GitHub监控消息提醒!!!
更新了:RCE
描述:Simple File List – Unauthenticated RCE Exploit (CVE-2025-34085)
URL:https://github.com/sensesVoid/rce
标签:#RCE
更新了:RCE
描述:Simple File List – Unauthenticated RCE Exploit (CVE-2025-34085)
URL:https://github.com/sensesVoid/rce
标签:#RCE
GitHub
GitHub - sensesVoid/rce: This engine is a powerful tool for structured, AI-driven development. By investing a small amount of time…
This engine is a powerful tool for structured, AI-driven development. By investing a small amount of time in defining your requirements upfront, you can achieve a high degree of automation and qual...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-32023
URL:https://github.com/atomicjjbod/CVE-2025-32023
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-32023
URL:https://github.com/atomicjjbod/CVE-2025-32023
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)
URL:https://github.com/bughuntar/CVE-2025-5777
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)
URL:https://github.com/bughuntar/CVE-2025-5777
标签:#CVE-2025
GitHub
GitHub - bughuntar/CVE-2025-5777: CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)
CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2) - bughuntar/CVE-2025-5777
GitHub监控消息提醒!!!
更新了:RCE
描述:Metasploit module for MailEnable CVE-2022-36934 authentication bypass RCE
URL:https://github.com/Teexo/mailenable-cve-2022-36934
标签:#RCE
更新了:RCE
描述:Metasploit module for MailEnable CVE-2022-36934 authentication bypass RCE
URL:https://github.com/Teexo/mailenable-cve-2022-36934
标签:#RCE
GitHub
GitHub - Teexo/mailenable-cve-2022-36934: Metasploit module for MailEnable CVE-2022-36934 authentication bypass RCE
Metasploit module for MailEnable CVE-2022-36934 authentication bypass RCE - Teexo/mailenable-cve-2022-36934
GitHub监控消息提醒!!!
更新了:RCE
描述:Delivering PHP RCE (CVE-2024-4577) to the Local Network Servers
URL:https://github.com/ZeroMemoryEx/PHP-CGI-INTERNAL-RCE
标签:#RCE
更新了:RCE
描述:Delivering PHP RCE (CVE-2024-4577) to the Local Network Servers
URL:https://github.com/ZeroMemoryEx/PHP-CGI-INTERNAL-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:FortiWeb CVE-2025-25257 exploit
URL:https://github.com/0xbigshaq/CVE-2025-25257
标签:#CVE-2025
更新了:CVE-2025
描述:FortiWeb CVE-2025-25257 exploit
URL:https://github.com/0xbigshaq/CVE-2025-25257
标签:#CVE-2025
GitHub
GitHub - 0xbigshaq/CVE-2025-25257: FortiWeb CVE-2025-25257 exploit
FortiWeb CVE-2025-25257 exploit. Contribute to 0xbigshaq/CVE-2025-25257 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This PoC for CVE-2025-48799 demonstrates an elevation of privilege vulnerability in Windows Update service, affecting Windows 10 and 11. 🐱💻🔒
URL:https://github.com/KOVmechatronics/CVE-2025-48799
标签:#CVE-2025
更新了:CVE-2025
描述:This PoC for CVE-2025-48799 demonstrates an elevation of privilege vulnerability in Windows Update service, affecting Windows 10 and 11. 🐱💻🔒
URL:https://github.com/KOVmechatronics/CVE-2025-48799
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Rust PoC for CVE-2025-32463 (Sudo chroot Local PrivEsc)
URL:https://github.com/morgenm/sudo-chroot-CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:Rust PoC for CVE-2025-32463 (Sudo chroot Local PrivEsc)
URL:https://github.com/morgenm/sudo-chroot-CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - morgenm/sudo-chroot-CVE-2025-32463: Rust PoC for CVE-2025-32463 (sudo chroot "chwoot" Local PrivEsc)
Rust PoC for CVE-2025-32463 (sudo chroot "chwoot" Local PrivEsc) - morgenm/sudo-chroot-CVE-2025-32463
GitHub监控消息提醒!!!
更新了:RCE
描述:Documentation for CVE-2025-6514. MCP-Remote RCE.
URL:https://github.com/ChaseHCS/CVE-2025-6514
标签:#RCE
更新了:RCE
描述:Documentation for CVE-2025-6514. MCP-Remote RCE.
URL:https://github.com/ChaseHCS/CVE-2025-6514
标签:#RCE
GitHub
GitHub - ChaseHCS/CVE-2025-6514: Documentation for CVE-2025-6514. MCP-Remote RCE.
Documentation for CVE-2025-6514. MCP-Remote RCE. Contribute to ChaseHCS/CVE-2025-6514 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public Disclosure of CVE-2025-52097
URL:https://github.com/rwilsonecs/CVE-2025-52097
标签:#CVE-2025
更新了:CVE-2025
描述:Public Disclosure of CVE-2025-52097
URL:https://github.com/rwilsonecs/CVE-2025-52097
标签:#CVE-2025
GitHub
GitHub - rwilsonecs/CVE-2025-52097: Public Disclosure of CVE-2025-52097
Public Disclosure of CVE-2025-52097. Contribute to rwilsonecs/CVE-2025-52097 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:这个仓库收集了所有在 GitHub 上能找到的 CVE 漏洞利用工具。 This repository collects all CVE exploits found on GitHub.
URL:https://github.com/Aining777/js-security-analyzer
标签:#漏洞利用
更新了:漏洞利用
描述:这个仓库收集了所有在 GitHub 上能找到的 CVE 漏洞利用工具。 This repository collects all CVE exploits found on GitHub.
URL:https://github.com/Aining777/js-security-analyzer
标签:#漏洞利用
GitHub
GitHub - Aining777/js-security-analyzer: 本项目是一个基于 Python 的命令行工具,利用 Google Gemini API 对 JavaScript (JS) 代码进行自动化安全分析。它支持从本地文件、本地目录或远程网站…
本项目是一个基于 Python 的命令行工具,利用 Google Gemini API 对 JavaScript (JS) 代码进行自动化安全分析。它支持从本地文件、本地目录或远程网站 URL 中获取 JS 代码,并能够处理超长代码,将其分块发送给 AI 进行分析,最后生成结构清晰、内容详尽的 HTML 报告。该工具旨在帮助开发者和安全研究人员快速识别 JS 代码中潜在的安全漏洞、不当的编码...
GitHub监控消息提醒!!!
更新了:红队
描述:本工具是一个用于解决红队进行攻防演练时快速检索漏洞储备对应目标的资产
URL:https://github.com/iQingshan/VRST
标签:#红队
更新了:红队
描述:本工具是一个用于解决红队进行攻防演练时快速检索漏洞储备对应目标的资产
URL:https://github.com/iQingshan/VRST
标签:#红队
GitHub
GitHub - iQingshan/VRST: 本工具是一个用于解决红队进行攻防演练时快速检索漏洞储备对应目标的资产
本工具是一个用于解决红队进行攻防演练时快速检索漏洞储备对应目标的资产. Contribute to iQingshan/VRST development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Explore the CVE-2025-5777 vulnerability in Citrix NetScaler. This script highlights a memory leak issue for educational purposes. 🐱💻🔍
URL:https://github.com/Jishanluhar/CVE-2025-5777
标签:#CVE-2025
更新了:CVE-2025
描述:Explore the CVE-2025-5777 vulnerability in Citrix NetScaler. This script highlights a memory leak issue for educational purposes. 🐱💻🔍
URL:https://github.com/Jishanluhar/CVE-2025-5777
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Explore the CVE-2025-5777 vulnerability in Citrix NetScaler. This script highlights a memory leak issue for educational purposes. 🐱💻🔍
URL:https://github.com/sentilaso1/CVE-2025-24813-Apache-Tomcat-RCE-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Explore the CVE-2025-5777 vulnerability in Citrix NetScaler. This script highlights a memory leak issue for educational purposes. 🐱💻🔍
URL:https://github.com/sentilaso1/CVE-2025-24813-Apache-Tomcat-RCE-PoC
标签:#CVE-2025
GitHub
GitHub - sentilaso1/CVE-2025-24813-Apache-Tomcat-RCE-PoC: Proof of Concept for CVE-2025-24813, a Remote Code Execution vulnerability…
Proof of Concept for CVE-2025-24813, a Remote Code Execution vulnerability in Apache Tomcat. This PoC exploits unsafe deserialization via crafted session files uploaded through HTTP PUT requests, a...
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2024-40453 - Squirrelly v9.0.0 RCE. Poc
URL:https://github.com/BwithE/CVE-2024-40453
标签:#RCE
更新了:RCE
描述:CVE-2024-40453 - Squirrelly v9.0.0 RCE. Poc
URL:https://github.com/BwithE/CVE-2024-40453
标签:#RCE
GitHub
GitHub - BwithE/CVE-2024-40453: CVE-2024-40453 - Squirrelly v9.0.0 RCE. Poc
CVE-2024-40453 - Squirrelly v9.0.0 RCE. Poc. Contribute to BwithE/CVE-2024-40453 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Tool for detecting and exploiting CVE-2025-25257 in Fortinet FortiWeb.
URL:https://github.com/adilburaksen/CVE-2025-25257-Exploit-Tool
标签:#CVE-2025
更新了:CVE-2025
描述:Tool for detecting and exploiting CVE-2025-25257 in Fortinet FortiWeb.
URL:https://github.com/adilburaksen/CVE-2025-25257-Exploit-Tool
标签:#CVE-2025
GitHub
GitHub - adilburaksen/CVE-2025-25257-Exploit-Tool: Tool for detecting and exploiting CVE-2025-25257 in Fortinet FortiWeb.
Tool for detecting and exploiting CVE-2025-25257 in Fortinet FortiWeb. - adilburaksen/CVE-2025-25257-Exploit-Tool
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25257
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-25257
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25257
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-25257
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-25257: CVE-2025-25257
CVE-2025-25257. Contribute to B1ack4sh/Blackash-CVE-2025-25257 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-27591
URL:https://github.com/obamalaolu/CVE-2025-27591
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-27591
URL:https://github.com/obamalaolu/CVE-2025-27591
标签:#CVE-2025
GitHub
GitHub - obamalaolu/CVE-2025-27591: CVE-2025-27591
CVE-2025-27591. Contribute to obamalaolu/CVE-2025-27591 development by creating an account on GitHub.