GitHub监控消息提醒!!!
更新了:CVE-2025
描述:FortiWeb SQLi to RCE
URL:https://github.com/0xgh057r3c0n/CVE-2025-25257
标签:#CVE-2025
更新了:CVE-2025
描述:FortiWeb SQLi to RCE
URL:https://github.com/0xgh057r3c0n/CVE-2025-25257
标签:#CVE-2025
GitHub
GitHub - 0xgh057r3c0n/CVE-2025-25257: PoC for CVE-2025-25257, a critical unauthenticated SQL injection in FortiWeb. Exploits SQLi…
PoC for CVE-2025-25257, a critical unauthenticated SQL injection in FortiWeb. Exploits SQLi via the Authorization header to write a webshell and gain RCE. No login required. Fully automated. - 0xgh...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53833
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53833
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53833
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53833
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-53833: CVE-2025-53833
CVE-2025-53833. Contribute to B1ack4sh/Blackash-CVE-2025-53833 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-27591
URL:https://github.com/sanjay70023/AutoVAPT-AI-Based-Vulnerability-Scanner-Pentest-Tool
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-27591
URL:https://github.com/sanjay70023/AutoVAPT-AI-Based-Vulnerability-Scanner-Pentest-Tool
标签:#CVE-2025
GitHub
GitHub - sanjay70023/AutoVAPT-AI-Based-Vulnerability-Scanner-Pentest-Tool: AutoVAPT is an open-source GUI tool for automated Vulnerability…
AutoVAPT is an open-source GUI tool for automated Vulnerability Assessment and Penetration Testing. It integrates OWASP ZAP, CVE/CVSS enrichment, AI-based analysis, and custom recon tools—built for...
GitHub监控消息提醒!!!
更新了:漏洞挖掘
描述:漏洞赏金工具是一款专为安全研究人员和白帽子黑客设计的图形化渗透测试工具集。它集成了多个常用的安全测试工具,提供了直观的用户界面,让漏洞挖掘变得更加简单和高效。
URL:https://github.com/hengweijieke/drearm_hw
标签:#漏洞挖掘
更新了:漏洞挖掘
描述:漏洞赏金工具是一款专为安全研究人员和白帽子黑客设计的图形化渗透测试工具集。它集成了多个常用的安全测试工具,提供了直观的用户界面,让漏洞挖掘变得更加简单和高效。
URL:https://github.com/hengweijieke/drearm_hw
标签:#漏洞挖掘
GitHub
GitHub - hengweijieke/drearm_hw: ### 🎓 **信息安全学生 | Web、工具极简主义者 | 运维萌新成长中** **📌 关于我** 网络安全专业在读,热爱 **漏洞挖掘 & 防御实战**,喜欢用**轻量级工…
### 🎓 **信息安全学生 | Web、工具极简主义者 | 运维萌新成长中** **📌 关于我** 网络安全专业在读,热爱 **漏洞挖掘 & 防御实战**,喜欢用**轻量级工具**折腾各种小项目,在Linux服务器里摸爬滚打,目标是成为一名**懂开发的安全工程师**。 ### **🛠️ 技术栈 & 兴趣** 🔐 **安全方向** ▸ ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Working exploit for CVE-2025-23167 – HTTP request smuggling in vulnerable Node.js 20.x versions before 20.19.2
URL:https://github.com/abhisek3122/CVE-2025-23167
标签:#CVE-2025
更新了:CVE-2025
描述:Working exploit for CVE-2025-23167 – HTTP request smuggling in vulnerable Node.js 20.x versions before 20.19.2
URL:https://github.com/abhisek3122/CVE-2025-23167
标签:#CVE-2025
GitHub
GitHub - abhisek3122/CVE-2025-23167: Working exploit for CVE-2025-23167 – HTTP request smuggling in vulnerable Node.js 20.x versions…
Working exploit for CVE-2025-23167 – HTTP request smuggling in vulnerable Node.js 20.x versions before 20.19.2 - abhisek3122/CVE-2025-23167
GitHub监控消息提醒!!!
更新了:RCE
描述:Secure, open-source RCE platform with Docker isolation, JWT auth, rate limiting, and multi-language support.
URL:https://github.com/vikashkrdeveloper/SafeExec
标签:#RCE
更新了:RCE
描述:Secure, open-source RCE platform with Docker isolation, JWT auth, rate limiting, and multi-language support.
URL:https://github.com/vikashkrdeveloper/SafeExec
标签:#RCE
GitHub
GitHub - vikashkrdeveloper/SafeExec: Secure, open-source RCE platform with Docker isolation, JWT auth, rate limiting, and multi…
Secure, open-source RCE platform with Docker isolation, JWT auth, rate limiting, and multi-language support. - vikashkrdeveloper/SafeExec
GitHub监控消息提醒!!!
更新了:免杀
描述:工具推荐-免杀-二开一个漏洞扫描、目录扫描、端口扫描的工具
URL:https://github.com/Zer08Bytes/GhostRecon
标签:#免杀
更新了:免杀
描述:工具推荐-免杀-二开一个漏洞扫描、目录扫描、端口扫描的工具
URL:https://github.com/Zer08Bytes/GhostRecon
标签:#免杀
GitHub
GitHub - Zer08Bytes/GhostRecon: 工具推荐-免杀-二开一个漏洞扫描、目录扫描、端口扫描的工具
工具推荐-免杀-二开一个漏洞扫描、目录扫描、端口扫描的工具. Contribute to Zer08Bytes/GhostRecon development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:ThinVNC 1.0b1 - Authentication Bypass to RCE
URL:https://github.com/krill-x7/CVE-2022-25226
标签:#RCE
更新了:RCE
描述:ThinVNC 1.0b1 - Authentication Bypass to RCE
URL:https://github.com/krill-x7/CVE-2022-25226
标签:#RCE
GitHub
GitHub - krill-x7/CVE-2022-25226: ThinVNC 1.0b1 - Authentication Bypass to RCE
ThinVNC 1.0b1 - Authentication Bypass to RCE. Contribute to krill-x7/CVE-2022-25226 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/absholi7ly/CVE-2025-27210_NodeJS_Path_Traversal_Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/absholi7ly/CVE-2025-27210_NodeJS_Path_Traversal_Exploit
标签:#CVE-2025
GitHub
GitHub - absholi7ly/CVE-2025-27210_NodeJS_Path_Traversal_Exploit: (PoC) CVE-2025-27210, a precise Path Traversal vulnerability…
(PoC) CVE-2025-27210, a precise Path Traversal vulnerability affecting Node.js applications running on Microsoft Windows. This vulnerability leverages the specific way Windows handles reserved devi...
GitHub监控消息提醒!!!
更新了:信息收集
描述:在当今数据驱动的世界中,网页采集已经成为信息收集、商业监控、市场分析等多个行业的核心工具。然而,许多开发者在实践中都会遭遇同一个噩梦:**IP 被封、请求被阻、系统崩溃**。
URL:https://github.com/LunaNova88/pachong-fengsuo-yu-bengkui-weishenme-wangye-caiji-xuyao-geng-congming-de-celue
标签:#信息收集
更新了:信息收集
描述:在当今数据驱动的世界中,网页采集已经成为信息收集、商业监控、市场分析等多个行业的核心工具。然而,许多开发者在实践中都会遭遇同一个噩梦:**IP 被封、请求被阻、系统崩溃**。
URL:https://github.com/LunaNova88/pachong-fengsuo-yu-bengkui-weishenme-wangye-caiji-xuyao-geng-congming-de-celue
标签:#信息收集
GitHub监控消息提醒!!!
更新了:反序列化
描述:基于toml++的TOML文件反序列化便利设施
URL:https://github.com/Anglebase/toml_serde
标签:#反序列化
更新了:反序列化
描述:基于toml++的TOML文件反序列化便利设施
URL:https://github.com/Anglebase/toml_serde
标签:#反序列化
GitHub
GitHub - Anglebase/toml_serde: 基于toml++的TOML文件反序列化便利设施
基于toml++的TOML文件反序列化便利设施. Contribute to Anglebase/toml_serde development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32432
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-32432
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32432
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-32432
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Ashwesker-CVE-2025-32432: CVE-2025-32432
CVE-2025-32432. Contribute to Ashwesker/Ashwesker-CVE-2025-32432 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-5777
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-5777
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-5777
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-5777
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-5777: CVE-2025-5777
CVE-2025-5777. Contribute to B1ack4sh/Blackash-CVE-2025-5777 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Non-coding RNA sets Cis Enrichment Tool (NoRCE)
URL:https://github.com/guldenolgun/NoRCE
标签:#RCE
更新了:RCE
描述:Non-coding RNA sets Cis Enrichment Tool (NoRCE)
URL:https://github.com/guldenolgun/NoRCE
标签:#RCE
GitHub
GitHub - guldenolgun/NoRCE: Non-coding RNA sets Cis Enrichment Tool (NoRCE)
Non-coding RNA sets Cis Enrichment Tool (NoRCE). Contribute to guldenolgun/NoRCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-22870
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-22870
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-22870
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-22870
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Ashwesker-CVE-2025-22870: CVE-2025-22870
CVE-2025-22870. Contribute to Ashwesker/Ashwesker-CVE-2025-22870 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:GateSentinel 是一个现代化的 C2 (Command and Control) 框架,专为安全研究和渗透测试设计。该项目采用 Go 语言开发服务端,C 语言开发客户端,提供了强大的远程控制和管理功能。
URL:https://github.com/kyxiaxiang/GateSentinel
标签:#渗透测试
更新了:渗透测试
描述:GateSentinel 是一个现代化的 C2 (Command and Control) 框架,专为安全研究和渗透测试设计。该项目采用 Go 语言开发服务端,C 语言开发客户端,提供了强大的远程控制和管理功能。
URL:https://github.com/kyxiaxiang/GateSentinel
标签:#渗透测试
GitHub
GitHub - kyxiaxiang/GateSentinel: GateSentinel 是一个现代化的 C2 (Command and Control) 框架,专为安全研究和渗透测试设计。该项目采用 Go 语言开发服务端,C 语言开发客户端,提供了强大的远程控制和管理功能。
GateSentinel 是一个现代化的 C2 (Command and Control) 框架,专为安全研究和渗透测试设计。该项目采用 Go 语言开发服务端,C 语言开发客户端,提供了强大的远程控制和管理功能。 - kyxiaxiang/GateSentinel
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure for CVE-2025-50716 to CVE-2025-50721
URL:https://github.com/MooseLoveti/realestate-php-cve-report
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure for CVE-2025-50716 to CVE-2025-50721
URL:https://github.com/MooseLoveti/realestate-php-cve-report
标签:#CVE-2025
GitHub
GitHub - MooseLoveti/RealEstate-PHP-CVE-Report: Disclosure for CVE-2025-50716 to CVE-2025-50721
Disclosure for CVE-2025-50716 to CVE-2025-50721. Contribute to MooseLoveti/RealEstate-PHP-CVE-Report development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is the exploit for the CVE-2025-32463
URL:https://github.com/Rajneeshkarya/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:This is the exploit for the CVE-2025-32463
URL:https://github.com/Rajneeshkarya/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - Rajneeshkarya/CVE-2025-32463: This is the exploit for the CVE-2025-32463
This is the exploit for the CVE-2025-32463. Contribute to Rajneeshkarya/CVE-2025-32463 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:getshell
描述:This is a Compilation of ueditor exps like file upload 、xss 、ssrf 、getshell
URL:https://github.com/xueba001/ueditor_exp
标签:#getshell
更新了:getshell
描述:This is a Compilation of ueditor exps like file upload 、xss 、ssrf 、getshell
URL:https://github.com/xueba001/ueditor_exp
标签:#getshell
GitHub
GitHub - xueba001/ueditor_exp: This is a Compilation of ueditor exps like file upload 、xss 、ssrf 、getshell
This is a Compilation of ueditor exps like file upload 、xss 、ssrf 、getshell - xueba001/ueditor_exp