GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability. Detects meta refresh, keyword-based redirects, and more.
URL:https://github.com/sagsooz/CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability. Detects meta refresh, keyword-based redirects, and more.
URL:https://github.com/sagsooz/CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - sagsooz/CVE-2025-29927: 🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability.…
🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability. Detects meta refresh, keyword-based redirects, and more. - sagsooz/CVE-2025-29927
GitHub监控消息提醒!!!
更新了:信息收集
描述:本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。
URL:https://github.com/wang-moo/outsourcing-company
标签:#信息收集
更新了:信息收集
描述:本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。
URL:https://github.com/wang-moo/outsourcing-company
标签:#信息收集
GitHub
GitHub - wang-moo/outsourcing-company: 本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。
本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。. Contribute to wang-moo/outsourcing-company development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071
URL:https://github.com/helidem/CVE-2025-24054_CVE-2025-24071-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071
URL:https://github.com/helidem/CVE-2025-24054_CVE-2025-24071-PoC
标签:#CVE-2025
GitHub
GitHub - helidem/CVE-2025-24054_CVE-2025-24071-PoC: Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE…
Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071 - helidem/CVE-2025-24054_CVE-2025-24071-PoC
GitHub监控消息提醒!!!
更新了:RCE
描述:It a Xworm fix and RCE,Versions 5.6
URL:https://github.com/SoVA48/XWORM-RCE-fix-V5.6
标签:#RCE
更新了:RCE
描述:It a Xworm fix and RCE,Versions 5.6
URL:https://github.com/SoVA48/XWORM-RCE-fix-V5.6
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
URL:https://github.com/Nouvexr/Wing-FTP-Server-7.4.4-RCE-Authenticated
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
URL:https://github.com/Nouvexr/Wing-FTP-Server-7.4.4-RCE-Authenticated
标签:#CVE-2025
GitHub
Unauthenticated Remote Code Execution in Erlang/OTP SSH
### Summary
A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SS...
A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SS...
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE vulnerable simple application for testing purpose
URL:https://github.com/veldrane/app-pinger-vulnerable
标签:#RCE
更新了:RCE
描述:RCE vulnerable simple application for testing purpose
URL:https://github.com/veldrane/app-pinger-vulnerable
标签:#RCE
GitHub
veldrane/app-pinger-vulnerable
RCE vulnerable simple application for testing purpose - veldrane/app-pinger-vulnerable
GitHub监控消息提醒!!!
更新了:渗透测试
描述:基于 Vue + SpringBoot 构建的 Java 安全靶场,一个专为安全爱好者、渗透测试代码审计人员打造的前后端分离的实战演练平台。
URL:https://github.com/Grand38D/Ubuntu_Init
标签:#渗透测试
更新了:渗透测试
描述:基于 Vue + SpringBoot 构建的 Java 安全靶场,一个专为安全爱好者、渗透测试代码审计人员打造的前后端分离的实战演练平台。
URL:https://github.com/Grand38D/Ubuntu_Init
标签:#渗透测试
GitHub
GitHub - Grand38D/Ubuntu_Init: According to the expert's documentation, I wrote a bash script to initialize the Ubuntu virtual…
According to the expert's documentation, I wrote a bash script to initialize the Ubuntu virtual machine for penetration testing. Applicable to Ubuntu 20.04/22.04 and derived systems 根据大佬的文档...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop
URL:https://github.com/Grand38D/CentOS_init
标签:#渗透测试
更新了:渗透测试
描述:Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop
URL:https://github.com/Grand38D/CentOS_init
标签:#渗透测试
GitHub
GitHub - Grand38D/CentOS_init: According to the expert's documentation, I wrote a bash script to initialize the Ubuntu virtual…
According to the expert's documentation, I wrote a bash script to initialize the Ubuntu virtual machine for penetration testing. Applicable to Ubuntu 20.04/22.04 and derived systems 根据大佬的文档...
GitHub监控消息提醒!!!
更新了:RCE
描述:Plugin para dimensionamento de RCE no QGIS
URL:https://github.com/WanderiloLima2025/Sewercalc
标签:#RCE
更新了:RCE
描述:Plugin para dimensionamento de RCE no QGIS
URL:https://github.com/WanderiloLima2025/Sewercalc
标签:#RCE
GitHub
GitHub - WanderiloLima2025/Sewercalc: Plugin para dimensionamento de RCE no QGIS
Plugin para dimensionamento de RCE no QGIS. Contribute to WanderiloLima2025/Sewercalc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Cyber world will be a repository for some remote attack scripts. RCE attack.
URL:https://github.com/IhebZanina/cyber-word
标签:#RCE
更新了:RCE
描述:Cyber world will be a repository for some remote attack scripts. RCE attack.
URL:https://github.com/IhebZanina/cyber-word
标签:#RCE
GitHub
GitHub - IhebZanina/cyber-word: Cyber world will be a repository for some remote attack scripts. RCE attack.
Cyber world will be a repository for some remote attack scripts. RCE attack. - IhebZanina/cyber-word
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-22252 – Authentication Bypass in Fortinet Products
URL:https://github.com/korden-c/CVE-2025-22252
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-22252 – Authentication Bypass in Fortinet Products
URL:https://github.com/korden-c/CVE-2025-22252
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:POC for CVE-2018-8097 This script exploits CVE-2018-8097 and can retrieve files and contents using a blind RCE method.
URL:https://github.com/StellarDriftLabs/CVE-2018-8097
标签:#RCE
更新了:RCE
描述:POC for CVE-2018-8097 This script exploits CVE-2018-8097 and can retrieve files and contents using a blind RCE method.
URL:https://github.com/StellarDriftLabs/CVE-2018-8097
标签:#RCE
GitHub
GitHub - StellarDriftLabs/CVE-2018-8097: POC for CVE-2018-8097 This script exploits CVE-2018-8097 and can retrieve files and contents…
POC for CVE-2018-8097 This script exploits CVE-2018-8097 and can retrieve files and contents using a blind RCE method. - StellarDriftLabs/CVE-2018-8097
GitHub监控消息提醒!!!
更新了:RCE
描述:POC for CVE-2018-8097 This script exploits CVE-2018-8097 and can retrieve files and contents using a blind RCE method.
URL:https://github.com/StellarDriftLabs/CVE-2018-8097-PoC
标签:#RCE
更新了:RCE
描述:POC for CVE-2018-8097 This script exploits CVE-2018-8097 and can retrieve files and contents using a blind RCE method.
URL:https://github.com/StellarDriftLabs/CVE-2018-8097-PoC
标签:#RCE
GitHub
GitHub - StellarDriftLabs/CVE-2018-8097-PoC: POC for CVE-2018-8097 This script exploits CVE-2018-8097 and can retrieve files and…
POC for CVE-2018-8097 This script exploits CVE-2018-8097 and can retrieve files and contents using a blind RCE method. - StellarDriftLabs/CVE-2018-8097-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Advanced AI-Powered Exploitation Framework | CVE-2025-4664 & CVE-2025-2783 & CVE-2025-2857 & CVE-2025-30397 |
URL:https://github.com/Leviticus-Triage/ChromSploit-Framework
标签:#CVE-2025
更新了:CVE-2025
描述:Advanced AI-Powered Exploitation Framework | CVE-2025-4664 & CVE-2025-2783 & CVE-2025-2857 & CVE-2025-30397 |
URL:https://github.com/Leviticus-Triage/ChromSploit-Framework
标签:#CVE-2025
GitHub
GitHub - Leviticus-Triage/ChromSploit-Framework: Advanced AI-Powered Exploitation Framework | CVE-2025-4664 & CVE-2025-2783 &…
Advanced AI-Powered Exploitation Framework | CVE-2025-4664 & CVE-2025-2783 & CVE-2025-2857 & CVE-2025-30397 | - GitHub - Leviticus-Triage/ChromSploit-Framework: Advance...
GitHub监控消息提醒!!!
更新了:反序列化
描述:一个基于Newtonsoft json的轻量Unity Json工具,提供简单好用的提供序列化和反序列化实用程序。
URL:https://github.com/le0der-tools/com.le0der.json
标签:#反序列化
更新了:反序列化
描述:一个基于Newtonsoft json的轻量Unity Json工具,提供简单好用的提供序列化和反序列化实用程序。
URL:https://github.com/le0der-tools/com.le0der.json
标签:#反序列化
GitHub
GitHub - le0der-tools/com.le0der.json: 一个基于Newtonsoft json的轻量Unity Json工具,提供简单好用的提供序列化和反序列化实用程序。
一个基于Newtonsoft json的轻量Unity Json工具,提供简单好用的提供序列化和反序列化实用程序。 - le0der-tools/com.le0der.json
GitHub监控消息提醒!!!
更新了:渗透测试
描述:LingJing 是一款专为复杂网络环境渗透测试需求打造的本地网络安全靶场平台
URL:https://github.com/414aaj/LingJing
标签:#渗透测试
更新了:渗透测试
描述:LingJing 是一款专为复杂网络环境渗透测试需求打造的本地网络安全靶场平台
URL:https://github.com/414aaj/LingJing
标签:#渗透测试
GitHub
GitHub - 414aaj/LingJing: LingJing 是一款由go+fyne打造的满足复杂网络环境渗透测试需求的本地网络安全靶场平台(支持在线一键安装靶机)
LingJing 是一款由go+fyne打造的满足复杂网络环境渗透测试需求的本地网络安全靶场平台(支持在线一键安装靶机) - 414aaj/LingJing
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:the information for the vulnerability covered by CVE-2025-29632
URL:https://github.com/OHnogood/CVE-2025-29632
标签:#CVE-2025
更新了:CVE-2025
描述:the information for the vulnerability covered by CVE-2025-29632
URL:https://github.com/OHnogood/CVE-2025-29632
标签:#CVE-2025
GitHub
GitHub - OHnogood/CVE-2025-29632: the information for the vulnerability covered by CVE-2025-29632
the information for the vulnerability covered by CVE-2025-29632 - OHnogood/CVE-2025-29632
GitHub监控消息提醒!!!
更新了:护网
描述:护网期间或日常运维期间,运维人员或网络安全人员使用的网站内容安全 + 实时监测告警工具
URL:https://github.com/Zer08Bytes/SentinelSite
标签:#护网
更新了:护网
描述:护网期间或日常运维期间,运维人员或网络安全人员使用的网站内容安全 + 实时监测告警工具
URL:https://github.com/Zer08Bytes/SentinelSite
标签:#护网
GitHub
GitHub - Zer08Bytes/SentinelSite: 护网期间或日常运维期间,运维人员或网络安全人员使用的网站内容安全 + 实时监测告警工具
护网期间或日常运维期间,运维人员或网络安全人员使用的网站内容安全 + 实时监测告警工具. Contribute to Zer08Bytes/SentinelSite development by creating an account on GitHub.