GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability
URL:https://github.com/mirchr/CVE-2025-32463-sudo-chwoot
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability
URL:https://github.com/mirchr/CVE-2025-32463-sudo-chwoot
标签:#CVE-2025
GitHub
GitHub - mirchr/CVE-2025-32463-sudo-chwoot: PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability
PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability - mirchr/CVE-2025-32463-sudo-chwoot
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32462 exploit code
URL:https://github.com/mylovem313/CVE-2025-32462
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32462 exploit code
URL:https://github.com/mylovem313/CVE-2025-32462
标签:#CVE-2025
GitHub
GitHub - mylovem313/CVE-2025-32462: CVE-2025-32462 exploit code
CVE-2025-32462 exploit code. Contribute to mylovem313/CVE-2025-32462 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-41646 - Critical Authentication bypass
URL:https://github.com/cyberre124/CVE-2025-41646---Critical-Authentication-Bypass-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-41646 - Critical Authentication bypass
URL:https://github.com/cyberre124/CVE-2025-41646---Critical-Authentication-Bypass-
标签:#CVE-2025
GitHub
GitHub - GreenForceNetworks/CVE-2025-41646---Critical-Authentication-Bypass-: CVE-2025-41646 - Critical Authentication bypass
CVE-2025-41646 - Critical Authentication bypass. Contribute to GreenForceNetworks/CVE-2025-41646---Critical-Authentication-Bypass- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:一个基于 OpenForensicRules 标准化的数字取证与应急响应信息采集规则格式规范的采集器
URL:https://github.com/Just-Hack-For-Fun/NOPTrace-Collector
标签:#应急响应
更新了:应急响应
描述:一个基于 OpenForensicRules 标准化的数字取证与应急响应信息采集规则格式规范的采集器
URL:https://github.com/Just-Hack-For-Fun/NOPTrace-Collector
标签:#应急响应
GitHub
GitHub - Just-Hack-For-Fun/NOPTrace-Collector: 一个基于 OpenForensicRules 标准化的数字取证与应急响应信息采集规则格式规范的采集器
一个基于 OpenForensicRules 标准化的数字取证与应急响应信息采集规则格式规范的采集器 - Just-Hack-For-Fun/NOPTrace-Collector
GitHub监控消息提醒!!!
更新了:RCE
描述:Mobile Security Researcher | Focus on Android/iOS RCE & Supply Chain Risks
URL:https://github.com/ZeroOneNode/dr0zer.github.io
标签:#RCE
更新了:RCE
描述:Mobile Security Researcher | Focus on Android/iOS RCE & Supply Chain Risks
URL:https://github.com/ZeroOneNode/dr0zer.github.io
标签:#RCE
GitHub
GitHub - ZeroOneNode/dr0zer.github.io: Mobile Security Researcher | Focus on Android/iOS RCE & Supply Chain Risks
Mobile Security Researcher | Focus on Android/iOS RCE & Supply Chain Risks - ZeroOneNode/dr0zer.github.io
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:sudo Local Privilege Escalation CVE-2025-32463
URL:https://github.com/pr0v3rbs/CVE-2025-32463_chwoot
标签:#CVE-2025
更新了:CVE-2025
描述:sudo Local Privilege Escalation CVE-2025-32463
URL:https://github.com/pr0v3rbs/CVE-2025-32463_chwoot
标签:#CVE-2025
GitHub
GitHub - pr0v3rbs/CVE-2025-32463_chwoot: Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463
Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463 - pr0v3rbs/CVE-2025-32463_chwoot
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:# CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so
URL:https://github.com/ill-deed/CVE-2025-32463_illdeed
标签:#CVE-2025
更新了:CVE-2025
描述:# CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so
URL:https://github.com/ill-deed/CVE-2025-32463_illdeed
标签:#CVE-2025
GitHub
GitHub - ill-deed/CVE-2025-32463_illdeed: Privilege escalation exploit for CVE-2025-32463 using a malicious NSS module injected…
Privilege escalation exploit for CVE-2025-32463 using a malicious NSS module injected via sudo -R. This version creates a stealth payload called illdeed, granting root access through a controlled c...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:# CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so
URL:https://github.com/zinzloun/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:# CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so
URL:https://github.com/zinzloun/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - zinzloun/CVE-2025-32463: # CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so
# CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so - zinzloun/CVE-2025-32463
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Unauthenticated Remote Code Execution exploit for CVE-2025-20281 in Cisco ISE ERS API. Execute commands or launch reverse shells as root — no authentication required.
URL:https://github.com/ill-deed/Cisco-CVE-2025-20281-illdeed
标签:#CVE-2025
更新了:CVE-2025
描述:Unauthenticated Remote Code Execution exploit for CVE-2025-20281 in Cisco ISE ERS API. Execute commands or launch reverse shells as root — no authentication required.
URL:https://github.com/ill-deed/Cisco-CVE-2025-20281-illdeed
标签:#CVE-2025
GitHub
GitHub - ill-deed/Cisco-CVE-2025-20281-illdeed: Unauthenticated Remote Code Execution exploit for CVE-2025-20281 in Cisco ISE ERS…
Unauthenticated Remote Code Execution exploit for CVE-2025-20281 in Cisco ISE ERS API. Execute commands or launch reverse shells as root — no authentication required. - ill-deed/Cisco-CVE-2025-2028...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Remote Command Execution exploit for Wing FTP Server (CVE-2025-47812)
URL:https://github.com/ill-deed/WingFTP-CVE-2025-47812-illdeed
标签:#CVE-2025
更新了:CVE-2025
描述:Remote Command Execution exploit for Wing FTP Server (CVE-2025-47812)
URL:https://github.com/ill-deed/WingFTP-CVE-2025-47812-illdeed
标签:#CVE-2025
GitHub
GitHub - ill-deed/WingFTP-CVE-2025-47812-illdeed: Remote Command Execution exploit for Wing FTP Server (CVE-2025-47812)
Remote Command Execution exploit for Wing FTP Server (CVE-2025-47812) - ill-deed/WingFTP-CVE-2025-47812-illdeed
GitHub监控消息提醒!!!
更新了:应急响应
描述:跨平台系统应急响应和安全分析工具集,支持Windows和Linux系统的全面安全检查、内存分析、日志审计、网络安全评估和安全基线检查。提供命令行工具和HTML报告生成功能,适用于安全事件响应、系统取证和日常安全巡检。
URL:https://github.com/wanglaizi/cross-platform-ir-tools
标签:#应急响应
更新了:应急响应
描述:跨平台系统应急响应和安全分析工具集,支持Windows和Linux系统的全面安全检查、内存分析、日志审计、网络安全评估和安全基线检查。提供命令行工具和HTML报告生成功能,适用于安全事件响应、系统取证和日常安全巡检。
URL:https://github.com/wanglaizi/cross-platform-ir-tools
标签:#应急响应
GitHub
GitHub - wanglaizi/cross-platform-ir-tools: 跨平台系统应急响应和安全分析工具集,支持Windows和Linux系统的全面安全检查、内存分析、日志审计、网络安全评估和安全基线检查。提供命令行工具和HTML报告生…
跨平台系统应急响应和安全分析工具集,支持Windows和Linux系统的全面安全检查、内存分析、日志审计、网络安全评估和安全基线检查。提供命令行工具和HTML报告生成功能,适用于安全事件响应、系统取证和日常安全巡检。 - wanglaizi/cross-platform-ir-tools
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured sudoers
URL:https://github.com/cyberpoul/CVE-2025-32463-POC
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured sudoers
URL:https://github.com/cyberpoul/CVE-2025-32463-POC
标签:#CVE-2025
GitHub
GitHub - 0p5cur/CVE-2025-32463-POC: 🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions…
🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions 1.9.14 to 1.9.17). This exploit abuses the --chroot option and a malicious nsswitch.conf to execute arbit...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CitrixBleed-2 (CVE-2025-5777) – proof-of-concept exploit for NetScaler ADC/Gateway “memory bleed”
URL:https://github.com/RickGeex/CVE-2025-5777-CitrixBleed
标签:#CVE-2025
更新了:CVE-2025
描述:CitrixBleed-2 (CVE-2025-5777) – proof-of-concept exploit for NetScaler ADC/Gateway “memory bleed”
URL:https://github.com/RickGeex/CVE-2025-5777-CitrixBleed
标签:#CVE-2025
GitHub
GitHub - RickGeex/CVE-2025-5777-CitrixBleed: CitrixBleed-2 (CVE-2025-5777) – proof-of-concept exploit for NetScaler ADC/Gateway…
CitrixBleed-2 (CVE-2025-5777) – proof-of-concept exploit for NetScaler ADC/Gateway “memory bleed” - RickGeex/CVE-2025-5777-CitrixBleed
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32463
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32463
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-32463: CVE-2025-32463
CVE-2025-32463. Contribute to B1ack4sh/Blackash-CVE-2025-32463 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨
URL:https://github.com/SkylerMC/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨
URL:https://github.com/SkylerMC/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - SkylerMC/CVE-2025-32463: Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access.…
Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨ - SkylerMC/CVE-2025-32463
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒
URL:https://github.com/yeremeu/CVE-2025-32463_chwoot
标签:#CVE-2025
更新了:CVE-2025
描述:Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒
URL:https://github.com/yeremeu/CVE-2025-32463_chwoot
标签:#CVE-2025
GitHub
GitHub - yeremeu/CVE-2025-32463_chwoot: Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit…
Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒 - yeremeu/CVE-2025-32463_chwoot
GitHub监控消息提醒!!!
更新了:RCE
描述:A simulation tool for testing remote code execution (RCE) Bugs in the Discord desktop client
URL:https://github.com/0Rafas/Discord-RCE
标签:#RCE
更新了:RCE
描述:A simulation tool for testing remote code execution (RCE) Bugs in the Discord desktop client
URL:https://github.com/0Rafas/Discord-RCE
标签:#RCE
GitHub
GitHub - 0Rafas/Discord-RCE: A simulation tool for testing remote code execution (RCE) Bugs in the Discord desktop client
A simulation tool for testing remote code execution (RCE) Bugs in the Discord desktop client - 0Rafas/Discord-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49493
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-49493
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49493
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-49493
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-49493: CVE-2025-49493
CVE-2025-49493. Contribute to B1ack4sh/Blackash-CVE-2025-49493 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-0411
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-0411
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-0411
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-0411
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-0411: CVE-2025-0411
CVE-2025-0411. Contribute to B1ack4sh/Blackash-CVE-2025-0411 development by creating an account on GitHub.