GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Reproduce CVE-2022-32250 and CVE-2025-21756 by tampering with modprobe_path and hijacking control flow, respectively.
URL:https://github.com/KuanKuanQAQ/cve-testing
标签:#CVE-2025
更新了:CVE-2025
描述:Reproduce CVE-2022-32250 and CVE-2025-21756 by tampering with modprobe_path and hijacking control flow, respectively.
URL:https://github.com/KuanKuanQAQ/cve-testing
标签:#CVE-2025
GitHub
GitHub - KuanKuanQAQ/cve-testing: Reproduce CVE-2022-32250 and CVE-2025-21756 by tampering with modprobe_path and hijacking control…
Reproduce CVE-2022-32250 and CVE-2025-21756 by tampering with modprobe_path and hijacking control flow, respectively. - KuanKuanQAQ/cve-testing
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:> 🔓 Proof-of-Concept for a fictional Next.js middleware bypass (CVE-2025-29927) — craft sub-requests to test protected routes.
URL:https://github.com/m2hcz/PoC-for-Next.js-Middleware
标签:#CVE-2025
更新了:CVE-2025
描述:> 🔓 Proof-of-Concept for a fictional Next.js middleware bypass (CVE-2025-29927) — craft sub-requests to test protected routes.
URL:https://github.com/m2hcz/PoC-for-Next.js-Middleware
标签:#CVE-2025
GitHub
GitHub - m2hcz/PoC-for-Next.js-Middleware: > 🔓 Proof-of-Concept for a fictional Next.js middleware bypass (CVE-2025-29927) — craft…
> 🔓 Proof-of-Concept for a fictional Next.js middleware bypass (CVE-2025-29927) — craft sub-requests to test protected routes. - m2hcz/PoC-for-Next.js-Middleware
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件
URL:https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
标签:#CVE-2025
更新了:CVE-2025
描述:详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件
URL:https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
标签:#CVE-2025
GitHub
GitHub - mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-: 详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件
详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件. Contribute to mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:一套标准化的数字取证与应急响应信息采集规则格式规范。
URL:https://github.com/Just-Hack-For-Fun/OpenForensicRules
标签:#应急响应
更新了:应急响应
描述:一套标准化的数字取证与应急响应信息采集规则格式规范。
URL:https://github.com/Just-Hack-For-Fun/OpenForensicRules
标签:#应急响应
GitHub
GitHub - Just-Hack-For-Fun/OpenForensicRules: 一套标准化的数字取证与应急响应信息采集规则格式规范。
一套标准化的数字取证与应急响应信息采集规则格式规范。. Contribute to Just-Hack-For-Fun/OpenForensicRules development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC and Setup for CVE-2025-4664
URL:https://github.com/amalmurali47/cve-2025-4664
标签:#CVE-2025
更新了:CVE-2025
描述:PoC and Setup for CVE-2025-4664
URL:https://github.com/amalmurali47/cve-2025-4664
标签:#CVE-2025
GitHub
GitHub - amalmurali47/cve-2025-4664: PoC and Setup for CVE-2025-4664
PoC and Setup for CVE-2025-4664. Contribute to amalmurali47/cve-2025-4664 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows machine
URL:https://github.com/maverick-doan/win-rce-checker
标签:#RCE
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows machine
URL:https://github.com/maverick-doan/win-rce-checker
标签:#RCE
GitHub
GitHub - maverick-doan/win-rce-checker: This is a simple and benign Go script that red teamers can drop and attempt execution to…
This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows machine - maverick-doan/win-rce-checker
GitHub监控消息提醒!!!
更新了:渗透测试
描述:本项目是一个基于FastAPI+React的Web安全自动化渗透测试平台,集成了资产发现、端口探测、网站信息抓取、漏洞扫描等功能,支持JWT认证、API自动化测试、前端进度条展示、工具状态检测、全流程自动化、结构化结果展示、项目/任务归档,适配云端环境。
URL:https://github.com/wooluo/scan
标签:#渗透测试
更新了:渗透测试
描述:本项目是一个基于FastAPI+React的Web安全自动化渗透测试平台,集成了资产发现、端口探测、网站信息抓取、漏洞扫描等功能,支持JWT认证、API自动化测试、前端进度条展示、工具状态检测、全流程自动化、结构化结果展示、项目/任务归档,适配云端环境。
URL:https://github.com/wooluo/scan
标签:#渗透测试
GitHub
GitHub - wooluo/scan: 本项目是一个基于FastAPI+React的Web安全自动化渗透测试平台,集成了资产发现、端口探测、网站信息抓取、漏洞扫描等功能,支持JWT认证、API自动化测试、前端进度条展示、工具状态检测、全流程自动化、…
本项目是一个基于FastAPI+React的Web安全自动化渗透测试平台,集成了资产发现、端口探测、网站信息抓取、漏洞扫描等功能,支持JWT认证、API自动化测试、前端进度条展示、工具状态检测、全流程自动化、结构化结果展示、项目/任务归档,适配云端环境。 - wooluo/scan
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Simple Proof of Concept for CVE-2025-6218, demonstrating the exploitation of a vulnerability involving WinRAR’s handling of archive extraction paths.
URL:https://github.com/skimask1690/CVE-2025-6218-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Simple Proof of Concept for CVE-2025-6218, demonstrating the exploitation of a vulnerability involving WinRAR’s handling of archive extraction paths.
URL:https://github.com/skimask1690/CVE-2025-6218-POC
标签:#CVE-2025
GitHub
GitHub - skimask1690/CVE-2025-6218-POC: Proof of Concept for CVE-2025-6218, demonstrating the exploitation of a vulnerability in…
Proof of Concept for CVE-2025-6218, demonstrating the exploitation of a vulnerability in WinRAR versions 7.11 and under, involving improper handling of archive extraction paths. - skimask1690/CVE-2...
GitHub监控消息提醒!!!
更新了:RCE
描述:codeBox RCE is a service that provides a secure, containerized environment to run code remotely. The API supports Python, JavaScript, and C++, with potential for more languages in the future.
URL:https://github.com/Rajivkumawat3/code-box
标签:#RCE
更新了:RCE
描述:codeBox RCE is a service that provides a secure, containerized environment to run code remotely. The API supports Python, JavaScript, and C++, with potential for more languages in the future.
URL:https://github.com/Rajivkumawat3/code-box
标签:#RCE
GitHub
GitHub - Rajivkumawat3/code-box: codeBox RCE is a service that provides a secure, containerized environment to run code remotely.…
codeBox RCE is a service that provides a secure, containerized environment to run code remotely. The API supports Python, JavaScript, and C++, with potential for more languages in the future. - Raj...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
URL:https://github.com/4m3rr0r/CVE-2025-47812
标签:#CVE-2025
更新了:CVE-2025
描述:Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
URL:https://github.com/4m3rr0r/CVE-2025-47812
标签:#CVE-2025
GitHub
GitHub - 4m3rr0r/CVE-2025-47812-poc: Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812) - 4m3rr0r/CVE-2025-47812-poc
GitHub监控消息提醒!!!
更新了:RCE
描述:Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
URL:https://github.com/4m3rr0r/CVE-2025-47812-poc
标签:#RCE
更新了:RCE
描述:Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
URL:https://github.com/4m3rr0r/CVE-2025-47812-poc
标签:#RCE
GitHub
GitHub - 4m3rr0r/CVE-2025-47812-poc: Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812) - 4m3rr0r/CVE-2025-47812-poc
GitHub监控消息提醒!!!
更新了:代码审计
描述:X-SAST 替代Seay的轻量级多语言支持的GUI代码审计工具
URL:https://github.com/winezer0/X-SAST-Public
标签:#代码审计
更新了:代码审计
描述:X-SAST 替代Seay的轻量级多语言支持的GUI代码审计工具
URL:https://github.com/winezer0/X-SAST-Public
标签:#代码审计
GitHub
GitHub - winezer0/X-SAST-Public: X-SAST 替代Seay的轻量级多语言支持的GUI代码审计工具
X-SAST 替代Seay的轻量级多语言支持的GUI代码审计工具. Contribute to winezer0/X-SAST-Public development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32463 Proof of concept
URL:https://github.com/K1tt3h/CVE-2025-32463-POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32463 Proof of concept
URL:https://github.com/K1tt3h/CVE-2025-32463-POC
标签:#CVE-2025
GitHub
GitHub - K1tt3h/CVE-2025-32463-POC: CVE-2025-32463 Proof of concept
CVE-2025-32463 Proof of concept. Contribute to K1tt3h/CVE-2025-32463-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:X-SAST 专业多语言轻量代码审计工具套件
URL:https://github.com/listener-He/yunxiao-LLM-reviewer
标签:#代码审计
更新了:代码审计
描述:X-SAST 专业多语言轻量代码审计工具套件
URL:https://github.com/listener-He/yunxiao-LLM-reviewer
标签:#代码审计
GitHub
GitHub - listener-He/yunxiao-LLM-reviewer: 一款专为阿里云云效 Flow 平台设计的自动化代码审查工具。通过集成 Qwen、DeepSeek 等先进大模型,该工具能够实时分析 Git 合并请求(MR)中的代码变…
一款专为阿里云云效 Flow 平台设计的自动化代码审查工具。通过集成 Qwen、DeepSeek 等先进大模型,该工具能够实时分析 Git 合并请求(MR)中的代码变更,智能识别潜在问题并自动生成结构化评审意见。 工具支持多维度代码检测,包括逻辑错误、安全漏洞,有效提升团队代码质量与开发效率。 作为云效 Flow 的自定义步骤,该工具可无缝集成到 CI/CD 流水线中,实现 MR 提交时的...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC script for CVE-2025-32462 a vulnerability in sudo
URL:https://github.com/Hacksparo/CVE-2025-32462
标签:#CVE-2025
更新了:CVE-2025
描述:POC script for CVE-2025-32462 a vulnerability in sudo
URL:https://github.com/Hacksparo/CVE-2025-32462
标签:#CVE-2025
GitHub
Hacksparo/CVE-2025-32462
POC script for CVE-2025-32462 a vulnerability in sudo - Hacksparo/CVE-2025-32462
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Simple exploit for Wing FTP Server RCE (CVE-2025-47812) to run commands and get a reverse shell. For educational use only.
URL:https://github.com/0xcan1337/CVE-2025-47812-poC
标签:#CVE-2025
更新了:CVE-2025
描述:Simple exploit for Wing FTP Server RCE (CVE-2025-47812) to run commands and get a reverse shell. For educational use only.
URL:https://github.com/0xcan1337/CVE-2025-47812-poC
标签:#CVE-2025
GitHub
GitHub - 0xcan1337/CVE-2025-47812-poC: Simple exploit for Wing FTP Server RCE (CVE-2025-47812) to run commands and get a reverse…
Simple exploit for Wing FTP Server RCE (CVE-2025-47812) to run commands and get a reverse shell. For educational use only. - 0xcan1337/CVE-2025-47812-poC
GitHub监控消息提醒!!!
更新了:RCE
描述:Undocumented RCE in PLY via `picklefile` Parameter
URL:https://github.com/bohmiiidd/Undocumented-RCE-in-PLY
标签:#RCE
更新了:RCE
描述:Undocumented RCE in PLY via `picklefile` Parameter
URL:https://github.com/bohmiiidd/Undocumented-RCE-in-PLY
标签:#RCE
GitHub
GitHub - bohmiiidd/Undocumented-RCE-in-PLY: Undocumented RCE in PLY via `picklefile` Parameter
Undocumented RCE in PLY via `picklefile` Parameter - bohmiiidd/Undocumented-RCE-in-PLY
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-38089
URL:https://github.com/keymaker-arch/NFSundown
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-38089
URL:https://github.com/keymaker-arch/NFSundown
标签:#CVE-2025
GitHub
GitHub - keymaker-arch/NFSundown: PoC for CVE-2025-38089
PoC for CVE-2025-38089. Contribute to keymaker-arch/NFSundown development by creating an account on GitHub.