GitHub监控消息提醒!!!
更新了:代码审计
描述:运维管理平台(agent端代码) ,平台是集轻量化、极简操作、高效运维为一体的智能运维平台,具备纳管、监控、巡检、自愈、支持异构网络环境、秒级执行运维作业、多云管理,运维工单、k8s集群管理,webshell,安全审计,堡垒机等功能。
URL:https://github.com/wylok/opsone-dog
标签:#代码审计
更新了:代码审计
描述:运维管理平台(agent端代码) ,平台是集轻量化、极简操作、高效运维为一体的智能运维平台,具备纳管、监控、巡检、自愈、支持异构网络环境、秒级执行运维作业、多云管理,运维工单、k8s集群管理,webshell,安全审计,堡垒机等功能。
URL:https://github.com/wylok/opsone-dog
标签:#代码审计
GitHub监控消息提醒!!!
更新了:RCE
描述:Peyara Remote Mouse v2.0.0- Remote Code Execution (RCE)
URL:https://github.com/capture0x/Peyara
标签:#RCE
更新了:RCE
描述:Peyara Remote Mouse v2.0.0- Remote Code Execution (RCE)
URL:https://github.com/capture0x/Peyara
标签:#RCE
GitHub
GitHub - capture0x/Peyara: Peyara Remote Mouse v1.0.1- Remote Code Execution (RCE)
Peyara Remote Mouse v1.0.1- Remote Code Execution (RCE) - GitHub - capture0x/Peyara: Peyara Remote Mouse v1.0.1- Remote Code Execution (RCE)
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-20188: Unauthenticated RCE in Cisco IOS XE WLC via Hard-Coded JWT
URL:https://github.com/voyagken/CVE-2025-20188
标签:#RCE
更新了:RCE
描述:CVE-2025-20188: Unauthenticated RCE in Cisco IOS XE WLC via Hard-Coded JWT
URL:https://github.com/voyagken/CVE-2025-20188
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
URL:https://github.com/mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
标签:#CVE-2025
更新了:CVE-2025
描述:Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
URL:https://github.com/mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
标签:#CVE-2025
GitHub
GitHub - mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-: Remote Code Execution via Use-After-Free in…
Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397) - mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Vbullettin RCE - CVE-2025-48827
URL:https://github.com/wiseep/CVE-2025-48827
标签:#CVE-2025
更新了:CVE-2025
描述:Vbullettin RCE - CVE-2025-48827
URL:https://github.com/wiseep/CVE-2025-48827
标签:#CVE-2025
GitHub
GitHub - wiseep/CVE-2025-48827: Vbullettin RCE - CVE-2025-48827
Vbullettin RCE - CVE-2025-48827. Contribute to wiseep/CVE-2025-48827 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/adam20222222/PEGASUS-2025
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/adam20222222/PEGASUS-2025
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:SMB RCE 취약점 공격 절차 관련 파일
URL:https://github.com/2025CJUSIEM/smb-rce-attack
标签:#RCE
更新了:RCE
描述:SMB RCE 취약점 공격 절차 관련 파일
URL:https://github.com/2025CJUSIEM/smb-rce-attack
标签:#RCE
GitHub
GitHub - 2025CJUSIEM/smb-rce-attack: SMB RCE 취약점 공격 절차 관련 파일
SMB RCE 취약점 공격 절차 관련 파일. Contribute to 2025CJUSIEM/smb-rce-attack development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Quelvara/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Quelvara/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:反序列化
描述:一个灵活的本地存储工具, 基于 TypeScript 实现, 支持 localStorage, sessionStorage 及自定义存储; 通过 StorageCore 类, 可以方便地进行数据的序列化, 反序列化, 存储和读取。
URL:https://github.com/xiaohaiH/storage
标签:#反序列化
更新了:反序列化
描述:一个灵活的本地存储工具, 基于 TypeScript 实现, 支持 localStorage, sessionStorage 及自定义存储; 通过 StorageCore 类, 可以方便地进行数据的序列化, 反序列化, 存储和读取。
URL:https://github.com/xiaohaiH/storage
标签:#反序列化
GitHub
GitHub - xiaohaiH/storage: 一个灵活的本地存储工具, 基于 TypeScript 实现, 支持 localStorage, sessionStorage 及自定义存储; 通过 StorageCore 类, 可以方便地进行数据的序列化…
一个灵活的本地存储工具, 基于 TypeScript 实现, 支持 localStorage, sessionStorage 及自定义存储; 通过 StorageCore 类, 可以方便地进行数据的序列化, 反序列化, 存储和读取。 - xiaohaiH/storage
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team style prompt injection testing with LLMs. Built by Stacey.
URL:https://github.com/staceystantonhowes/ai-prompt-injection-lab
标签:#Red Team
更新了:Red Team
描述:Red Team style prompt injection testing with LLMs. Built by Stacey.
URL:https://github.com/staceystantonhowes/ai-prompt-injection-lab
标签:#Red Team
GitHub
GitHub - staceystantonhowes/phoenix-files-level1-soft-breaking: Red Team style prompt injection testing with LLMs. Built by Stacey.
Red Team style prompt injection testing with LLMs. Built by Stacey. - staceystantonhowes/phoenix-files-level1-soft-breaking
GitHub监控消息提醒!!!
更新了:弱口令
描述:phpmyadmin 弱口令探测脚本
URL:https://github.com/Li-YingRan/phpmyadmin-Weak-Password-Detection
标签:#弱口令
更新了:弱口令
描述:phpmyadmin 弱口令探测脚本
URL:https://github.com/Li-YingRan/phpmyadmin-Weak-Password-Detection
标签:#弱口令
GitHub
GitHub - Li-YingRan/phpmyadmin-Weak-Password-Detection: phpmyadmin 弱口令探测脚本
phpmyadmin 弱口令探测脚本. Contribute to Li-YingRan/phpmyadmin-Weak-Password-Detection development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Privilege Escalation via TOCTOU in VMware VMX (CVE-2025-22224)
URL:https://github.com/voyagken/CVE-2025-22224-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Privilege Escalation via TOCTOU in VMware VMX (CVE-2025-22224)
URL:https://github.com/voyagken/CVE-2025-22224-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Remote Code Execution via Out-of-Bounds Write in V8 (CVE-2025-5280)
URL:https://github.com/voyagken/CVE-2025-5280-V8-OOB
标签:#CVE-2025
更新了:CVE-2025
描述:Remote Code Execution via Out-of-Bounds Write in V8 (CVE-2025-5280)
URL:https://github.com/voyagken/CVE-2025-5280-V8-OOB
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC and vulnerability report for CVE-2025-47827.
URL:https://github.com/Zedeldi/CVE-2025-47827
标签:#CVE-2025
更新了:CVE-2025
描述:PoC and vulnerability report for CVE-2025-47827.
URL:https://github.com/Zedeldi/CVE-2025-47827
标签:#CVE-2025
GitHub
GitHub - Zedeldi/CVE-2025-47827: PoC and vulnerability report for CVE-2025-47827.
PoC and vulnerability report for CVE-2025-47827. Contribute to Zedeldi/CVE-2025-47827 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Fileless RCE via service binary path modification
URL:https://github.com/jarednexgent/SvcExec
标签:#RCE
更新了:RCE
描述:Fileless RCE via service binary path modification
URL:https://github.com/jarednexgent/SvcExec
标签:#RCE
GitHub
GitHub - jarednexgent/SvcExec: windows lateral movement tool
windows lateral movement tool. Contribute to jarednexgent/SvcExec development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Django Security Issue (CVE-2025-32873)
URL:https://github.com/Apollo-R3bot/django-vulnerability-CVE-2025-32873
标签:#CVE-2025
更新了:CVE-2025
描述:Django Security Issue (CVE-2025-32873)
URL:https://github.com/Apollo-R3bot/django-vulnerability-CVE-2025-32873
标签:#CVE-2025
GitHub
GitHub - Apollo-R3bot/django-vulnerability-CVE-2025-32873: Django Security Issue (CVE-2025-32873)
Django Security Issue (CVE-2025-32873). Contribute to Apollo-R3bot/django-vulnerability-CVE-2025-32873 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:!!! Educational Properties Only !!! Call of Duty Warzone RCE Exploit Leak
URL:https://github.com/mbrxyzzz/CoD-RCE
标签:#RCE
更新了:RCE
描述:!!! Educational Properties Only !!! Call of Duty Warzone RCE Exploit Leak
URL:https://github.com/mbrxyzzz/CoD-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:sql注入
描述:【AI漏洞扫描器】【多功能Web扫描器】Scan-X是一款基于mitmproxy高效的被动扫描器,专注于快速识别常见Web漏洞,包括SQL注入、越权访问、未授权访问等,支持AI漏洞扫描。通过代理模式自动分析HTTP流量,实现被动扫描,适合大规模资产安全评估与渗透测试场景。
URL:https://github.com/tobeflyboy/sc
标签:#sql注入
更新了:sql注入
描述:【AI漏洞扫描器】【多功能Web扫描器】Scan-X是一款基于mitmproxy高效的被动扫描器,专注于快速识别常见Web漏洞,包括SQL注入、越权访问、未授权访问等,支持AI漏洞扫描。通过代理模式自动分析HTTP流量,实现被动扫描,适合大规模资产安全评估与渗透测试场景。
URL:https://github.com/tobeflyboy/sc
标签:#sql注入
GitHub
GitHub - tobeflyboy/sc: 基于SpringCloud微服务的示例项目、出发点是写一套完整微服务架构、集成有eureka、ribbon、feign、hystrix组件等,消费端有JSP、freemarker、thymeleaf三个版…
基于SpringCloud微服务的示例项目、出发点是写一套完整微服务架构、集成有eureka、ribbon、feign、hystrix组件等,消费端有JSP、freemarker、thymeleaf三个版本,有完整的UI、增删改查及分页,防SQL注入、XSS攻击拦截等,同时集成了shiro、swagger2等,后面会持续完善 GitHub: https://github.com/tobefl...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Privilege Escalation via TOCTOU Race Condition in VMware VMX (CVE-2025-22224)
URL:https://github.com/takeshirisulu/CVE-2025-22224
标签:#CVE-2025
更新了:CVE-2025
描述:Privilege Escalation via TOCTOU Race Condition in VMware VMX (CVE-2025-22224)
URL:https://github.com/takeshirisulu/CVE-2025-22224
标签:#CVE-2025