GitHub监控消息提醒!!!
更新了:RCE
描述:Remote Code Execution (RCE) exploit for Mobile Mouse 3.6.0.4 – fully automated payload generation, upload, and execution with integrated HTTP server support.
URL:https://github.com/CSpanias/mobile-mouse-rce
标签:#RCE
更新了:RCE
描述:Remote Code Execution (RCE) exploit for Mobile Mouse 3.6.0.4 – fully automated payload generation, upload, and execution with integrated HTTP server support.
URL:https://github.com/CSpanias/mobile-mouse-rce
标签:#RCE
GitHub
GitHub - CSpanias/mobile-mouse-rce: Remote Code Execution (RCE) exploit for Mobile Mouse 3.6.0.4 – fully automated payload generation…
Remote Code Execution (RCE) exploit for Mobile Mouse 3.6.0.4 – fully automated payload generation, upload, and execution with integrated HTTP server support. - CSpanias/mobile-mouse-rce
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2019-25137 is an Umbraco RCE vulnerability, the script within this repo is slightly altered
URL:https://github.com/dact91/CVE-2019-25137-RCE
标签:#RCE
更新了:RCE
描述:CVE-2019-25137 is an Umbraco RCE vulnerability, the script within this repo is slightly altered
URL:https://github.com/dact91/CVE-2019-25137-RCE
标签:#RCE
GitHub
GitHub - dact91/CVE-2019-25137-RCE: CVE-2019-25137 is an Umbraco RCE vulnerability, the script within this repo is slightly altered
CVE-2019-25137 is an Umbraco RCE vulnerability, the script within this repo is slightly altered - dact91/CVE-2019-25137-RCE
GitHub监控消息提醒!!!
更新了:红队
描述:SecureCheck 是一款适用于 macOS 系统的本地安全检测与清理工具,支持图形界面和命令行执行,具备中英文语言切换,适合开发者、红蓝队、企业终端合规自查。
URL:https://github.com/szwei8023/Secure-Check-App
标签:#红队
更新了:红队
描述:SecureCheck 是一款适用于 macOS 系统的本地安全检测与清理工具,支持图形界面和命令行执行,具备中英文语言切换,适合开发者、红蓝队、企业终端合规自查。
URL:https://github.com/szwei8023/Secure-Check-App
标签:#红队
GitHub
GitHub - szwei8023/Secure-Check-App: SecureCheck 是一款适用于 macOS 系统的本地安全检测与清理工具,支持图形界面和命令行执行,具备中英文语言切换,适合开发者、红蓝队、企业终端合规自查。
SecureCheck 是一款适用于 macOS 系统的本地安全检测与清理工具,支持图形界面和命令行执行,具备中英文语言切换,适合开发者、红蓝队、企业终端合规自查。 - szwei8023/Secure-Check-App
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ CVE-2025-31161 - CrushFTP User Creation Authentication Bypass Exploit
URL:https://github.com/0xgh057r3c0n/CVE-2025-31161
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ CVE-2025-31161 - CrushFTP User Creation Authentication Bypass Exploit
URL:https://github.com/0xgh057r3c0n/CVE-2025-31161
标签:#CVE-2025
GitHub
GitHub - 0xgh057r3c0n/CVE-2025-31161: 🛡️ CVE-2025-31161 - CrushFTP User Creation Authentication Bypass Exploit
🛡️ CVE-2025-31161 - CrushFTP User Creation Authentication Bypass Exploit - 0xgh057r3c0n/CVE-2025-31161
GitHub监控消息提醒!!!
更新了:RCE
描述:Non-RCE XWorm V5.6
URL:https://github.com/fortnitemodder/XWorm-Patched
标签:#RCE
更新了:RCE
描述:Non-RCE XWorm V5.6
URL:https://github.com/fortnitemodder/XWorm-Patched
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-4123
URL:https://github.com/kk12-30/CVE-2025-4123
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-4123
URL:https://github.com/kk12-30/CVE-2025-4123
标签:#CVE-2025
GitHub
GitHub - kk12-30/CVE-2025-4123: CVE-2025-4123
CVE-2025-4123. Contribute to kk12-30/CVE-2025-4123 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop
URL:https://github.com/akihi0342/Python-
标签:#渗透测试
更新了:渗透测试
描述:Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop
URL:https://github.com/akihi0342/Python-
标签:#渗透测试
GitHub
GitHub - akihi0342/Python-: 本项目致力于使用Python 3.9对常用渗透测试工具进行全面复现,是渗透测试与Python安全编程学习的优质资源。项目遵循"权衡工具与编程,实现最高效渗透测试"的理念,同时追求"不依赖工具,达到渗透测试最高境界"的目标。…
本项目致力于使用Python 3.9对常用渗透测试工具进行全面复现,是渗透测试与Python安全编程学习的优质资源。项目遵循"权衡工具与编程,实现最高效渗透测试"的理念,同时追求"不依赖工具,达到渗透测试最高境界"的目标。 所有工具和脚本均可直接用于实战环境,同时也是学习Python安全编程的理想范例。代码设计注重模块...
GitHub监控消息提醒!!!
更新了:RCE
描述:Authenticated RCE to Root Exploit for VestaCP using mailbox injection + webshell (standalone version based on rekter0’s PoC)
URL:https://github.com/CSpanias/vesta-rce-exploit
标签:#RCE
更新了:RCE
描述:Authenticated RCE to Root Exploit for VestaCP using mailbox injection + webshell (standalone version based on rekter0’s PoC)
URL:https://github.com/CSpanias/vesta-rce-exploit
标签:#RCE
GitHub
GitHub - CSpanias/vesta-rce-exploit: Authenticated RCE to Root Exploit for VestaCP using mailbox injection + webshell (standalone…
Authenticated RCE to Root Exploit for VestaCP using mailbox injection + webshell (standalone version based on rekter0’s PoC) - CSpanias/vesta-rce-exploit
GitHub监控消息提醒!!!
更新了:RCE
描述:The Official 2021 Synapse X RCE
URL:https://github.com/EchoDawnGhost32/GiftToHumanity
标签:#RCE
更新了:RCE
描述:The Official 2021 Synapse X RCE
URL:https://github.com/EchoDawnGhost32/GiftToHumanity
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:The Official 2021 Synapse X RCE
URL:https://github.com/BlackHatModed/GiftToHumanity
标签:#RCE
更新了:RCE
描述:The Official 2021 Synapse X RCE
URL:https://github.com/BlackHatModed/GiftToHumanity
标签:#RCE
GitHub
GitHub - BlackHatModed/GiftToHumanity: The Official 2021 Synapse X RCE
The Official 2021 Synapse X RCE. Contribute to BlackHatModed/GiftToHumanity development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Pluck v4.7.18 - Remote Code Execution (RCE)
URL:https://github.com/glynzr/CVE-2023-50564
标签:#RCE
更新了:RCE
描述:Pluck v4.7.18 - Remote Code Execution (RCE)
URL:https://github.com/glynzr/CVE-2023-50564
标签:#RCE
GitHub
GitHub - glynzr/CVE-2023-50564: Pluck v4.7.18 - Remote Code Execution (RCE)
Pluck v4.7.18 - Remote Code Execution (RCE). Contribute to glynzr/CVE-2023-50564 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/small-bears/yanglaoyuan
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/small-bears/yanglaoyuan
标签:#护网
GitHub
GitHub - small-bears/yanglaoyuan: 基于SpringBoot Vue养老院管理系统 java毕业设计,基于微信小程序,基于安卓App,机器学习,大数据毕业设计,Python+Django+Vue ,php ,node.js…
基于SpringBoot Vue养老院管理系统 java毕业设计,基于微信小程序,基于安卓App,机器学习,大数据毕业设计,Python+Django+Vue ,php ,node.js ,SpringBoot Vue,SSM,JSP ,Uniapp,hadoop和spark框架,hive框架,koa,go,springcloud,lavarel 角色:管理员、前台家属、护工 管理员:管理...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-36535 – AutomationDirect MB-Gateway Unauthenticated Remote Access Exploit
URL:https://github.com/korden-c/CVE-2025-36535
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-36535 – AutomationDirect MB-Gateway Unauthenticated Remote Access Exploit
URL:https://github.com/korden-c/CVE-2025-36535
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage
URL:https://github.com/B1tBreaker/CVE-2025-48708
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage
URL:https://github.com/B1tBreaker/CVE-2025-48708
标签:#CVE-2025
GitHub
GitHub - B1tBreaker/CVE-2025-48708: CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage
CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage - B1tBreaker/CVE-2025-48708
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)
URL:https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-
标签:#CVE-2025
更新了:CVE-2025
描述:Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)
URL:https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-
标签:#CVE-2025
GitHub
GitHub - mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-: Apache Tomcat - Remote Code…
Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813) - mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24203漏洞
URL:https://github.com/pxx917144686/iDevice_ZH
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24203漏洞
URL:https://github.com/pxx917144686/iDevice_ZH
标签:#CVE-2025
GitHub
GitHub - pxx917144686/iDevice_ZH: CVE-2025-24203漏洞
CVE-2025-24203漏洞. Contribute to pxx917144686/iDevice_ZH development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-4664 – Remote Code Execution via Chrome Loader Referrer Policy Bypass
URL:https://github.com/korden-c/CVE-2025-4664
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-4664 – Remote Code Execution via Chrome Loader Referrer Policy Bypass
URL:https://github.com/korden-c/CVE-2025-4664
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server Enabler and gain RCE via xp_cmdshell
URL:https://github.com/omershaik0/SAP-B1-ZedIT-Server-Exploit
标签:#RCE
更新了:RCE
描述:Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server Enabler and gain RCE via xp_cmdshell
URL:https://github.com/omershaik0/SAP-B1-ZedIT-Server-Exploit
标签:#RCE
GitHub
GitHub - omershaik0/SAP-B1-ZedIT-Server-Exploit: Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server…
Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server Enabler and gain RCE via xp_cmdshell - omershaik0/SAP-B1-ZedIT-Server-Exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
URL:https://github.com/f4dee-backup/CVE-2025-24071
标签:#CVE-2025
更新了:CVE-2025
描述:Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
URL:https://github.com/f4dee-backup/CVE-2025-24071
标签:#CVE-2025
GitHub
GitHub - f4dee-backup/CVE-2025-24071: Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
Windows File Explorer Spoofing Vulnerability - CVE-2025-24071 - f4dee-backup/CVE-2025-24071