2025-48708: CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage
CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage - B1tBreaker/CVE-2025-48708