GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-6019
URL:https://github.com/dreysanox/CVE-2025-6019_Poc
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-6019
URL:https://github.com/dreysanox/CVE-2025-6019_Poc
标签:#CVE-2025
GitHub
GitHub - dreysanox/CVE-2025-6018_Poc: Exploit for CVE-2025-6019
Exploit for CVE-2025-6019. Contribute to dreysanox/CVE-2025-6018_Poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-32462
URL:https://github.com/atomicjjbod/CVE-2025-32462
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-32462
URL:https://github.com/atomicjjbod/CVE-2025-32462
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32462 Exploit
URL:https://github.com/cybersentinelx1/CVE-2025-32462-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32462 Exploit
URL:https://github.com/cybersentinelx1/CVE-2025-32462-Exploit
标签:#CVE-2025
GitHub
GitHub - cybersentinelx1/CVE-2025-32462-Exploit: CVE-2025-32462 Exploit
CVE-2025-32462 Exploit. Contribute to cybersentinelx1/CVE-2025-32462-Exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32462 Exploit
URL:https://github.com/ashiqrehan-21/MCP-Inspector-CVE-2025-49596
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32462 Exploit
URL:https://github.com/ashiqrehan-21/MCP-Inspector-CVE-2025-49596
标签:#CVE-2025
GitHub
GitHub - ashiqrehan-21/MCP-Inspector-CVE-2025-49596: MCP-Inspector-vulncheck is a Python script that checks if an MCP Inspector…
MCP-Inspector-vulncheck is a Python script that checks if an MCP Inspector server is vulnerable to CVE-2025-49596. It tests whether the /sse endpoint responds to unauthenticated requests, indicatin...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local privilege escalation) on Kali Linux and Ubuntu WSL.
URL:https://github.com/CIA911/sudo_patch_CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local privilege escalation) on Kali Linux and Ubuntu WSL.
URL:https://github.com/CIA911/sudo_patch_CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - CIA911/sudo_patch_CVE-2025-32463: Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local privilege escalation)…
Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local privilege escalation) on Kali Linux and Ubuntu WSL. - CIA911/sudo_patch_CVE-2025-32463
GitHub监控消息提醒!!!
更新了:渗透测试
描述:JNDIBypass 是一个用于测试 Java JNDI 注入漏洞的工具,可用于安全研究和渗透测试。该工具提供了一个 LDAP 服务器实现,可以用来模拟 JNDI 注入攻击,执行命令或注入内存马。
URL:https://github.com/kN6jq/jndibypass
标签:#渗透测试
更新了:渗透测试
描述:JNDIBypass 是一个用于测试 Java JNDI 注入漏洞的工具,可用于安全研究和渗透测试。该工具提供了一个 LDAP 服务器实现,可以用来模拟 JNDI 注入攻击,执行命令或注入内存马。
URL:https://github.com/kN6jq/jndibypass
标签:#渗透测试
GitHub
GitHub - kN6jq/jndibypass: JNDIBypass 是一个用于测试 Java JNDI 注入漏洞的工具,可用于安全研究和渗透测试。该工具提供了一个 LDAP 服务器实现,可以用来模拟 JNDI 注入攻击,执行命令或注入内存马。
JNDIBypass 是一个用于测试 Java JNDI 注入漏洞的工具,可用于安全研究和渗透测试。该工具提供了一个 LDAP 服务器实现,可以用来模拟 JNDI 注入攻击,执行命令或注入内存马。 - kN6jq/jndibypass
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Multi-host, multi-port scanner and auditor for CVE-2025-6543-affected NetScaler devices. Supports SNMP and SSH enumeration with optional CSV reporting and exploit stubs.
URL:https://github.com/abrewer251/CVE-2025-6543_CitrixNetScalerr_PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Multi-host, multi-port scanner and auditor for CVE-2025-6543-affected NetScaler devices. Supports SNMP and SSH enumeration with optional CSV reporting and exploit stubs.
URL:https://github.com/abrewer251/CVE-2025-6543_CitrixNetScalerr_PoC
标签:#CVE-2025
GitHub
GitHub - abrewer251/CVE-2025-6543_CitrixNetScaler_PoC: Multi-host, multi-port scanner and auditor for CVE-2025-6543-affected NetScaler…
Multi-host, multi-port scanner and auditor for CVE-2025-6543-affected NetScaler devices. Supports SNMP and SSH enumeration with optional CSV reporting and exploit stubs. - abrewer251/CVE-2025-6543_...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Multi-host, multi-port scanner and auditor for CVE-2025-6543-affected NetScaler devices. Supports SNMP and SSH enumeration with optional CSV reporting and exploit stubs.
URL:https://github.com/abrewer251/CVE-2025-6543_CitrixNetScaler_PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Multi-host, multi-port scanner and auditor for CVE-2025-6543-affected NetScaler devices. Supports SNMP and SSH enumeration with optional CSV reporting and exploit stubs.
URL:https://github.com/abrewer251/CVE-2025-6543_CitrixNetScaler_PoC
标签:#CVE-2025
GitHub
GitHub - abrewer251/CVE-2025-6543_CitrixNetScaler_PoC: Multi-host, multi-port scanner and auditor for CVE-2025-6543-affected NetScaler…
Multi-host, multi-port scanner and auditor for CVE-2025-6543-affected NetScaler devices. Supports SNMP and SSH enumeration with optional CSV reporting and exploit stubs. - abrewer251/CVE-2025-6543_...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability
URL:https://github.com/mirchr/CVE-2025-32463-sudo-chwoot
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability
URL:https://github.com/mirchr/CVE-2025-32463-sudo-chwoot
标签:#CVE-2025
GitHub
GitHub - mirchr/CVE-2025-32463-sudo-chwoot: PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability
PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability - mirchr/CVE-2025-32463-sudo-chwoot
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32462 exploit code
URL:https://github.com/mylovem313/CVE-2025-32462
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32462 exploit code
URL:https://github.com/mylovem313/CVE-2025-32462
标签:#CVE-2025
GitHub
GitHub - mylovem313/CVE-2025-32462: CVE-2025-32462 exploit code
CVE-2025-32462 exploit code. Contribute to mylovem313/CVE-2025-32462 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-41646 - Critical Authentication bypass
URL:https://github.com/cyberre124/CVE-2025-41646---Critical-Authentication-Bypass-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-41646 - Critical Authentication bypass
URL:https://github.com/cyberre124/CVE-2025-41646---Critical-Authentication-Bypass-
标签:#CVE-2025
GitHub
GitHub - GreenForceNetworks/CVE-2025-41646---Critical-Authentication-Bypass-: CVE-2025-41646 - Critical Authentication bypass
CVE-2025-41646 - Critical Authentication bypass. Contribute to GreenForceNetworks/CVE-2025-41646---Critical-Authentication-Bypass- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:一个基于 OpenForensicRules 标准化的数字取证与应急响应信息采集规则格式规范的采集器
URL:https://github.com/Just-Hack-For-Fun/NOPTrace-Collector
标签:#应急响应
更新了:应急响应
描述:一个基于 OpenForensicRules 标准化的数字取证与应急响应信息采集规则格式规范的采集器
URL:https://github.com/Just-Hack-For-Fun/NOPTrace-Collector
标签:#应急响应
GitHub
GitHub - Just-Hack-For-Fun/NOPTrace-Collector: 一个基于 OpenForensicRules 标准化的数字取证与应急响应信息采集规则格式规范的采集器
一个基于 OpenForensicRules 标准化的数字取证与应急响应信息采集规则格式规范的采集器 - Just-Hack-For-Fun/NOPTrace-Collector
GitHub监控消息提醒!!!
更新了:RCE
描述:Mobile Security Researcher | Focus on Android/iOS RCE & Supply Chain Risks
URL:https://github.com/ZeroOneNode/dr0zer.github.io
标签:#RCE
更新了:RCE
描述:Mobile Security Researcher | Focus on Android/iOS RCE & Supply Chain Risks
URL:https://github.com/ZeroOneNode/dr0zer.github.io
标签:#RCE
GitHub
GitHub - ZeroOneNode/dr0zer.github.io: Mobile Security Researcher | Focus on Android/iOS RCE & Supply Chain Risks
Mobile Security Researcher | Focus on Android/iOS RCE & Supply Chain Risks - ZeroOneNode/dr0zer.github.io
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:sudo Local Privilege Escalation CVE-2025-32463
URL:https://github.com/pr0v3rbs/CVE-2025-32463_chwoot
标签:#CVE-2025
更新了:CVE-2025
描述:sudo Local Privilege Escalation CVE-2025-32463
URL:https://github.com/pr0v3rbs/CVE-2025-32463_chwoot
标签:#CVE-2025
GitHub
GitHub - pr0v3rbs/CVE-2025-32463_chwoot: Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463
Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463 - pr0v3rbs/CVE-2025-32463_chwoot
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:# CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so
URL:https://github.com/ill-deed/CVE-2025-32463_illdeed
标签:#CVE-2025
更新了:CVE-2025
描述:# CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so
URL:https://github.com/ill-deed/CVE-2025-32463_illdeed
标签:#CVE-2025
GitHub
GitHub - ill-deed/CVE-2025-32463_illdeed: Privilege escalation exploit for CVE-2025-32463 using a malicious NSS module injected…
Privilege escalation exploit for CVE-2025-32463 using a malicious NSS module injected via sudo -R. This version creates a stealth payload called illdeed, granting root access through a controlled c...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:# CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so
URL:https://github.com/zinzloun/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:# CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so
URL:https://github.com/zinzloun/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - zinzloun/CVE-2025-32463: # CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so
# CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so - zinzloun/CVE-2025-32463
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Unauthenticated Remote Code Execution exploit for CVE-2025-20281 in Cisco ISE ERS API. Execute commands or launch reverse shells as root — no authentication required.
URL:https://github.com/ill-deed/Cisco-CVE-2025-20281-illdeed
标签:#CVE-2025
更新了:CVE-2025
描述:Unauthenticated Remote Code Execution exploit for CVE-2025-20281 in Cisco ISE ERS API. Execute commands or launch reverse shells as root — no authentication required.
URL:https://github.com/ill-deed/Cisco-CVE-2025-20281-illdeed
标签:#CVE-2025
GitHub
GitHub - ill-deed/Cisco-CVE-2025-20281-illdeed: Unauthenticated Remote Code Execution exploit for CVE-2025-20281 in Cisco ISE ERS…
Unauthenticated Remote Code Execution exploit for CVE-2025-20281 in Cisco ISE ERS API. Execute commands or launch reverse shells as root — no authentication required. - ill-deed/Cisco-CVE-2025-2028...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Remote Command Execution exploit for Wing FTP Server (CVE-2025-47812)
URL:https://github.com/ill-deed/WingFTP-CVE-2025-47812-illdeed
标签:#CVE-2025
更新了:CVE-2025
描述:Remote Command Execution exploit for Wing FTP Server (CVE-2025-47812)
URL:https://github.com/ill-deed/WingFTP-CVE-2025-47812-illdeed
标签:#CVE-2025
GitHub
GitHub - ill-deed/WingFTP-CVE-2025-47812-illdeed: Remote Command Execution exploit for Wing FTP Server (CVE-2025-47812)
Remote Command Execution exploit for Wing FTP Server (CVE-2025-47812) - ill-deed/WingFTP-CVE-2025-47812-illdeed
GitHub监控消息提醒!!!
更新了:应急响应
描述:跨平台系统应急响应和安全分析工具集,支持Windows和Linux系统的全面安全检查、内存分析、日志审计、网络安全评估和安全基线检查。提供命令行工具和HTML报告生成功能,适用于安全事件响应、系统取证和日常安全巡检。
URL:https://github.com/wanglaizi/cross-platform-ir-tools
标签:#应急响应
更新了:应急响应
描述:跨平台系统应急响应和安全分析工具集,支持Windows和Linux系统的全面安全检查、内存分析、日志审计、网络安全评估和安全基线检查。提供命令行工具和HTML报告生成功能,适用于安全事件响应、系统取证和日常安全巡检。
URL:https://github.com/wanglaizi/cross-platform-ir-tools
标签:#应急响应
GitHub
GitHub - wanglaizi/cross-platform-ir-tools: 跨平台系统应急响应和安全分析工具集,支持Windows和Linux系统的全面安全检查、内存分析、日志审计、网络安全评估和安全基线检查。提供命令行工具和HTML报告生…
跨平台系统应急响应和安全分析工具集,支持Windows和Linux系统的全面安全检查、内存分析、日志审计、网络安全评估和安全基线检查。提供命令行工具和HTML报告生成功能,适用于安全事件响应、系统取证和日常安全巡检。 - wanglaizi/cross-platform-ir-tools
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured sudoers
URL:https://github.com/cyberpoul/CVE-2025-32463-POC
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured sudoers
URL:https://github.com/cyberpoul/CVE-2025-32463-POC
标签:#CVE-2025
GitHub
GitHub - 0p5cur/CVE-2025-32463-POC: 🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions…
🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions 1.9.14 to 1.9.17). This exploit abuses the --chroot option and a malicious nsswitch.conf to execute arbit...