GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
URL:https://github.com/4m3rr0r/CVE-2025-47812
标签:#CVE-2025
更新了:CVE-2025
描述:Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
URL:https://github.com/4m3rr0r/CVE-2025-47812
标签:#CVE-2025
GitHub
GitHub - 4m3rr0r/CVE-2025-47812-poc: Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812) - 4m3rr0r/CVE-2025-47812-poc
GitHub监控消息提醒!!!
更新了:RCE
描述:Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
URL:https://github.com/4m3rr0r/CVE-2025-47812-poc
标签:#RCE
更新了:RCE
描述:Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
URL:https://github.com/4m3rr0r/CVE-2025-47812-poc
标签:#RCE
GitHub
GitHub - 4m3rr0r/CVE-2025-47812-poc: Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812) - 4m3rr0r/CVE-2025-47812-poc
GitHub监控消息提醒!!!
更新了:代码审计
描述:X-SAST 替代Seay的轻量级多语言支持的GUI代码审计工具
URL:https://github.com/winezer0/X-SAST-Public
标签:#代码审计
更新了:代码审计
描述:X-SAST 替代Seay的轻量级多语言支持的GUI代码审计工具
URL:https://github.com/winezer0/X-SAST-Public
标签:#代码审计
GitHub
GitHub - winezer0/X-SAST-Public: X-SAST 替代Seay的轻量级多语言支持的GUI代码审计工具
X-SAST 替代Seay的轻量级多语言支持的GUI代码审计工具. Contribute to winezer0/X-SAST-Public development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32463 Proof of concept
URL:https://github.com/K1tt3h/CVE-2025-32463-POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32463 Proof of concept
URL:https://github.com/K1tt3h/CVE-2025-32463-POC
标签:#CVE-2025
GitHub
GitHub - K1tt3h/CVE-2025-32463-POC: CVE-2025-32463 Proof of concept
CVE-2025-32463 Proof of concept. Contribute to K1tt3h/CVE-2025-32463-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:X-SAST 专业多语言轻量代码审计工具套件
URL:https://github.com/listener-He/yunxiao-LLM-reviewer
标签:#代码审计
更新了:代码审计
描述:X-SAST 专业多语言轻量代码审计工具套件
URL:https://github.com/listener-He/yunxiao-LLM-reviewer
标签:#代码审计
GitHub
GitHub - listener-He/yunxiao-LLM-reviewer: 一款专为阿里云云效 Flow 平台设计的自动化代码审查工具。通过集成 Qwen、DeepSeek 等先进大模型,该工具能够实时分析 Git 合并请求(MR)中的代码变…
一款专为阿里云云效 Flow 平台设计的自动化代码审查工具。通过集成 Qwen、DeepSeek 等先进大模型,该工具能够实时分析 Git 合并请求(MR)中的代码变更,智能识别潜在问题并自动生成结构化评审意见。 工具支持多维度代码检测,包括逻辑错误、安全漏洞,有效提升团队代码质量与开发效率。 作为云效 Flow 的自定义步骤,该工具可无缝集成到 CI/CD 流水线中,实现 MR 提交时的...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC script for CVE-2025-32462 a vulnerability in sudo
URL:https://github.com/Hacksparo/CVE-2025-32462
标签:#CVE-2025
更新了:CVE-2025
描述:POC script for CVE-2025-32462 a vulnerability in sudo
URL:https://github.com/Hacksparo/CVE-2025-32462
标签:#CVE-2025
GitHub
Hacksparo/CVE-2025-32462
POC script for CVE-2025-32462 a vulnerability in sudo - Hacksparo/CVE-2025-32462
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Simple exploit for Wing FTP Server RCE (CVE-2025-47812) to run commands and get a reverse shell. For educational use only.
URL:https://github.com/0xcan1337/CVE-2025-47812-poC
标签:#CVE-2025
更新了:CVE-2025
描述:Simple exploit for Wing FTP Server RCE (CVE-2025-47812) to run commands and get a reverse shell. For educational use only.
URL:https://github.com/0xcan1337/CVE-2025-47812-poC
标签:#CVE-2025
GitHub
GitHub - 0xcan1337/CVE-2025-47812-poC: Simple exploit for Wing FTP Server RCE (CVE-2025-47812) to run commands and get a reverse…
Simple exploit for Wing FTP Server RCE (CVE-2025-47812) to run commands and get a reverse shell. For educational use only. - 0xcan1337/CVE-2025-47812-poC
GitHub监控消息提醒!!!
更新了:RCE
描述:Undocumented RCE in PLY via `picklefile` Parameter
URL:https://github.com/bohmiiidd/Undocumented-RCE-in-PLY
标签:#RCE
更新了:RCE
描述:Undocumented RCE in PLY via `picklefile` Parameter
URL:https://github.com/bohmiiidd/Undocumented-RCE-in-PLY
标签:#RCE
GitHub
GitHub - bohmiiidd/Undocumented-RCE-in-PLY: Undocumented RCE in PLY via `picklefile` Parameter
Undocumented RCE in PLY via `picklefile` Parameter - bohmiiidd/Undocumented-RCE-in-PLY
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-38089
URL:https://github.com/keymaker-arch/NFSundown
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-38089
URL:https://github.com/keymaker-arch/NFSundown
标签:#CVE-2025
GitHub
GitHub - keymaker-arch/NFSundown: PoC for CVE-2025-38089
PoC for CVE-2025-38089. Contribute to keymaker-arch/NFSundown development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for Local Privilege Escalation in Sudo via Malicious nsswitch.conf with sudo -R. (CVE-2025-32463)
URL:https://github.com/pevinkumar10/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for Local Privilege Escalation in Sudo via Malicious nsswitch.conf with sudo -R. (CVE-2025-32463)
URL:https://github.com/pevinkumar10/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - pevinkumar10/CVE-2025-32463: Exploit for Local Privilege Escalation in Sudo via Malicious nsswitch.conf with sudo -R.…
Exploit for Local Privilege Escalation in Sudo via Malicious nsswitch.conf with sudo -R. (CVE-2025-32463) - pevinkumar10/CVE-2025-32463
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-49113
URL:https://github.com/mbanyamer/Microsoft-PowerPoint-Use-After-Free-Remote-Code-Execution-RCE-
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-49113
URL:https://github.com/mbanyamer/Microsoft-PowerPoint-Use-After-Free-Remote-Code-Execution-RCE-
标签:#CVE-2025
GitHub
mbanyamer/Microsoft-PowerPoint-Use-After-Free-Remote-Code-Execution-RCE-
This repository contains a Proof of Concept (PoC) exploit for the **CVE-2025-47175** vulnerability found in Microsoft PowerPoint. The vulnerability is a Use-After-Free (UAF) bug that allows an at...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: CVE-2025-6934 POC
URL:https://github.com/MrjHaxcore/-CVE-2025-6934
标签:#CVE-2025
更新了:CVE-2025
描述: CVE-2025-6934 POC
URL:https://github.com/MrjHaxcore/-CVE-2025-6934
标签:#CVE-2025
GitHub
GitHub - MrjHaxcore/-CVE-2025-6934: CVE-2025-6934 POC
CVE-2025-6934 POC. Contribute to MrjHaxcore/-CVE-2025-6934 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Wing FTP Server RCE via Lua Injection
URL:https://github.com/0xgh057r3c0n/CVE-2025-47812
标签:#RCE
更新了:RCE
描述:Wing FTP Server RCE via Lua Injection
URL:https://github.com/0xgh057r3c0n/CVE-2025-47812
标签:#RCE
GitHub
GitHub - 0xgh057r3c0n/CVE-2025-47812: Wing FTP Server RCE via Lua Injection
Wing FTP Server RCE via Lua Injection. Contribute to 0xgh057r3c0n/CVE-2025-47812 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows machine
URL:https://github.com/Tea-On/CVE-2023-41425-RCE-WonderCMS-4.3.2
标签:#RCE
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows machine
URL:https://github.com/Tea-On/CVE-2023-41425-RCE-WonderCMS-4.3.2
标签:#RCE
GitHub
GitHub - Tea-On/CVE-2023-41425-RCE-WonderCMS-4.3.2: Automates creation and hosting of a JavaScript XSS payload to install a malicious…
Automates creation and hosting of a JavaScript XSS payload to install a malicious theme module, triggering a reverse shell via Remote Code Execution in WonderCMS. This tool uses PentestMonkey&#...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable to spawn a new root shell)
URL:https://github.com/Mikivirus0/sudoinjection
标签:#CVE-2025
更新了:CVE-2025
描述:Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable to spawn a new root shell)
URL:https://github.com/Mikivirus0/sudoinjection
标签:#CVE-2025
GitHub
GitHub - Mikivirus0/sudoinjection: Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable…
Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable to spawn a new root shell) - Mikivirus0/sudoinjection
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-45407: Multiple XSS Vulnerabilities in DiscoveryNG v6.0.8 Hotfix 2 Discovered by: YallaSec Security Research Team CVE ID: CVE-2025-45407 Date Published: July 2025
URL:https://github.com/yallasec/CVE-2025-45407
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-45407: Multiple XSS Vulnerabilities in DiscoveryNG v6.0.8 Hotfix 2 Discovered by: YallaSec Security Research Team CVE ID: CVE-2025-45407 Date Published: July 2025
URL:https://github.com/yallasec/CVE-2025-45407
标签:#CVE-2025
GitHub
GitHub - yallasec/CVE-2025-45407: CVE-2025-45407: Multiple XSS Vulnerabilities in DiscoveryNG v6.0.8 Hotfix 2 Discovered by: YallaSec…
CVE-2025-45407: Multiple XSS Vulnerabilities in DiscoveryNG v6.0.8 Hotfix 2 Discovered by: YallaSec Security Research Team CVE ID: CVE-2025-45407 Date Published: July 2025 - yallasec/CVE-2025-45407
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-6019
URL:https://github.com/dreysanox/CVE-2025-6019_Poc
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-6019
URL:https://github.com/dreysanox/CVE-2025-6019_Poc
标签:#CVE-2025
GitHub
GitHub - dreysanox/CVE-2025-6018_Poc: Exploit for CVE-2025-6019
Exploit for CVE-2025-6019. Contribute to dreysanox/CVE-2025-6018_Poc development by creating an account on GitHub.