GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2024-40453 - Squirrelly v9.0.0 RCE. Poc
URL:https://github.com/BwithE/CVE-2024-40453
标签:#RCE
更新了:RCE
描述:CVE-2024-40453 - Squirrelly v9.0.0 RCE. Poc
URL:https://github.com/BwithE/CVE-2024-40453
标签:#RCE
GitHub
GitHub - BwithE/CVE-2024-40453: CVE-2024-40453 - Squirrelly v9.0.0 RCE. Poc
CVE-2024-40453 - Squirrelly v9.0.0 RCE. Poc. Contribute to BwithE/CVE-2024-40453 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Tool for detecting and exploiting CVE-2025-25257 in Fortinet FortiWeb.
URL:https://github.com/adilburaksen/CVE-2025-25257-Exploit-Tool
标签:#CVE-2025
更新了:CVE-2025
描述:Tool for detecting and exploiting CVE-2025-25257 in Fortinet FortiWeb.
URL:https://github.com/adilburaksen/CVE-2025-25257-Exploit-Tool
标签:#CVE-2025
GitHub
GitHub - adilburaksen/CVE-2025-25257-Exploit-Tool: Tool for detecting and exploiting CVE-2025-25257 in Fortinet FortiWeb.
Tool for detecting and exploiting CVE-2025-25257 in Fortinet FortiWeb. - adilburaksen/CVE-2025-25257-Exploit-Tool
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25257
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-25257
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25257
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-25257
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-25257: CVE-2025-25257
CVE-2025-25257. Contribute to B1ack4sh/Blackash-CVE-2025-25257 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-27591
URL:https://github.com/obamalaolu/CVE-2025-27591
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-27591
URL:https://github.com/obamalaolu/CVE-2025-27591
标签:#CVE-2025
GitHub
GitHub - obamalaolu/CVE-2025-27591: CVE-2025-27591
CVE-2025-27591. Contribute to obamalaolu/CVE-2025-27591 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-27591
URL:https://github.com/rvizx/CVE-2025-27591
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-27591
URL:https://github.com/rvizx/CVE-2025-27591
标签:#CVE-2025
GitHub
GitHub - rvizx/CVE-2025-27591: Below v0.8.1 - Local Privilege Escalation (CVE-2025-27591) - PoC Exploit
Below v0.8.1 - Local Privilege Escalation (CVE-2025-27591) - PoC Exploit - rvizx/CVE-2025-27591
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers PHP webshells across large target sets.
URL:https://github.com/ill-deed/CVE-2025-34085-Multi-target
标签:#CVE-2025
更新了:CVE-2025
描述:Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers PHP webshells across large target sets.
URL:https://github.com/ill-deed/CVE-2025-34085-Multi-target
标签:#CVE-2025
GitHub
GitHub - ill-deed/CVE-2025-34085-Multi-target: Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress…
Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers PHP webshells across large target sets. - ill-deed/CVE-2025-3...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0
URL:https://github.com/BridgerAlderson/CVE-2025-27591-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0
URL:https://github.com/BridgerAlderson/CVE-2025-27591-PoC
标签:#CVE-2025
GitHub
GitHub - BridgerAlderson/CVE-2025-27591-PoC: CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service…
CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0 - BridgerAlderson/CVE-2025-27591-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-22457
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-22457
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-22457
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-22457
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-22457: CVE-2025-22457
CVE-2025-22457. Contribute to B1ack4sh/Blackash-CVE-2025-22457 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This PoC for CVE-2025-48799 demonstrates an elevation of privilege vulnerability in Windows Update service, affecting Windows 10 and 11. 🐱💻🔒
URL:https://github.com/harshgupptaa/Path-Transversal-CVE-2025-31125-
标签:#CVE-2025
更新了:CVE-2025
描述:This PoC for CVE-2025-48799 demonstrates an elevation of privilege vulnerability in Windows Update service, affecting Windows 10 and 11. 🐱💻🔒
URL:https://github.com/harshgupptaa/Path-Transversal-CVE-2025-31125-
标签:#CVE-2025
GitHub
GitHub - harshgupptaa/Path-Transversal-CVE-2025-31125-: Vite is a frontend tooling framework for javascript. Vite exposes content…
Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Wazuh 8.4 CVE-2025-24016
URL:https://github.com/guinea-offensive-security/Wazuh-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:Wazuh 8.4 CVE-2025-24016
URL:https://github.com/guinea-offensive-security/Wazuh-RCE
标签:#CVE-2025
GitHub
GitHub - guinea-offensive-security/Wazuh-RCE: Wazuh 8.4 CVE-2025-24016
Wazuh 8.4 CVE-2025-24016. Contribute to guinea-offensive-security/Wazuh-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:管理用户自建的各类软件工具(出发点是管理渗透测试类工具,但可以推广到各类软件工具和在线工具),并对其使用体验进行优化。本工具集主要对命令行程序进行了大量优化,对工具检索、环境配置、工具自定义、扫描结果管理、进程管理方面的用户体验也进行了大量探索。
URL:https://github.com/laferce/cybertoolsuite
标签:#渗透测试
更新了:渗透测试
描述:管理用户自建的各类软件工具(出发点是管理渗透测试类工具,但可以推广到各类软件工具和在线工具),并对其使用体验进行优化。本工具集主要对命令行程序进行了大量优化,对工具检索、环境配置、工具自定义、扫描结果管理、进程管理方面的用户体验也进行了大量探索。
URL:https://github.com/laferce/cybertoolsuite
标签:#渗透测试
GitHub
GitHub - laferce/cybertoolsuite: 管理用户自建的各类软件工具(出发点是管理渗透测试类工具,但可以推广到各类软件工具和在线工具),并对其使用体验进行优化。本工具集主要对命令行程序进行了大量优化,对工具检索、环境配置、工具自…
管理用户自建的各类软件工具(出发点是管理渗透测试类工具,但可以推广到各类软件工具和在线工具),并对其使用体验进行优化。本工具集主要对命令行程序进行了大量优化,对工具检索、环境配置、工具自定义、扫描结果管理、进程管理方面的用户体验也进行了大量探索。 - laferce/cybertoolsuite
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This PoC for CVE-2025-48799 demonstrates an elevation of privilege vulnerability in Windows Update service, affecting Windows 10 and 11. 🐱💻🔒
URL:https://github.com/SystemVll/CVE-2025-48827
标签:#CVE-2025
更新了:CVE-2025
描述:This PoC for CVE-2025-48799 demonstrates an elevation of privilege vulnerability in Windows Update service, affecting Windows 10 and 11. 🐱💻🔒
URL:https://github.com/SystemVll/CVE-2025-48827
标签:#CVE-2025
GitHub
GitHub - SystemVll/CVE-2025-48827: This repository contains a proof-of-concept exploit for CVE-2025-48827, a critical authentication…
This repository contains a proof-of-concept exploit for CVE-2025-48827, a critical authentication bypass vulnerability affecting vBulletin 5.0.0–5.7.5 and 6.0.0–6.0.3 when running on PHP 8.1 or lat...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Explore the CVE-2025-25257 exploit for FortiWeb. This repo includes a full exploit and a proof of concept for file read/write. 🐱💻🔒
URL:https://github.com/mtjanus106/CVE-2025-25257
标签:#CVE-2025
更新了:CVE-2025
描述:Explore the CVE-2025-25257 exploit for FortiWeb. This repo includes a full exploit and a proof of concept for file read/write. 🐱💻🔒
URL:https://github.com/mtjanus106/CVE-2025-25257
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:代码审计
描述:NoAuth 是一款用于动态生成可能绕过 Java 鉴权的 payload 并进行 fuzz 测试的工具,主要用于在代码审计和绕鉴权场景中节省时间
URL:https://github.com/steveopen1/NoAuth_V2
标签:#代码审计
更新了:代码审计
描述:NoAuth 是一款用于动态生成可能绕过 Java 鉴权的 payload 并进行 fuzz 测试的工具,主要用于在代码审计和绕鉴权场景中节省时间
URL:https://github.com/steveopen1/NoAuth_V2
标签:#代码审计
GitHub
GitHub - steveopen1/NoAuth_V2: NoAuth 是一款用于动态生成可能绕过 Java 鉴权的 payload 并进行 fuzz 测试的工具,主要用于在代码审计和绕鉴权场景中节省时间
NoAuth 是一款用于动态生成可能绕过 Java 鉴权的 payload 并进行 fuzz 测试的工具,主要用于在代码审计和绕鉴权场景中节省时间 - steveopen1/NoAuth_V2
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29927 PoC | Auth Bypass Exploit | Python Tool using httpx | Middleware Vulnerability | Ethical Hacking Toolkit
URL:https://github.com/mickhacking/thank-u-next
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29927 PoC | Auth Bypass Exploit | Python Tool using httpx | Middleware Vulnerability | Ethical Hacking Toolkit
URL:https://github.com/mickhacking/thank-u-next
标签:#CVE-2025
GitHub
GitHub - mickhacking/Thank-u-Next: CVE-2025-29927 PoC | Auth Bypass Exploit | Python Tool using httpx | Middleware Vulnerability…
CVE-2025-29927 PoC | Auth Bypass Exploit | Python Tool using httpx | Middleware Vulnerability | Ethical Hacking Toolkit - mickhacking/Thank-u-Next
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29927 PoC | Auth Bypass Exploit | Python Tool using httpx | Middleware Vulnerability | Ethical Hacking Toolkit
URL:https://github.com/mickhacking/Thank-u-Next
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29927 PoC | Auth Bypass Exploit | Python Tool using httpx | Middleware Vulnerability | Ethical Hacking Toolkit
URL:https://github.com/mickhacking/Thank-u-Next
标签:#CVE-2025
GitHub
GitHub - mickhacking/Thank-u-Next: CVE-2025-29927 PoC | Auth Bypass Exploit | Python Tool using httpx | Middleware Vulnerability…
CVE-2025-29927 PoC | Auth Bypass Exploit | Python Tool using httpx | Middleware Vulnerability | Ethical Hacking Toolkit - mickhacking/Thank-u-Next
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Educational Docker lab to simulate privilege escalation via CVE-2025-32463
URL:https://github.com/dbarquero/cve-2025-32463-lab
标签:#CVE-2025
更新了:CVE-2025
描述:Educational Docker lab to simulate privilege escalation via CVE-2025-32463
URL:https://github.com/dbarquero/cve-2025-32463-lab
标签:#CVE-2025
GitHub
GitHub - dbarquero/cve-2025-32463-lab: Educational Docker lab to simulate privilege escalation via CVE-2025-32463
Educational Docker lab to simulate privilege escalation via CVE-2025-32463 - dbarquero/cve-2025-32463-lab
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-5777 (CitrixBleed 2) - [Citrix NetScaler ADC] [Citrix Gateway]
URL:https://github.com/SleepNotF0und/CVE-2025-5777
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-5777 (CitrixBleed 2) - [Citrix NetScaler ADC] [Citrix Gateway]
URL:https://github.com/SleepNotF0und/CVE-2025-5777
标签:#CVE-2025
GitHub
GitHub - SleepNotF0und/CVE-2025-5777: CVE-2025-5777 (CitrixBleed 2) - [Citrix NetScaler ADC] [Citrix Gateway]
CVE-2025-5777 (CitrixBleed 2) - [Citrix NetScaler ADC] [Citrix Gateway] - SleepNotF0und/CVE-2025-5777
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-27591
URL:https://github.com/DarksBlackSk/CVE-2025-27591-Proof-Of-Concept
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-27591
URL:https://github.com/DarksBlackSk/CVE-2025-27591-Proof-Of-Concept
标签:#CVE-2025
GitHub
GitHub - DarksBlackSk/CVE-2025-27591: CVE-2025-27591
CVE-2025-27591. Contribute to DarksBlackSk/CVE-2025-27591 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-27591 is a known privilege escalation vulnerability in the Below service (version < v0.9.0)
URL:https://github.com/dollarboysushil/Linux-Privilege-Escalation-CVE-2025-27591
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-27591 is a known privilege escalation vulnerability in the Below service (version < v0.9.0)
URL:https://github.com/dollarboysushil/Linux-Privilege-Escalation-CVE-2025-27591
标签:#CVE-2025
GitHub
GitHub - dollarboysushil/Linux-Privilege-Escalation-CVE-2025-27591: CVE-2025-27591 is a known privilege escalation vulnerability…
CVE-2025-27591 is a known privilege escalation vulnerability in the Below service (version < v0.9.0) - dollarboysushil/Linux-Privilege-Escalation-CVE-2025-27591