GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-36535 – AutomationDirect MB-Gateway Unauthenticated Remote Access Exploit
URL:https://github.com/korden-c/CVE-2025-36535
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-36535 – AutomationDirect MB-Gateway Unauthenticated Remote Access Exploit
URL:https://github.com/korden-c/CVE-2025-36535
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage
URL:https://github.com/B1tBreaker/CVE-2025-48708
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage
URL:https://github.com/B1tBreaker/CVE-2025-48708
标签:#CVE-2025
GitHub
GitHub - B1tBreaker/CVE-2025-48708: CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage
CVE-2025-48708 Ghostscript PDF lack of argument sanitization leading to password leakage - B1tBreaker/CVE-2025-48708
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)
URL:https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-
标签:#CVE-2025
更新了:CVE-2025
描述:Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)
URL:https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-
标签:#CVE-2025
GitHub
GitHub - mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-: Apache Tomcat - Remote Code…
Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813) - mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24203漏洞
URL:https://github.com/pxx917144686/iDevice_ZH
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24203漏洞
URL:https://github.com/pxx917144686/iDevice_ZH
标签:#CVE-2025
GitHub
GitHub - pxx917144686/iDevice_ZH: CVE-2025-24203漏洞
CVE-2025-24203漏洞. Contribute to pxx917144686/iDevice_ZH development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-4664 – Remote Code Execution via Chrome Loader Referrer Policy Bypass
URL:https://github.com/korden-c/CVE-2025-4664
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-4664 – Remote Code Execution via Chrome Loader Referrer Policy Bypass
URL:https://github.com/korden-c/CVE-2025-4664
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server Enabler and gain RCE via xp_cmdshell
URL:https://github.com/omershaik0/SAP-B1-ZedIT-Server-Exploit
标签:#RCE
更新了:RCE
描述:Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server Enabler and gain RCE via xp_cmdshell
URL:https://github.com/omershaik0/SAP-B1-ZedIT-Server-Exploit
标签:#RCE
GitHub
GitHub - omershaik0/SAP-B1-ZedIT-Server-Exploit: Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server…
Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server Enabler and gain RCE via xp_cmdshell - omershaik0/SAP-B1-ZedIT-Server-Exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
URL:https://github.com/f4dee-backup/CVE-2025-24071
标签:#CVE-2025
更新了:CVE-2025
描述:Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
URL:https://github.com/f4dee-backup/CVE-2025-24071
标签:#CVE-2025
GitHub
GitHub - f4dee-backup/CVE-2025-24071: Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
Windows File Explorer Spoofing Vulnerability - CVE-2025-24071 - f4dee-backup/CVE-2025-24071
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:poc for the CVE-2025-46173
URL:https://github.com/pruthuraut/CVE-2025-46173
标签:#CVE-2025
更新了:CVE-2025
描述:poc for the CVE-2025-46173
URL:https://github.com/pruthuraut/CVE-2025-46173
标签:#CVE-2025
GitHub
GitHub - pruthuraut/CVE-2025-46173: poc for the CVE-2025-46173
poc for the CVE-2025-46173. Contribute to pruthuraut/CVE-2025-46173 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:攻防
描述:# 北京理工大学软件工程《数据库设计与开发》实验9 网络攻防对抗技术研究所管理系统
URL:https://github.com/xiaobai-cn21/BIT-SoftwareEngineering-DB-Experiment9-NetworkDefenseSystem
标签:#攻防
更新了:攻防
描述:# 北京理工大学软件工程《数据库设计与开发》实验9 网络攻防对抗技术研究所管理系统
URL:https://github.com/xiaobai-cn21/BIT-SoftwareEngineering-DB-Experiment9-NetworkDefenseSystem
标签:#攻防
GitHub
GitHub - xiaobai-cn21/BIT-SoftwareEngineering-DB-Experiment9-NetworkDefenseSystem: # 北京理工大学软件工程《数据库设计与开发》实验9 网络攻防对抗技术研究所管理系统
# 北京理工大学软件工程《数据库设计与开发》实验9 网络攻防对抗技术研究所管理系统 . Contribute to xiaobai-cn21/BIT-SoftwareEngineering-DB-Experiment9-NetworkDefenseSystem development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability. Detects meta refresh, keyword-based redirects, and more.
URL:https://github.com/sagsooz/CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability. Detects meta refresh, keyword-based redirects, and more.
URL:https://github.com/sagsooz/CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - sagsooz/CVE-2025-29927: 🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability.…
🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability. Detects meta refresh, keyword-based redirects, and more. - sagsooz/CVE-2025-29927
GitHub监控消息提醒!!!
更新了:信息收集
描述:本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。
URL:https://github.com/wang-moo/outsourcing-company
标签:#信息收集
更新了:信息收集
描述:本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。
URL:https://github.com/wang-moo/outsourcing-company
标签:#信息收集
GitHub
GitHub - wang-moo/outsourcing-company: 本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。
本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。. Contribute to wang-moo/outsourcing-company development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071
URL:https://github.com/helidem/CVE-2025-24054_CVE-2025-24071-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071
URL:https://github.com/helidem/CVE-2025-24054_CVE-2025-24071-PoC
标签:#CVE-2025
GitHub
GitHub - helidem/CVE-2025-24054_CVE-2025-24071-PoC: Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE…
Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071 - helidem/CVE-2025-24054_CVE-2025-24071-PoC
GitHub监控消息提醒!!!
更新了:RCE
描述:It a Xworm fix and RCE,Versions 5.6
URL:https://github.com/SoVA48/XWORM-RCE-fix-V5.6
标签:#RCE
更新了:RCE
描述:It a Xworm fix and RCE,Versions 5.6
URL:https://github.com/SoVA48/XWORM-RCE-fix-V5.6
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
URL:https://github.com/Nouvexr/Wing-FTP-Server-7.4.4-RCE-Authenticated
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
URL:https://github.com/Nouvexr/Wing-FTP-Server-7.4.4-RCE-Authenticated
标签:#CVE-2025
GitHub
Unauthenticated Remote Code Execution in Erlang/OTP SSH
### Summary
A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SS...
A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SS...
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE vulnerable simple application for testing purpose
URL:https://github.com/veldrane/app-pinger-vulnerable
标签:#RCE
更新了:RCE
描述:RCE vulnerable simple application for testing purpose
URL:https://github.com/veldrane/app-pinger-vulnerable
标签:#RCE
GitHub
veldrane/app-pinger-vulnerable
RCE vulnerable simple application for testing purpose - veldrane/app-pinger-vulnerable
GitHub监控消息提醒!!!
更新了:渗透测试
描述:基于 Vue + SpringBoot 构建的 Java 安全靶场,一个专为安全爱好者、渗透测试代码审计人员打造的前后端分离的实战演练平台。
URL:https://github.com/Grand38D/Ubuntu_Init
标签:#渗透测试
更新了:渗透测试
描述:基于 Vue + SpringBoot 构建的 Java 安全靶场,一个专为安全爱好者、渗透测试代码审计人员打造的前后端分离的实战演练平台。
URL:https://github.com/Grand38D/Ubuntu_Init
标签:#渗透测试
GitHub
GitHub - Grand38D/Ubuntu_Init: According to the expert's documentation, I wrote a bash script to initialize the Ubuntu virtual…
According to the expert's documentation, I wrote a bash script to initialize the Ubuntu virtual machine for penetration testing. Applicable to Ubuntu 20.04/22.04 and derived systems 根据大佬的文档...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop
URL:https://github.com/Grand38D/CentOS_init
标签:#渗透测试
更新了:渗透测试
描述:Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop
URL:https://github.com/Grand38D/CentOS_init
标签:#渗透测试
GitHub
GitHub - Grand38D/CentOS_init: According to the expert's documentation, I wrote a bash script to initialize the Ubuntu virtual…
According to the expert's documentation, I wrote a bash script to initialize the Ubuntu virtual machine for penetration testing. Applicable to Ubuntu 20.04/22.04 and derived systems 根据大佬的文档...
GitHub监控消息提醒!!!
更新了:RCE
描述:Plugin para dimensionamento de RCE no QGIS
URL:https://github.com/WanderiloLima2025/Sewercalc
标签:#RCE
更新了:RCE
描述:Plugin para dimensionamento de RCE no QGIS
URL:https://github.com/WanderiloLima2025/Sewercalc
标签:#RCE
GitHub
GitHub - WanderiloLima2025/Sewercalc: Plugin para dimensionamento de RCE no QGIS
Plugin para dimensionamento de RCE no QGIS. Contribute to WanderiloLima2025/Sewercalc development by creating an account on GitHub.