GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-47812
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-47812
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-47812
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-47812
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:Yscan 是一款集 Web 资产扫描、图形化 Nuclei POC 管理、漏洞验证与数据整理于一体的实战型安全工具,界面简洁,功能强大,助你快速识别互联网暴露面中的薄弱点与攻击面。
URL:https://github.com/ONLYYE/Yscan
标签:#漏洞扫描
更新了:漏洞扫描
描述:Yscan 是一款集 Web 资产扫描、图形化 Nuclei POC 管理、漏洞验证与数据整理于一体的实战型安全工具,界面简洁,功能强大,助你快速识别互联网暴露面中的薄弱点与攻击面。
URL:https://github.com/ONLYYE/Yscan
标签:#漏洞扫描
GitHub
GitHub - ONLYYE/Yscan: Yscan 是一款集 Web 资产扫描、图形化 Nuclei POC 管理、漏洞验证与数据整理于一体的实战型安全工具,界面简洁,功能强大,助你快速识别互联网暴露面中的薄弱点与攻击面。
Yscan 是一款集 Web 资产扫描、图形化 Nuclei POC 管理、漏洞验证与数据整理于一体的实战型安全工具,界面简洁,功能强大,助你快速识别互联网暴露面中的薄弱点与攻击面。 - ONLYYE/Yscan
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploiting the CVE-2025-25257 vulnerability in FortiWeb. This repository demonstrates secure pre-authenticated SQL injection.
URL:https://github.com/aitorfirm/CVE-2025-25257
标签:#CVE-2025
更新了:CVE-2025
描述:Exploiting the CVE-2025-25257 vulnerability in FortiWeb. This repository demonstrates secure pre-authenticated SQL injection.
URL:https://github.com/aitorfirm/CVE-2025-25257
标签:#CVE-2025
GitHub
GitHub - aitorfirm/CVE-2025-25257: Exploiting the CVE-2025-25257 vulnerability in FortiWeb. This repository demonstrates secure…
Exploiting the CVE-2025-25257 vulnerability in FortiWeb. This repository demonstrates secure pre-authenticated SQL injection. - aitorfirm/CVE-2025-25257
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Proof of Concept for CVE-2025-27591, a local privilege escalation in Below ≤ v0.8.1
URL:https://github.com/incommatose/CVE-2025-27591-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:A Proof of Concept for CVE-2025-27591, a local privilege escalation in Below ≤ v0.8.1
URL:https://github.com/incommatose/CVE-2025-27591-PoC
标签:#CVE-2025
GitHub
GitHub - incommatose/CVE-2025-27591-PoC: A Proof of Concept for CVE-2025-27591, a local privilege escalation in Below < v0.9.0
A Proof of Concept for CVE-2025-27591, a local privilege escalation in Below < v0.9.0 - incommatose/CVE-2025-27591-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-27210
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-27210
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-27210
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-27210
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-27210: CVE-2025-27210
CVE-2025-27210. Contribute to B1ack4sh/Blackash-CVE-2025-27210 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-27210
URL:https://github.com/Sam-2805/cve-analysis-2
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-27210
URL:https://github.com/Sam-2805/cve-analysis-2
标签:#CVE-2025
GitHub
GitHub - Sam-2805/cve-analysis-2: Real-world vulnerability analysis of five CVEs (2025) focusing on XSS, CSRF, SQL Injection, File…
Real-world vulnerability analysis of five CVEs (2025) focusing on XSS, CSRF, SQL Injection, File Upload flaws, and Authentication Bypass. Includes markdown reports and supporting presentation slide...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC Exploit for CVE-2025-7753 — Time-Based SQL Injection in Online Appointment Booking System 1.0 via the username parameter. Exploit written in C using libcurl.
URL:https://github.com/byteReaper77/CVE-2025-7753
标签:#CVE-2025
更新了:CVE-2025
描述:PoC Exploit for CVE-2025-7753 — Time-Based SQL Injection in Online Appointment Booking System 1.0 via the username parameter. Exploit written in C using libcurl.
URL:https://github.com/byteReaper77/CVE-2025-7753
标签:#CVE-2025
GitHub
GitHub - byteReaper77/CVE-2025-7753: PoC Exploit for CVE-2025-7753 — Time-Based SQL Injection in Online Appointment Booking System…
PoC Exploit for CVE-2025-7753 — Time-Based SQL Injection in Online Appointment Booking System 1.0 via the username parameter. Exploit written in C using libcurl. - byteReaper77/CVE-2025-7753
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Note driven hacking weaponized vscode project guide. 笔记驱动渗透测试——武器化 vscode 项目指南
URL:https://github.com/Esonhugh/note-driven-hacking-project
标签:#渗透测试
更新了:渗透测试
描述:Note driven hacking weaponized vscode project guide. 笔记驱动渗透测试——武器化 vscode 项目指南
URL:https://github.com/Esonhugh/note-driven-hacking-project
标签:#渗透测试
GitHub
GitHub - Esonhugh/note-driven-hacking-project: Note driven hacking weaponized vscode project guide. 笔记驱动渗透测试——武器化 vscode 项目指南
Note driven hacking weaponized vscode project guide. 笔记驱动渗透测试——武器化 vscode 项目指南 - Esonhugh/note-driven-hacking-project
GitHub监控消息提醒!!!
更新了:信息收集
描述:本项目是一个多线程高效的网站URL扫描与信息采集工具,支持递归爬取、敏感信息检测、URL收集、批量扫描等功能。适用于安全测试、信息收集、资产梳理等场景。
URL:https://github.com/white1434/WhiteURLScan
标签:#信息收集
更新了:信息收集
描述:本项目是一个多线程高效的网站URL扫描与信息采集工具,支持递归爬取、敏感信息检测、URL收集、批量扫描等功能。适用于安全测试、信息收集、资产梳理等场景。
URL:https://github.com/white1434/WhiteURLScan
标签:#信息收集
GitHub
GitHub - white1434/WhiteURLScan: WhiteURLScan 是一款功能强大且高效的网站 URL 扫描与信息采集工具,旨在帮助用户快速、安全地扫描和采集网站信息。它支持多线程并发扫描、递归爬取、自动拼接、敏感信息检测、外部…
WhiteURLScan 是一款功能强大且高效的网站 URL 扫描与信息采集工具,旨在帮助用户快速、安全地扫描和采集网站信息。它支持多线程并发扫描、递归爬取、自动拼接、敏感信息检测、外部 URL 收集等多种功能,广泛应用于安全测试、信息收集、资产梳理等领域。 - white1434/WhiteURLScan
GitHub监控消息提醒!!!
更新了:RCE
描述:Projeto de Segurança em Computação em Nuvem — WordPress vulnerável, app Node.js com RCE e container com Docker socket exposto. Testes de ataque e defesa com documentação técnica e executiva.
URL:https://github.com/nico-senac/UC14
标签:#RCE
更新了:RCE
描述:Projeto de Segurança em Computação em Nuvem — WordPress vulnerável, app Node.js com RCE e container com Docker socket exposto. Testes de ataque e defesa com documentação técnica e executiva.
URL:https://github.com/nico-senac/UC14
标签:#RCE
GitHub
GitHub - nico-senac/UC14: Projeto de Segurança em Computação em Nuvem — WordPress vulnerável, app Node.js com RCE e container com…
Projeto de Segurança em Computação em Nuvem — WordPress vulnerável, app Node.js com RCE e container com Docker socket exposto. Testes de ataque e defesa com documentação técnica e executiva. - nico...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-48384 PoC Script
URL:https://github.com/Anezatraa/CVE-2025-48384-POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-48384 PoC Script
URL:https://github.com/Anezatraa/CVE-2025-48384-POC
标签:#CVE-2025
GitHub
GitHub - Anezatraa/CVE-2025-48384-POC: CVE-2025-48384 PoC Script
CVE-2025-48384 PoC Script. Contribute to Anezatraa/CVE-2025-48384-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit para explotar la vulnerabilidad CVE-2025-32463
URL:https://github.com/Maalfer/Sudo-CVE-2021-3156
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit para explotar la vulnerabilidad CVE-2025-32463
URL:https://github.com/Maalfer/Sudo-CVE-2021-3156
标签:#CVE-2025
GitHub
GitHub - Maalfer/Sudo-CVE-2021-3156: Exploit para explotar la vulnerabilidad CVE-2025-32463
Exploit para explotar la vulnerabilidad CVE-2025-32463 - Maalfer/Sudo-CVE-2021-3156
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A tool that identifies writable web directories in Apache Tomcat via HTTP PUT method [CVE-2025-24813]
URL:https://github.com/x00byte/PutScanner
标签:#CVE-2025
更新了:CVE-2025
描述:A tool that identifies writable web directories in Apache Tomcat via HTTP PUT method [CVE-2025-24813]
URL:https://github.com/x00byte/PutScanner
标签:#CVE-2025
GitHub
GitHub - x00byte/PutScanner: A tool that identifies writable web directories in Apache Tomcat via HTTP PUT method [CVE-2025-24813]
A tool that identifies writable web directories in Apache Tomcat via HTTP PUT method [CVE-2025-24813] - x00byte/PutScanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE
URL:https://github.com/TheStingR/CVE-2025-25257
标签:#CVE-2025
更新了:CVE-2025
描述:Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE
URL:https://github.com/TheStingR/CVE-2025-25257
标签:#CVE-2025
GitHub
GitHub - TheStingR/CVE-2025-25257: Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE
Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE - TheStingR/CVE-2025-25257
GitHub监控消息提醒!!!
更新了:RCE
描述:Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE
URL:https://github.com/BlankVox/PayloadLab
标签:#RCE
更新了:RCE
描述:Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE
URL:https://github.com/BlankVox/PayloadLab
标签:#RCE
GitHub
GitHub - BlankVox/PayloadLab: PayloadLab — A hands-on collection of web exploitation payloads (XSS, SQLi, SSTI, RCE, LFI, etc.)…
PayloadLab — A hands-on collection of web exploitation payloads (XSS, SQLi, SSTI, RCE, LFI, etc.) with live demos and easy-to-follow docs for learning, testing, and experimenting in the world of w...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Burp Suite 分组历史记录插件 - 支持数据持久化的HTTP请求分组管理工具 这是一个功能强大的Burp Suite插件,允许用户将HTTP请求按分组进行组织和管理,支持数据持久化,重启后数据不丢失。适合渗透测试人员进行有序的测试数据管理。
URL:https://github.com/Aining777/GroupedHistoryPlugin
标签:#渗透测试
更新了:渗透测试
描述:Burp Suite 分组历史记录插件 - 支持数据持久化的HTTP请求分组管理工具 这是一个功能强大的Burp Suite插件,允许用户将HTTP请求按分组进行组织和管理,支持数据持久化,重启后数据不丢失。适合渗透测试人员进行有序的测试数据管理。
URL:https://github.com/Aining777/GroupedHistoryPlugin
标签:#渗透测试
GitHub
GitHub - Aining777/GroupedHistoryPlugin: Burp Suite 分组历史记录插件 - 支持数据持久化的HTTP请求分组管理工具 这是一个功能强大的Burp Suite插件,允许用户将HTTP请求按分组进行组织和管…
Burp Suite 分组历史记录插件 - 支持数据持久化的HTTP请求分组管理工具 这是一个功能强大的Burp Suite插件,允许用户将HTTP请求按分组进行组织和管理,支持数据持久化,重启后数据不丢失。适合渗透测试人员进行有序的测试数据管理。 - Aining777/GroupedHistoryPlugin
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-49113 RoundCube RCE
URL:https://github.com/00xCanelo/CVE-2025-49113
标签:#RCE
更新了:RCE
描述:CVE-2025-49113 RoundCube RCE
URL:https://github.com/00xCanelo/CVE-2025-49113
标签:#RCE
GitHub
GitHub - 00xCanelo/CVE-2025-49113: 💥 Python Exploit for CVE-2025-49113 | Roundcube Webmail RCE via PHP Object Injection
💥 Python Exploit for CVE-2025-49113 | Roundcube Webmail RCE via PHP Object Injection - 00xCanelo/CVE-2025-49113