GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-20281
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-20281
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-20281
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-20281
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-20281: CVE-2025-20281
CVE-2025-20281. Contribute to B1ack4sh/Blackash-CVE-2025-20281 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This repository is for data used in the RCEL 506 Course
URL:https://github.com/derekmayon/RCEL506
标签:#RCE
更新了:RCE
描述:This repository is for data used in the RCEL 506 Course
URL:https://github.com/derekmayon/RCEL506
标签:#RCE
GitHub
GitHub - derekmayon/RCEL506: This repository is for data used in the RCEL 506 Course
This repository is for data used in the RCEL 506 Course - derekmayon/RCEL506
GitHub监控消息提醒!!!
更新了:代码审计
描述:X-SAST 替代Seay的多语言、轻量、快速、代码审计工具
URL:https://github.com/winezer0/X-SAST-PUBLIC
标签:#代码审计
更新了:代码审计
描述:X-SAST 替代Seay的多语言、轻量、快速、代码审计工具
URL:https://github.com/winezer0/X-SAST-PUBLIC
标签:#代码审计
GitHub
GitHub - winezer0/X-SAST-PUBLIC: X-SAST 替代Seay的多语言、轻量、快速、代码审计工具
X-SAST 替代Seay的多语言、轻量、快速、代码审计工具. Contribute to winezer0/X-SAST-PUBLIC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:符合 OpenForensicRules 数字取证与应急响应信息采集规则格式规范的配置文件仓库
URL:https://github.com/Just-Hack-For-Fun/NOPTrace-Configs
标签:#应急响应
更新了:应急响应
描述:符合 OpenForensicRules 数字取证与应急响应信息采集规则格式规范的配置文件仓库
URL:https://github.com/Just-Hack-For-Fun/NOPTrace-Configs
标签:#应急响应
GitHub
GitHub - Just-Hack-For-Fun/NOPTrace-Configs: 符合 OpenForensicRules 数字取证与应急响应信息采集规则格式规范的配置文件仓库
符合 OpenForensicRules 数字取证与应急响应信息采集规则格式规范的配置文件仓库. Contribute to Just-Hack-For-Fun/NOPTrace-Configs development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Docker PoC for CVE-2025-32462 & CVE-2025-32463 (sudo), based on Stratascale CRU research.
URL:https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab
标签:#CVE-2025
更新了:CVE-2025
描述:Docker PoC for CVE-2025-32462 & CVE-2025-32463 (sudo), based on Stratascale CRU research.
URL:https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab
标签:#CVE-2025
GitHub
GitHub - MAAYTHM/CVE-2025-32462_32463-Lab: Docker PoC for CVE-2025-32462 & CVE-2025-32463 (sudo), based on Stratascale CRU research.
Docker PoC for CVE-2025-32462 & CVE-2025-32463 (sudo), based on Stratascale CRU research. - MAAYTHM/CVE-2025-32462_32463-Lab
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-47812 with custom psudo shell and robust error handling.
URL:https://github.com/pevinkumar10/CVE-2025-47812
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-47812 with custom psudo shell and robust error handling.
URL:https://github.com/pevinkumar10/CVE-2025-47812
标签:#CVE-2025
GitHub
GitHub - pevinkumar10/CVE-2025-47812: Exploit for CVE-2025-47812 with custom psudo shell and robust error handling.
Exploit for CVE-2025-47812 with custom psudo shell and robust error handling. - pevinkumar10/CVE-2025-47812
GitHub监控消息提醒!!!
更新了:RCE
描述:A PoC for CVE-2025-48703 (CWP RCE) with intelligent user dictionary generation based on domain names to maximize the reliability of successful exploitation.
URL:https://github.com/Sq-CC/CVE-2025-48703
标签:#RCE
更新了:RCE
描述:A PoC for CVE-2025-48703 (CWP RCE) with intelligent user dictionary generation based on domain names to maximize the reliability of successful exploitation.
URL:https://github.com/Sq-CC/CVE-2025-48703
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Authenticated RCE in Grafana (v11.0) via SQL Expressions - PoC Exploit
URL:https://github.com/rvizx/CVE-2024-9264
标签:#RCE
更新了:RCE
描述:Authenticated RCE in Grafana (v11.0) via SQL Expressions - PoC Exploit
URL:https://github.com/rvizx/CVE-2024-9264
标签:#RCE
GitHub
GitHub - rvizx/CVE-2024-9264: Authenticated RCE in Grafana (v11.0) via SQL Expressions - PoC Exploit
Authenticated RCE in Grafana (v11.0) via SQL Expressions - PoC Exploit - rvizx/CVE-2024-9264
GitHub监控消息提醒!!!
更新了:代码审计
描述:6万字奶爸级WebGoat8.X代码审计大全,全文均可复现,适合刚学完JAVASE准备开始代码审计的师傅🌟
URL:https://github.com/d0ctorsec/WebGoatVulnerabilityRangeCodeAudit
标签:#代码审计
更新了:代码审计
描述:6万字奶爸级WebGoat8.X代码审计大全,全文均可复现,适合刚学完JAVASE准备开始代码审计的师傅🌟
URL:https://github.com/d0ctorsec/WebGoatVulnerabilityRangeCodeAudit
标签:#代码审计
GitHub
GitHub - d0ctorsec/WebGoatVulnerabilityRangeCodeAudit: 6万字奶爸级WebGoat8.X代码审计大全,全文均可复现,适合刚学完JAVASE准备开始代码审计的师傅🌟
6万字奶爸级WebGoat8.X代码审计大全,全文均可复现,适合刚学完JAVASE准备开始代码审计的师傅🌟 - d0ctorsec/WebGoatVulnerabilityRangeCodeAudit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CitrixBleed 2 (CVE-2025-5777)
URL:https://github.com/Chocapikk/CVE-2025-5777
标签:#CVE-2025
更新了:CVE-2025
描述:CitrixBleed 2 (CVE-2025-5777)
URL:https://github.com/Chocapikk/CVE-2025-5777
标签:#CVE-2025
GitHub
GitHub - Chocapikk/CVE-2025-5777: CitrixBleed 2 (CVE-2025-5777)
CitrixBleed 2 (CVE-2025-5777). Contribute to Chocapikk/CVE-2025-5777 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:poison.py - Tool to search for available log files for LFI/RFI vulnerabilities, and automatic escalation to RCE/Shell.
URL:https://github.com/coldt3ars/poison
标签:#RCE
更新了:RCE
描述:poison.py - Tool to search for available log files for LFI/RFI vulnerabilities, and automatic escalation to RCE/Shell.
URL:https://github.com/coldt3ars/poison
标签:#RCE
GitHub
GitHub - coldt3ars/poison: poison.py - Tool to search for available log files for LFI/RFI vulnerabilities, and automatic escalation…
poison.py - Tool to search for available log files for LFI/RFI vulnerabilities, and automatic escalation to RCE/Shell. - coldt3ars/poison
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-5777 (CitrixBleed 2) - critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices
URL:https://github.com/win3zz/CVE-2025-5777
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-5777 (CitrixBleed 2) - critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices
URL:https://github.com/win3zz/CVE-2025-5777
标签:#CVE-2025
GitHub
GitHub - win3zz/CVE-2025-5777: CVE-2025-5777 (CitrixBleed 2) - Critical memory leak vulnerability affecting Citrix NetScaler ADC…
CVE-2025-5777 (CitrixBleed 2) - Critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices - win3zz/CVE-2025-5777
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-5777 (CitrixBleed 2) - critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices
URL:https://github.com/bloodcode-spasov/ble-cve2025-attack-new-version
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-5777 (CitrixBleed 2) - critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices
URL:https://github.com/bloodcode-spasov/ble-cve2025-attack-new-version
标签:#CVE-2025
GitHub
GitHub - bloodcode-spasov/ble-cve2025-attack-new-version: # android-ble-cve-2025-4866 🔐 **PoC za CVE-2025-4866 — Android BLE ranjivost…
# android-ble-cve-2025-4866 🔐 **PoC za CVE-2025-4866 — Android BLE ranjivost (javna verzija)** 📡 Iskorišćavanje slabosti u BLE autorizaciji na Android uređajima (public PoC only). 👨💻 Razvijeno...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-5777 (CitrixBleed 2) - Critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices
URL:https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-5777 (CitrixBleed 2) - Critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices
URL:https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC
标签:#CVE-2025
GitHub
GitHub - abrewer251/CVE-2025-32463_Sudo_PoC: PoC for CVE-2025-32463: Local privilege escalation in sudo via --chroot. Exploits…
PoC for CVE-2025-32463: Local privilege escalation in sudo via --chroot. Exploits NSS module injection through crafted chroot environments. Designed for security researchers and lab-only environmen...
GitHub监控消息提醒!!!
更新了:RCE
描述:Unauthenticated Python PoC for CVE-2025-20281 RCE against ISE ERS API
URL:https://github.com/abrewer251/CVE-2025-20281-2-Cisco-ISE-RCE
标签:#RCE
更新了:RCE
描述:Unauthenticated Python PoC for CVE-2025-20281 RCE against ISE ERS API
URL:https://github.com/abrewer251/CVE-2025-20281-2-Cisco-ISE-RCE
标签:#RCE
GitHub
GitHub - abrewer251/CVE-2025-20281-2-Cisco-ISE-RCE: Unauthenticated Python PoC for CVE-2025-20281 RCE against ISE ERS API
Unauthenticated Python PoC for CVE-2025-20281 RCE against ISE ERS API - abrewer251/CVE-2025-20281-2-Cisco-ISE-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32463 - Sudo Privilege Escalation Exploit POC (2025)
URL:https://github.com/susancodes55/CVE-2025-32463-sudo-poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32463 - Sudo Privilege Escalation Exploit POC (2025)
URL:https://github.com/susancodes55/CVE-2025-32463-sudo-poc
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Breaking git with a carriage return and cloning RCE
URL:https://github.com/acheong08/CVE-2025-48384
标签:#RCE
更新了:RCE
描述:Breaking git with a carriage return and cloning RCE
URL:https://github.com/acheong08/CVE-2025-48384
标签:#RCE
GitHub
GitHub - acheong08/CVE-2025-48384: Breaking git with a carriage return and cloning RCE
Breaking git with a carriage return and cloning RCE - acheong08/CVE-2025-48384
GitHub监控消息提醒!!!
更新了:RCE
描述:Modern vulnerable web application lab for practicing real-world web exploits — XSS, IDOR, RCE, Race Conditions, and more.
URL:https://github.com/TraceX0/VulneraX0
标签:#RCE
更新了:RCE
描述:Modern vulnerable web application lab for practicing real-world web exploits — XSS, IDOR, RCE, Race Conditions, and more.
URL:https://github.com/TraceX0/VulneraX0
标签:#RCE
GitHub
GitHub - TraceX0/VulneraX0: Modern vulnerable web application lab for practicing real-world web exploits — XSS, IDOR, RCE, Race…
Modern vulnerable web application lab for practicing real-world web exploits — XSS, IDOR, RCE, Race Conditions, and more. - TraceX0/VulneraX0