GitHub监控消息提醒!!!
更新了:命令注入
描述:JNDIBypass 是一个用于测试 Java JNDI 注入漏洞的工具,可用于安全研究和渗透测试。该工具提供了一个 LDAP 服务器实现,可以用来模拟 JNDI 注入攻击,执行命令或注入内存马。
URL:https://github.com/fb0sh/echout
标签:#命令注入
更新了:命令注入
描述:JNDIBypass 是一个用于测试 Java JNDI 注入漏洞的工具,可用于安全研究和渗透测试。该工具提供了一个 LDAP 服务器实现,可以用来模拟 JNDI 注入攻击,执行命令或注入内存马。
URL:https://github.com/fb0sh/echout
标签:#命令注入
GitHub
GitHub - fb0sh/echout: 一个极致简约却功能强大的 HTTP 回显服务,仅凭数十行代码,轻松收集各类命令注入与出网测试数据,助你洞察每一次连接。____________________________________________A…
一个极致简约却功能强大的 HTTP 回显服务,仅凭数十行代码,轻松收集各类命令注入与出网测试数据,助你洞察每一次连接。____________________________________________A sleek, minimalist HTTP echo server that effortlessly captures command injection and outb...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30065
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-30065
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30065
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-30065
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-30065: CVE-2025-30065
CVE-2025-30065. Contribute to B1ack4sh/Blackash-CVE-2025-30065 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-47812
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-47812
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-47812
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-47812
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:Yscan 是一款集 Web 资产扫描、图形化 Nuclei POC 管理、漏洞验证与数据整理于一体的实战型安全工具,界面简洁,功能强大,助你快速识别互联网暴露面中的薄弱点与攻击面。
URL:https://github.com/ONLYYE/Yscan
标签:#漏洞扫描
更新了:漏洞扫描
描述:Yscan 是一款集 Web 资产扫描、图形化 Nuclei POC 管理、漏洞验证与数据整理于一体的实战型安全工具,界面简洁,功能强大,助你快速识别互联网暴露面中的薄弱点与攻击面。
URL:https://github.com/ONLYYE/Yscan
标签:#漏洞扫描
GitHub
GitHub - ONLYYE/Yscan: Yscan 是一款集 Web 资产扫描、图形化 Nuclei POC 管理、漏洞验证与数据整理于一体的实战型安全工具,界面简洁,功能强大,助你快速识别互联网暴露面中的薄弱点与攻击面。
Yscan 是一款集 Web 资产扫描、图形化 Nuclei POC 管理、漏洞验证与数据整理于一体的实战型安全工具,界面简洁,功能强大,助你快速识别互联网暴露面中的薄弱点与攻击面。 - ONLYYE/Yscan
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploiting the CVE-2025-25257 vulnerability in FortiWeb. This repository demonstrates secure pre-authenticated SQL injection.
URL:https://github.com/aitorfirm/CVE-2025-25257
标签:#CVE-2025
更新了:CVE-2025
描述:Exploiting the CVE-2025-25257 vulnerability in FortiWeb. This repository demonstrates secure pre-authenticated SQL injection.
URL:https://github.com/aitorfirm/CVE-2025-25257
标签:#CVE-2025
GitHub
GitHub - aitorfirm/CVE-2025-25257: Exploiting the CVE-2025-25257 vulnerability in FortiWeb. This repository demonstrates secure…
Exploiting the CVE-2025-25257 vulnerability in FortiWeb. This repository demonstrates secure pre-authenticated SQL injection. - aitorfirm/CVE-2025-25257
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Proof of Concept for CVE-2025-27591, a local privilege escalation in Below ≤ v0.8.1
URL:https://github.com/incommatose/CVE-2025-27591-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:A Proof of Concept for CVE-2025-27591, a local privilege escalation in Below ≤ v0.8.1
URL:https://github.com/incommatose/CVE-2025-27591-PoC
标签:#CVE-2025
GitHub
GitHub - incommatose/CVE-2025-27591-PoC: A Proof of Concept for CVE-2025-27591, a local privilege escalation in Below < v0.9.0
A Proof of Concept for CVE-2025-27591, a local privilege escalation in Below < v0.9.0 - incommatose/CVE-2025-27591-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-27210
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-27210
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-27210
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-27210
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-27210: CVE-2025-27210
CVE-2025-27210. Contribute to B1ack4sh/Blackash-CVE-2025-27210 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-27210
URL:https://github.com/Sam-2805/cve-analysis-2
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-27210
URL:https://github.com/Sam-2805/cve-analysis-2
标签:#CVE-2025
GitHub
GitHub - Sam-2805/cve-analysis-2: Real-world vulnerability analysis of five CVEs (2025) focusing on XSS, CSRF, SQL Injection, File…
Real-world vulnerability analysis of five CVEs (2025) focusing on XSS, CSRF, SQL Injection, File Upload flaws, and Authentication Bypass. Includes markdown reports and supporting presentation slide...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC Exploit for CVE-2025-7753 — Time-Based SQL Injection in Online Appointment Booking System 1.0 via the username parameter. Exploit written in C using libcurl.
URL:https://github.com/byteReaper77/CVE-2025-7753
标签:#CVE-2025
更新了:CVE-2025
描述:PoC Exploit for CVE-2025-7753 — Time-Based SQL Injection in Online Appointment Booking System 1.0 via the username parameter. Exploit written in C using libcurl.
URL:https://github.com/byteReaper77/CVE-2025-7753
标签:#CVE-2025
GitHub
GitHub - byteReaper77/CVE-2025-7753: PoC Exploit for CVE-2025-7753 — Time-Based SQL Injection in Online Appointment Booking System…
PoC Exploit for CVE-2025-7753 — Time-Based SQL Injection in Online Appointment Booking System 1.0 via the username parameter. Exploit written in C using libcurl. - byteReaper77/CVE-2025-7753
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Note driven hacking weaponized vscode project guide. 笔记驱动渗透测试——武器化 vscode 项目指南
URL:https://github.com/Esonhugh/note-driven-hacking-project
标签:#渗透测试
更新了:渗透测试
描述:Note driven hacking weaponized vscode project guide. 笔记驱动渗透测试——武器化 vscode 项目指南
URL:https://github.com/Esonhugh/note-driven-hacking-project
标签:#渗透测试
GitHub
GitHub - Esonhugh/note-driven-hacking-project: Note driven hacking weaponized vscode project guide. 笔记驱动渗透测试——武器化 vscode 项目指南
Note driven hacking weaponized vscode project guide. 笔记驱动渗透测试——武器化 vscode 项目指南 - Esonhugh/note-driven-hacking-project
GitHub监控消息提醒!!!
更新了:信息收集
描述:本项目是一个多线程高效的网站URL扫描与信息采集工具,支持递归爬取、敏感信息检测、URL收集、批量扫描等功能。适用于安全测试、信息收集、资产梳理等场景。
URL:https://github.com/white1434/WhiteURLScan
标签:#信息收集
更新了:信息收集
描述:本项目是一个多线程高效的网站URL扫描与信息采集工具,支持递归爬取、敏感信息检测、URL收集、批量扫描等功能。适用于安全测试、信息收集、资产梳理等场景。
URL:https://github.com/white1434/WhiteURLScan
标签:#信息收集
GitHub
GitHub - white1434/WhiteURLScan: WhiteURLScan 是一款功能强大且高效的网站 URL 扫描与信息采集工具,旨在帮助用户快速、安全地扫描和采集网站信息。它支持多线程并发扫描、递归爬取、自动拼接、敏感信息检测、外部…
WhiteURLScan 是一款功能强大且高效的网站 URL 扫描与信息采集工具,旨在帮助用户快速、安全地扫描和采集网站信息。它支持多线程并发扫描、递归爬取、自动拼接、敏感信息检测、外部 URL 收集等多种功能,广泛应用于安全测试、信息收集、资产梳理等领域。 - white1434/WhiteURLScan
GitHub监控消息提醒!!!
更新了:RCE
描述:Projeto de Segurança em Computação em Nuvem — WordPress vulnerável, app Node.js com RCE e container com Docker socket exposto. Testes de ataque e defesa com documentação técnica e executiva.
URL:https://github.com/nico-senac/UC14
标签:#RCE
更新了:RCE
描述:Projeto de Segurança em Computação em Nuvem — WordPress vulnerável, app Node.js com RCE e container com Docker socket exposto. Testes de ataque e defesa com documentação técnica e executiva.
URL:https://github.com/nico-senac/UC14
标签:#RCE
GitHub
GitHub - nico-senac/UC14: Projeto de Segurança em Computação em Nuvem — WordPress vulnerável, app Node.js com RCE e container com…
Projeto de Segurança em Computação em Nuvem — WordPress vulnerável, app Node.js com RCE e container com Docker socket exposto. Testes de ataque e defesa com documentação técnica e executiva. - nico...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-48384 PoC Script
URL:https://github.com/Anezatraa/CVE-2025-48384-POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-48384 PoC Script
URL:https://github.com/Anezatraa/CVE-2025-48384-POC
标签:#CVE-2025
GitHub
GitHub - Anezatraa/CVE-2025-48384-POC: CVE-2025-48384 PoC Script
CVE-2025-48384 PoC Script. Contribute to Anezatraa/CVE-2025-48384-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit para explotar la vulnerabilidad CVE-2025-32463
URL:https://github.com/Maalfer/Sudo-CVE-2021-3156
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit para explotar la vulnerabilidad CVE-2025-32463
URL:https://github.com/Maalfer/Sudo-CVE-2021-3156
标签:#CVE-2025
GitHub
GitHub - Maalfer/Sudo-CVE-2021-3156: Exploit para explotar la vulnerabilidad CVE-2025-32463
Exploit para explotar la vulnerabilidad CVE-2025-32463 - Maalfer/Sudo-CVE-2021-3156
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A tool that identifies writable web directories in Apache Tomcat via HTTP PUT method [CVE-2025-24813]
URL:https://github.com/x00byte/PutScanner
标签:#CVE-2025
更新了:CVE-2025
描述:A tool that identifies writable web directories in Apache Tomcat via HTTP PUT method [CVE-2025-24813]
URL:https://github.com/x00byte/PutScanner
标签:#CVE-2025
GitHub
GitHub - x00byte/PutScanner: A tool that identifies writable web directories in Apache Tomcat via HTTP PUT method [CVE-2025-24813]
A tool that identifies writable web directories in Apache Tomcat via HTTP PUT method [CVE-2025-24813] - x00byte/PutScanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE
URL:https://github.com/TheStingR/CVE-2025-25257
标签:#CVE-2025
更新了:CVE-2025
描述:Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE
URL:https://github.com/TheStingR/CVE-2025-25257
标签:#CVE-2025
GitHub
GitHub - TheStingR/CVE-2025-25257: Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE
Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE - TheStingR/CVE-2025-25257
GitHub监控消息提醒!!!
更新了:RCE
描述:Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE
URL:https://github.com/BlankVox/PayloadLab
标签:#RCE
更新了:RCE
描述:Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE
URL:https://github.com/BlankVox/PayloadLab
标签:#RCE
GitHub
GitHub - BlankVox/PayloadLab: PayloadLab — A hands-on collection of web exploitation payloads (XSS, SQLi, SSTI, RCE, LFI, etc.)…
PayloadLab — A hands-on collection of web exploitation payloads (XSS, SQLi, SSTI, RCE, LFI, etc.) with live demos and easy-to-follow docs for learning, testing, and experimenting in the world of w...