GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ CVE-2025-31161 - CrushFTP User Creation Authentication Bypass Exploit
URL:https://github.com/0xgh057r3c0n/CVE-2025-31161
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ CVE-2025-31161 - CrushFTP User Creation Authentication Bypass Exploit
URL:https://github.com/0xgh057r3c0n/CVE-2025-31161
标签:#CVE-2025
GitHub
GitHub - 0xgh057r3c0n/CVE-2025-31161: 🛡️ CVE-2025-31161 - CrushFTP User Creation Authentication Bypass Exploit
🛡️ CVE-2025-31161 - CrushFTP User Creation Authentication Bypass Exploit - 0xgh057r3c0n/CVE-2025-31161
GitHub监控消息提醒!!!
更新了:RCE
描述:Non-RCE XWorm V5.6
URL:https://github.com/fortnitemodder/XWorm-Patched
标签:#RCE
更新了:RCE
描述:Non-RCE XWorm V5.6
URL:https://github.com/fortnitemodder/XWorm-Patched
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-4123
URL:https://github.com/kk12-30/CVE-2025-4123
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-4123
URL:https://github.com/kk12-30/CVE-2025-4123
标签:#CVE-2025
GitHub
GitHub - kk12-30/CVE-2025-4123: CVE-2025-4123
CVE-2025-4123. Contribute to kk12-30/CVE-2025-4123 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop
URL:https://github.com/akihi0342/Python-
标签:#渗透测试
更新了:渗透测试
描述:Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop
URL:https://github.com/akihi0342/Python-
标签:#渗透测试
GitHub
GitHub - akihi0342/Python-: 本项目致力于使用Python 3.9对常用渗透测试工具进行全面复现,是渗透测试与Python安全编程学习的优质资源。项目遵循"权衡工具与编程,实现最高效渗透测试"的理念,同时追求"不依赖工具,达到渗透测试最高境界"的目标。…
本项目致力于使用Python 3.9对常用渗透测试工具进行全面复现,是渗透测试与Python安全编程学习的优质资源。项目遵循"权衡工具与编程,实现最高效渗透测试"的理念,同时追求"不依赖工具,达到渗透测试最高境界"的目标。 所有工具和脚本均可直接用于实战环境,同时也是学习Python安全编程的理想范例。代码设计注重模块...
GitHub监控消息提醒!!!
更新了:RCE
描述:Authenticated RCE to Root Exploit for VestaCP using mailbox injection + webshell (standalone version based on rekter0’s PoC)
URL:https://github.com/CSpanias/vesta-rce-exploit
标签:#RCE
更新了:RCE
描述:Authenticated RCE to Root Exploit for VestaCP using mailbox injection + webshell (standalone version based on rekter0’s PoC)
URL:https://github.com/CSpanias/vesta-rce-exploit
标签:#RCE
GitHub
GitHub - CSpanias/vesta-rce-exploit: Authenticated RCE to Root Exploit for VestaCP using mailbox injection + webshell (standalone…
Authenticated RCE to Root Exploit for VestaCP using mailbox injection + webshell (standalone version based on rekter0’s PoC) - CSpanias/vesta-rce-exploit
GitHub监控消息提醒!!!
更新了:RCE
描述:The Official 2021 Synapse X RCE
URL:https://github.com/EchoDawnGhost32/GiftToHumanity
标签:#RCE
更新了:RCE
描述:The Official 2021 Synapse X RCE
URL:https://github.com/EchoDawnGhost32/GiftToHumanity
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:The Official 2021 Synapse X RCE
URL:https://github.com/BlackHatModed/GiftToHumanity
标签:#RCE
更新了:RCE
描述:The Official 2021 Synapse X RCE
URL:https://github.com/BlackHatModed/GiftToHumanity
标签:#RCE
GitHub
GitHub - BlackHatModed/GiftToHumanity: The Official 2021 Synapse X RCE
The Official 2021 Synapse X RCE. Contribute to BlackHatModed/GiftToHumanity development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Pluck v4.7.18 - Remote Code Execution (RCE)
URL:https://github.com/glynzr/CVE-2023-50564
标签:#RCE
更新了:RCE
描述:Pluck v4.7.18 - Remote Code Execution (RCE)
URL:https://github.com/glynzr/CVE-2023-50564
标签:#RCE
GitHub
GitHub - glynzr/CVE-2023-50564: Pluck v4.7.18 - Remote Code Execution (RCE)
Pluck v4.7.18 - Remote Code Execution (RCE). Contribute to glynzr/CVE-2023-50564 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/small-bears/yanglaoyuan
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/small-bears/yanglaoyuan
标签:#护网
GitHub
GitHub - small-bears/yanglaoyuan: 基于SpringBoot Vue养老院管理系统 java毕业设计,基于微信小程序,基于安卓App,机器学习,大数据毕业设计,Python+Django+Vue ,php ,node.js…
基于SpringBoot Vue养老院管理系统 java毕业设计,基于微信小程序,基于安卓App,机器学习,大数据毕业设计,Python+Django+Vue ,php ,node.js ,SpringBoot Vue,SSM,JSP ,Uniapp,hadoop和spark框架,hive框架,koa,go,springcloud,lavarel 角色:管理员、前台家属、护工 管理员:管理...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-36535 – AutomationDirect MB-Gateway Unauthenticated Remote Access Exploit
URL:https://github.com/korden-c/CVE-2025-36535
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-36535 – AutomationDirect MB-Gateway Unauthenticated Remote Access Exploit
URL:https://github.com/korden-c/CVE-2025-36535
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage
URL:https://github.com/B1tBreaker/CVE-2025-48708
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage
URL:https://github.com/B1tBreaker/CVE-2025-48708
标签:#CVE-2025
GitHub
GitHub - B1tBreaker/CVE-2025-48708: CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage
CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage - B1tBreaker/CVE-2025-48708
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)
URL:https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-
标签:#CVE-2025
更新了:CVE-2025
描述:Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)
URL:https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-
标签:#CVE-2025
GitHub
GitHub - mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-: Apache Tomcat - Remote Code…
Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813) - mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24203漏洞
URL:https://github.com/pxx917144686/iDevice_ZH
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24203漏洞
URL:https://github.com/pxx917144686/iDevice_ZH
标签:#CVE-2025
GitHub
GitHub - pxx917144686/iDevice_ZH: CVE-2025-24203漏洞
CVE-2025-24203漏洞. Contribute to pxx917144686/iDevice_ZH development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-4664 – Remote Code Execution via Chrome Loader Referrer Policy Bypass
URL:https://github.com/korden-c/CVE-2025-4664
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-4664 – Remote Code Execution via Chrome Loader Referrer Policy Bypass
URL:https://github.com/korden-c/CVE-2025-4664
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server Enabler and gain RCE via xp_cmdshell
URL:https://github.com/omershaik0/SAP-B1-ZedIT-Server-Exploit
标签:#RCE
更新了:RCE
描述:Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server Enabler and gain RCE via xp_cmdshell
URL:https://github.com/omershaik0/SAP-B1-ZedIT-Server-Exploit
标签:#RCE
GitHub
GitHub - omershaik0/SAP-B1-ZedIT-Server-Exploit: Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server…
Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server Enabler and gain RCE via xp_cmdshell - omershaik0/SAP-B1-ZedIT-Server-Exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
URL:https://github.com/f4dee-backup/CVE-2025-24071
标签:#CVE-2025
更新了:CVE-2025
描述:Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
URL:https://github.com/f4dee-backup/CVE-2025-24071
标签:#CVE-2025
GitHub
GitHub - f4dee-backup/CVE-2025-24071: Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
Windows File Explorer Spoofing Vulnerability - CVE-2025-24071 - f4dee-backup/CVE-2025-24071
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:poc for the CVE-2025-46173
URL:https://github.com/pruthuraut/CVE-2025-46173
标签:#CVE-2025
更新了:CVE-2025
描述:poc for the CVE-2025-46173
URL:https://github.com/pruthuraut/CVE-2025-46173
标签:#CVE-2025
GitHub
GitHub - pruthuraut/CVE-2025-46173: poc for the CVE-2025-46173
poc for the CVE-2025-46173. Contribute to pruthuraut/CVE-2025-46173 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:攻防
描述:# 北京理工大学软件工程《数据库设计与开发》实验9 网络攻防对抗技术研究所管理系统
URL:https://github.com/xiaobai-cn21/BIT-SoftwareEngineering-DB-Experiment9-NetworkDefenseSystem
标签:#攻防
更新了:攻防
描述:# 北京理工大学软件工程《数据库设计与开发》实验9 网络攻防对抗技术研究所管理系统
URL:https://github.com/xiaobai-cn21/BIT-SoftwareEngineering-DB-Experiment9-NetworkDefenseSystem
标签:#攻防
GitHub
GitHub - xiaobai-cn21/BIT-SoftwareEngineering-DB-Experiment9-NetworkDefenseSystem: # 北京理工大学软件工程《数据库设计与开发》实验9 网络攻防对抗技术研究所管理系统
# 北京理工大学软件工程《数据库设计与开发》实验9 网络攻防对抗技术研究所管理系统 . Contribute to xiaobai-cn21/BIT-SoftwareEngineering-DB-Experiment9-NetworkDefenseSystem development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability. Detects meta refresh, keyword-based redirects, and more.
URL:https://github.com/sagsooz/CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability. Detects meta refresh, keyword-based redirects, and more.
URL:https://github.com/sagsooz/CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - sagsooz/CVE-2025-29927: 🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability.…
🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability. Detects meta refresh, keyword-based redirects, and more. - sagsooz/CVE-2025-29927
GitHub监控消息提醒!!!
更新了:信息收集
描述:本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。
URL:https://github.com/wang-moo/outsourcing-company
标签:#信息收集
更新了:信息收集
描述:本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。
URL:https://github.com/wang-moo/outsourcing-company
标签:#信息收集
GitHub
GitHub - wang-moo/outsourcing-company: 本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。
本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。. Contribute to wang-moo/outsourcing-company development by creating an account on GitHub.