GitHub监控消息提醒!!!
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/Tristes-joy/ZhiNengShouYinXiTong
标签:#信息收集
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/Tristes-joy/ZhiNengShouYinXiTong
标签:#信息收集
GitHub
GitHub - Tristes-joy/ZhiNengShouYinXiTong: 为提升零售效率、优化购物体验并降低人工成本,我们研发了基于RT-thread,以stm32为主控的创新智能收银系统。该系统由智能扫描终端、交互显示平台、支付结算系统和…
为提升零售效率、优化购物体验并降低人工成本,我们研发了基于RT-thread,以stm32为主控的创新智能收银系统。该系统由智能扫描终端、交互显示平台、支付结算系统和安防监控模块组成完整解决方案,并能提供照明效果。智能扫描终端采用高精度视觉识别技术,当商品openmv扫描区时可自动采集条形码信息;交互显示平台于OLED面板与上位机终端实时呈现商品明细及交易金额,确保消费透明;支付结算系统集成...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Minimal tool to test CVE-2025-6759 mitigation
URL:https://github.com/olljanat/TestCitrixException
标签:#CVE-2025
更新了:CVE-2025
描述:Minimal tool to test CVE-2025-6759 mitigation
URL:https://github.com/olljanat/TestCitrixException
标签:#CVE-2025
GitHub
GitHub - olljanat/TestCitrixException: Minimal tool to test CVE-2025-6759 mitigation
Minimal tool to test CVE-2025-6759 mitigation. Contribute to olljanat/TestCitrixException development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-48903 - Discord IP exposure via cache metadata poisoning @Fire Eye
URL:https://github.com/susancodes55/CVE-2025-48903-discord-poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-48903 - Discord IP exposure via cache metadata poisoning @Fire Eye
URL:https://github.com/susancodes55/CVE-2025-48903-discord-poc
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:webshell
描述: Legendary c99 shell reborn for 2025. Modern stealth PHP webshell
URL:https://github.com/privdayzcom/c99shell-v2025
标签:#webshell
更新了:webshell
描述: Legendary c99 shell reborn for 2025. Modern stealth PHP webshell
URL:https://github.com/privdayzcom/c99shell-v2025
标签:#webshell
GitHub
GitHub - privdayzcom/c99shell-v2025: Legendary c99 shell reborn for 2025. Modern stealth PHP webshell
Legendary c99 shell reborn for 2025. Modern stealth PHP webshell - privdayzcom/c99shell-v2025
GitHub监控消息提醒!!!
更新了:Red Team
描述:A text obfuscation tool designed for Red Team testing, with some practical end-user functionality in mind.
URL:https://github.com/Schvenn/Caesar
标签:#Red Team
更新了:Red Team
描述:A text obfuscation tool designed for Red Team testing, with some practical end-user functionality in mind.
URL:https://github.com/Schvenn/Caesar
标签:#Red Team
GitHub
GitHub - Schvenn/Caesar: A text obfuscation tool designed for Red Team testing, with some practical end-user functionality in mind.
A text obfuscation tool designed for Red Team testing, with some practical end-user functionality in mind. - Schvenn/Caesar
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Poc for CVE-2025-48384
URL:https://github.com/liamg/CVE-2025-48384
标签:#CVE-2025
更新了:CVE-2025
描述:Poc for CVE-2025-48384
URL:https://github.com/liamg/CVE-2025-48384
标签:#CVE-2025
GitHub
GitHub - liamg/CVE-2025-48384: PoC for CVE-2025-48384
PoC for CVE-2025-48384. Contribute to liamg/CVE-2025-48384 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:SSH Buffer Overflow Exploit - CVE-2025-1005
URL:https://github.com/susancodes55/ssh-buffer-overflow-rce-zero-day-poc
标签:#CVE-2025
更新了:CVE-2025
描述:SSH Buffer Overflow Exploit - CVE-2025-1005
URL:https://github.com/susancodes55/ssh-buffer-overflow-rce-zero-day-poc
标签:#CVE-2025
GitHub
GitHub - susancodes55/ssh-buffer-overflow-rce-zero-day-poc: SSH Buffer Overflow Exploit - CVE-2025-1005
SSH Buffer Overflow Exploit - CVE-2025-1005. Contribute to susancodes55/ssh-buffer-overflow-rce-zero-day-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Chromium V8 Engine RCE Exploit - CVE-2025-1002
URL:https://github.com/susancodes55/chromium-zero-day-rce-exploit
标签:#RCE
更新了:RCE
描述:Chromium V8 Engine RCE Exploit - CVE-2025-1002
URL:https://github.com/susancodes55/chromium-zero-day-rce-exploit
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32023
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-32023
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32023
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-32023
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-32023: CVE-2025-32023
CVE-2025-32023. Contribute to B1ack4sh/Blackash-CVE-2025-32023 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Chromium V8 Engine RCE Exploit - CVE-2025-1002
URL:https://github.com/danielsummerton12/chromium-zero-day-rce-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Chromium V8 Engine RCE Exploit - CVE-2025-1002
URL:https://github.com/danielsummerton12/chromium-zero-day-rce-exploit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32463: Local Privilege Escalation via Sudo chroot in Linux
URL:https://github.com/danielsummerton12/sudo-zero-day-CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32463: Local Privilege Escalation via Sudo chroot in Linux
URL:https://github.com/danielsummerton12/sudo-zero-day-CVE-2025-32463
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Simple File List – Unauthenticated RCE Exploit (CVE-2025-34085)
URL:https://github.com/MrjHaxcore/CVE-2025-
标签:#CVE-2025
更新了:CVE-2025
描述:Simple File List – Unauthenticated RCE Exploit (CVE-2025-34085)
URL:https://github.com/MrjHaxcore/CVE-2025-
标签:#CVE-2025
GitHub
GitHub - MrjHaxcore/CVE-2025-34085: Simple File List – Unauthenticated RCE Exploit (CVE-2025-34085)
Simple File List – Unauthenticated RCE Exploit (CVE-2025-34085) - MrjHaxcore/CVE-2025-34085
GitHub监控消息提醒!!!
更新了:RCE
描述:Simple File List – Unauthenticated RCE Exploit (CVE-2025-34085)
URL:https://github.com/MrjHaxcore/CVE-2025-34085
标签:#RCE
更新了:RCE
描述:Simple File List – Unauthenticated RCE Exploit (CVE-2025-34085)
URL:https://github.com/MrjHaxcore/CVE-2025-34085
标签:#RCE
GitHub
GitHub - MrjHaxcore/CVE-2025-34085: Simple File List – Unauthenticated RCE Exploit (CVE-2025-34085)
Simple File List – Unauthenticated RCE Exploit (CVE-2025-34085) - MrjHaxcore/CVE-2025-34085
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction directory when a user extracts a specially crafted
URL:https://github.com/absholi7ly/CVE-2025-6218-WinRAR-Directory-Traversal-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction directory when a user extracts a specially crafted
URL:https://github.com/absholi7ly/CVE-2025-6218-WinRAR-Directory-Traversal-RCE
标签:#CVE-2025
GitHub
GitHub - absholi7ly/CVE-2025-6218-WinRAR-Directory-Traversal-RCE: CVE-2025-6218 is a directory traversal vulnerability in WinRAR…
CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction directory when a user extracts a specially crafted - absholi7ly...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A test attack for CVE-2025-49144
URL:https://github.com/tristanvandermeer/CVE-2025-49144-Test
标签:#CVE-2025
更新了:CVE-2025
描述:A test attack for CVE-2025-49144
URL:https://github.com/tristanvandermeer/CVE-2025-49144-Test
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30208
URL:https://github.com/gonn4cry/CVE-2025-30208
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30208
URL:https://github.com/gonn4cry/CVE-2025-30208
标签:#CVE-2025
GitHub
GitHub - qodo-dev/CVE-2025-30208: CVE-2025-30208
CVE-2025-30208. Contribute to qodo-dev/CVE-2025-30208 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-6554 PoC
URL:https://github.com/9Insomnie/CVE-2025-6554
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-6554 PoC
URL:https://github.com/9Insomnie/CVE-2025-6554
标签:#CVE-2025
GitHub
GitHub - 9Insomnie/CVE-2025-6554: CVE-2025-6554 漏洞概念验证
CVE-2025-6554 漏洞概念验证. Contribute to 9Insomnie/CVE-2025-6554 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Simple File List – Unauthenticated RCE Exploit (CVE-2025-34085)
URL:https://github.com/sensesVoid/rce
标签:#RCE
更新了:RCE
描述:Simple File List – Unauthenticated RCE Exploit (CVE-2025-34085)
URL:https://github.com/sensesVoid/rce
标签:#RCE
GitHub
GitHub - sensesVoid/rce: This engine is a powerful tool for structured, AI-driven development. By investing a small amount of time…
This engine is a powerful tool for structured, AI-driven development. By investing a small amount of time in defining your requirements upfront, you can achieve a high degree of automation and qual...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-32023
URL:https://github.com/atomicjjbod/CVE-2025-32023
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-32023
URL:https://github.com/atomicjjbod/CVE-2025-32023
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)
URL:https://github.com/bughuntar/CVE-2025-5777
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)
URL:https://github.com/bughuntar/CVE-2025-5777
标签:#CVE-2025
GitHub
GitHub - bughuntar/CVE-2025-5777: CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)
CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2) - bughuntar/CVE-2025-5777