GitHub监控消息提醒!!!
更新了:反序列化
描述:一个灵活的本地存储工具, 基于 TypeScript 实现, 支持 localStorage, sessionStorage 及自定义存储; 通过 StorageCore 类, 可以方便地进行数据的序列化, 反序列化, 存储和读取。
URL:https://github.com/xiaohaiH/storage
标签:#反序列化
更新了:反序列化
描述:一个灵活的本地存储工具, 基于 TypeScript 实现, 支持 localStorage, sessionStorage 及自定义存储; 通过 StorageCore 类, 可以方便地进行数据的序列化, 反序列化, 存储和读取。
URL:https://github.com/xiaohaiH/storage
标签:#反序列化
GitHub
GitHub - xiaohaiH/storage: 一个灵活的本地存储工具, 基于 TypeScript 实现, 支持 localStorage, sessionStorage 及自定义存储; 通过 StorageCore 类, 可以方便地进行数据的序列化…
一个灵活的本地存储工具, 基于 TypeScript 实现, 支持 localStorage, sessionStorage 及自定义存储; 通过 StorageCore 类, 可以方便地进行数据的序列化, 反序列化, 存储和读取。 - xiaohaiH/storage
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team style prompt injection testing with LLMs. Built by Stacey.
URL:https://github.com/staceystantonhowes/ai-prompt-injection-lab
标签:#Red Team
更新了:Red Team
描述:Red Team style prompt injection testing with LLMs. Built by Stacey.
URL:https://github.com/staceystantonhowes/ai-prompt-injection-lab
标签:#Red Team
GitHub
GitHub - staceystantonhowes/phoenix-files-level1-soft-breaking: Red Team style prompt injection testing with LLMs. Built by Stacey.
Red Team style prompt injection testing with LLMs. Built by Stacey. - staceystantonhowes/phoenix-files-level1-soft-breaking
GitHub监控消息提醒!!!
更新了:弱口令
描述:phpmyadmin 弱口令探测脚本
URL:https://github.com/Li-YingRan/phpmyadmin-Weak-Password-Detection
标签:#弱口令
更新了:弱口令
描述:phpmyadmin 弱口令探测脚本
URL:https://github.com/Li-YingRan/phpmyadmin-Weak-Password-Detection
标签:#弱口令
GitHub
GitHub - Li-YingRan/phpmyadmin-Weak-Password-Detection: phpmyadmin 弱口令探测脚本
phpmyadmin 弱口令探测脚本. Contribute to Li-YingRan/phpmyadmin-Weak-Password-Detection development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Privilege Escalation via TOCTOU in VMware VMX (CVE-2025-22224)
URL:https://github.com/voyagken/CVE-2025-22224-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Privilege Escalation via TOCTOU in VMware VMX (CVE-2025-22224)
URL:https://github.com/voyagken/CVE-2025-22224-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Remote Code Execution via Out-of-Bounds Write in V8 (CVE-2025-5280)
URL:https://github.com/voyagken/CVE-2025-5280-V8-OOB
标签:#CVE-2025
更新了:CVE-2025
描述:Remote Code Execution via Out-of-Bounds Write in V8 (CVE-2025-5280)
URL:https://github.com/voyagken/CVE-2025-5280-V8-OOB
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC and vulnerability report for CVE-2025-47827.
URL:https://github.com/Zedeldi/CVE-2025-47827
标签:#CVE-2025
更新了:CVE-2025
描述:PoC and vulnerability report for CVE-2025-47827.
URL:https://github.com/Zedeldi/CVE-2025-47827
标签:#CVE-2025
GitHub
GitHub - Zedeldi/CVE-2025-47827: PoC and vulnerability report for CVE-2025-47827.
PoC and vulnerability report for CVE-2025-47827. Contribute to Zedeldi/CVE-2025-47827 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Fileless RCE via service binary path modification
URL:https://github.com/jarednexgent/SvcExec
标签:#RCE
更新了:RCE
描述:Fileless RCE via service binary path modification
URL:https://github.com/jarednexgent/SvcExec
标签:#RCE
GitHub
GitHub - jarednexgent/SvcExec: windows lateral movement tool
windows lateral movement tool. Contribute to jarednexgent/SvcExec development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Django Security Issue (CVE-2025-32873)
URL:https://github.com/Apollo-R3bot/django-vulnerability-CVE-2025-32873
标签:#CVE-2025
更新了:CVE-2025
描述:Django Security Issue (CVE-2025-32873)
URL:https://github.com/Apollo-R3bot/django-vulnerability-CVE-2025-32873
标签:#CVE-2025
GitHub
GitHub - Apollo-R3bot/django-vulnerability-CVE-2025-32873: Django Security Issue (CVE-2025-32873)
Django Security Issue (CVE-2025-32873). Contribute to Apollo-R3bot/django-vulnerability-CVE-2025-32873 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:!!! Educational Properties Only !!! Call of Duty Warzone RCE Exploit Leak
URL:https://github.com/mbrxyzzz/CoD-RCE
标签:#RCE
更新了:RCE
描述:!!! Educational Properties Only !!! Call of Duty Warzone RCE Exploit Leak
URL:https://github.com/mbrxyzzz/CoD-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:sql注入
描述:【AI漏洞扫描器】【多功能Web扫描器】Scan-X是一款基于mitmproxy高效的被动扫描器,专注于快速识别常见Web漏洞,包括SQL注入、越权访问、未授权访问等,支持AI漏洞扫描。通过代理模式自动分析HTTP流量,实现被动扫描,适合大规模资产安全评估与渗透测试场景。
URL:https://github.com/tobeflyboy/sc
标签:#sql注入
更新了:sql注入
描述:【AI漏洞扫描器】【多功能Web扫描器】Scan-X是一款基于mitmproxy高效的被动扫描器,专注于快速识别常见Web漏洞,包括SQL注入、越权访问、未授权访问等,支持AI漏洞扫描。通过代理模式自动分析HTTP流量,实现被动扫描,适合大规模资产安全评估与渗透测试场景。
URL:https://github.com/tobeflyboy/sc
标签:#sql注入
GitHub
GitHub - tobeflyboy/sc: 基于SpringCloud微服务的示例项目、出发点是写一套完整微服务架构、集成有eureka、ribbon、feign、hystrix组件等,消费端有JSP、freemarker、thymeleaf三个版…
基于SpringCloud微服务的示例项目、出发点是写一套完整微服务架构、集成有eureka、ribbon、feign、hystrix组件等,消费端有JSP、freemarker、thymeleaf三个版本,有完整的UI、增删改查及分页,防SQL注入、XSS攻击拦截等,同时集成了shiro、swagger2等,后面会持续完善 GitHub: https://github.com/tobefl...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Privilege Escalation via TOCTOU Race Condition in VMware VMX (CVE-2025-22224)
URL:https://github.com/takeshirisulu/CVE-2025-22224
标签:#CVE-2025
更新了:CVE-2025
描述:Privilege Escalation via TOCTOU Race Condition in VMware VMX (CVE-2025-22224)
URL:https://github.com/takeshirisulu/CVE-2025-22224
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:应急响应
描述:一个应急响应的工具,自带规则,可以分析启动项、网络之类的东西
URL:https://github.com/Rabb1tQ/emergency_response
标签:#应急响应
更新了:应急响应
描述:一个应急响应的工具,自带规则,可以分析启动项、网络之类的东西
URL:https://github.com/Rabb1tQ/emergency_response
标签:#应急响应
GitHub
GitHub - Rabb1tQ/emergency_response: 一个应急响应的工具,自带规则,可以分析启动项、网络之类的东西
一个应急响应的工具,自带规则,可以分析启动项、网络之类的东西. Contribute to Rabb1tQ/emergency_response development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-49113
URL:https://github.com/rxerium/CVE-2025-49113
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-49113
URL:https://github.com/rxerium/CVE-2025-49113
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-49113: Detection for CVE-2025-49113
Detection for CVE-2025-49113. Contribute to rxerium/CVE-2025-49113 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49113 - Roundcube <= 1.6.10 Post-Auth RCE via PHP Object Deserialization
URL:https://github.com/Ademking/CVE-2025-49113-nuclei-template
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49113 - Roundcube <= 1.6.10 Post-Auth RCE via PHP Object Deserialization
URL:https://github.com/Ademking/CVE-2025-49113-nuclei-template
标签:#CVE-2025
GitHub
GitHub - Ademking/CVE-2025-49113-nuclei-template: CVE-2025-49113 - Roundcube <= 1.6.10 Post-Auth RCE via PHP Object Deserialization
CVE-2025-49113 - Roundcube <= 1.6.10 Post-Auth RCE via PHP Object Deserialization - Ademking/CVE-2025-49113-nuclei-template
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32206
URL:https://github.com/postal-filled-zap/CVE
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32206
URL:https://github.com/postal-filled-zap/CVE
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49223 - Prototype Pollution in Billboard.js
URL:https://github.com/louay-075/CVE-2025-49223-BillboardJS-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49223 - Prototype Pollution in Billboard.js
URL:https://github.com/louay-075/CVE-2025-49223-BillboardJS-PoC
标签:#CVE-2025
GitHub
GitHub - louay-075/CVE-2025-49223-BillboardJS-PoC: CVE-2025-49223 - Prototype Pollution in Billboard.js
CVE-2025-49223 - Prototype Pollution in Billboard.js - louay-075/CVE-2025-49223-BillboardJS-PoC