GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53770
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53770
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Ashwesker-CVE-2025-53770: CVE-2025-53770
CVE-2025-53770. Contribute to Ashwesker/Ashwesker-CVE-2025-53770 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypassav
描述:BypassAV 是一款小型免杀辅助工具,旨在帮助渗透人员应对主流杀软。
URL:https://github.com/littleleeks/BypassAv
标签:#bypassav
更新了:bypassav
描述:BypassAV 是一款小型免杀辅助工具,旨在帮助渗透人员应对主流杀软。
URL:https://github.com/littleleeks/BypassAv
标签:#bypassav
GitHub
GitHub - littleleeks/BypassAv: BypassAV 是一款小型免杀辅助工具,旨在帮助渗透人员应对主流杀软。
BypassAV 是一款小型免杀辅助工具,旨在帮助渗透人员应对主流杀软。. Contribute to littleleeks/BypassAv development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-48384 PoC
URL:https://github.com/RukshanaAlikhan/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-48384 PoC
URL:https://github.com/RukshanaAlikhan/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - RukshanaAlikhan/CVE-2025-53770: A critical zero-day vulnerability CVE‑2025‑53770 has been actively exploited in the wild…
A critical zero-day vulnerability CVE‑2025‑53770 has been actively exploited in the wild against on-premises Microsoft SharePoint Server. Dubbed "ToolShell," this exploit leverag...
GitHub监控消息提醒!!!
更新了:代码审计
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/huaimeng666/URLFinder
标签:#代码审计
更新了:代码审计
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/huaimeng666/URLFinder
标签:#代码审计
GitHub
GitHub - huaimeng666/URLFinder-H: URLFinder-H 优化版是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、AP…
URLFinder-H 优化版是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。 - huaimeng666/URLFinder-H
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This PowerShell script detects indicators of compromise for CVE-2025-53770 — a critical RCE vulnerability in Microsoft SharePoint. Created by @n1chr0x and @BlackRazer67
URL:https://github.com/n1chr0x/Zeropoint
标签:#CVE-2025
更新了:CVE-2025
描述:This PowerShell script detects indicators of compromise for CVE-2025-53770 — a critical RCE vulnerability in Microsoft SharePoint. Created by @n1chr0x and @BlackRazer67
URL:https://github.com/n1chr0x/Zeropoint
标签:#CVE-2025
GitHub
GitHub - n1chr0x/ZeroPoint: This PowerShell script detects indicators of compromise for CVE-2025-53770 — a critical RCE vulnerability…
This PowerShell script detects indicators of compromise for CVE-2025-53770 — a critical RCE vulnerability in Microsoft SharePoint. Created by @n1chr0x and @BlackRazer67 - n1chr0x/ZeroPoint
GitHub监控消息提醒!!!
更新了:渗透测试
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/huaimeng666/finger
标签:#渗透测试
更新了:渗透测试
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/huaimeng666/finger
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:护网
描述:市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
URL:https://github.com/161485936Bat/SpeedLiberator
标签:#护网
更新了:护网
描述:市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
URL:https://github.com/161485936Bat/SpeedLiberator
标签:#护网
GitHub
GitHub - Bat-HaibaraAI/SpeedLiberator: 市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课). Contribute to Bat-HaibaraAI/SpeedLiberator development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:护网
描述:市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
URL:https://github.com/Bat-HaibaraAI/SpeedLiberator
标签:#护网
更新了:护网
描述:市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
URL:https://github.com/Bat-HaibaraAI/SpeedLiberator
标签:#护网
GitHub
GitHub - Bat-HaibaraAI/SpeedLiberator: 市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课). Contribute to Bat-HaibaraAI/SpeedLiberator development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detects unauthenticated POST requests to ToolPane.aspx with a SignOut.aspx referer, observed in exploitation of CVE-2025-53770 against SharePoint
URL:https://github.com/aazamil/SharePoint-ToolShell-Detection
标签:#CVE-2025
更新了:CVE-2025
描述:Detects unauthenticated POST requests to ToolPane.aspx with a SignOut.aspx referer, observed in exploitation of CVE-2025-53770 against SharePoint
URL:https://github.com/aazamil/SharePoint-ToolShell-Detection
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A comprehensive security monitoring solution for SharePoint Server with specific protection against CVE-2025-53770 and other threats
URL:https://github.com/paolokappa/SharePointSecurityMonitor
标签:#CVE-2025
更新了:CVE-2025
描述:A comprehensive security monitoring solution for SharePoint Server with specific protection against CVE-2025-53770 and other threats
URL:https://github.com/paolokappa/SharePointSecurityMonitor
标签:#CVE-2025
GitHub
GitHub - paolokappa/SharePointSecurityMonitor: A comprehensive PowerShell-based SharePoint security monitoring solution with CVE…
A comprehensive PowerShell-based SharePoint security monitoring solution with CVE-2025-53770 protection, advanced DLL analysis, threat detection, and automated alerting capabilities. - paolokappa/S...
GitHub监控消息提醒!!!
更新了:RCE
描述:vulnerable app SQLi, XSS, RCE
URL:https://github.com/m-carneiro/owaspinho
标签:#RCE
更新了:RCE
描述:vulnerable app SQLi, XSS, RCE
URL:https://github.com/m-carneiro/owaspinho
标签:#RCE
GitHub
GitHub - m-carneiro/owaspinho: vulnerable app
vulnerable app. Contribute to m-carneiro/owaspinho development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Scanner for the SharePoint CVE-2025-53770 zero day vulnerability.
URL:https://github.com/hazcod/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:Scanner for the SharePoint CVE-2025-53770 zero day vulnerability.
URL:https://github.com/hazcod/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - hazcod/CVE-2025-53770: Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability.
Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability. - hazcod/CVE-2025-53770
GitHub监控消息提醒!!!
更新了:getshell
描述:This is a Compilation of ueditor exps like file upload 、xss 、ssrf 、getshell
URL:https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance
标签:#getshell
更新了:getshell
描述:This is a Compilation of ueditor exps like file upload 、xss 、ssrf 、getshell
URL:https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance
标签:#getshell
GitHub
GitHub - peiqiF4ck/WebFrameworkTools-5.5-enhance: 本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getsh…
本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getshell。批量自动化测试。例如:Thinkphp,Struts2,weblogic。出现的最新漏洞进行实时跟踪并且更新例如:log4jRCE,向日葵 禅道RCE 瑞友天翼应用虚拟化系统sql注入导致RCE大华智慧园区上传,金蝶云星空漏洞等等. ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-6019
URL:https://github.com/dreysanox/CVE-2025-6018_Poc
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-6019
URL:https://github.com/dreysanox/CVE-2025-6018_Poc
标签:#CVE-2025
GitHub
GitHub - dreysanox/CVE-2025-6018_Poc: Exploit for CVE-2025-6019
Exploit for CVE-2025-6019. Contribute to dreysanox/CVE-2025-6018_Poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:ToolShell scanner - CVE-2025-53770
URL:https://github.com/ZephrFish/CVE-2025-53770-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:ToolShell scanner - CVE-2025-53770
URL:https://github.com/ZephrFish/CVE-2025-53770-Scanner
标签:#CVE-2025
GitHub
GitHub - ZephrFish/CVE-2025-53770-Scanner: ToolShell scanner - CVE-2025-53770 and detection information
ToolShell scanner - CVE-2025-53770 and detection information - ZephrFish/CVE-2025-53770-Scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770
URL:https://github.com/grupooruss/CVE-2025-53770-Checker
标签:#CVE-2025
更新了:CVE-2025
描述:Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770
URL:https://github.com/grupooruss/CVE-2025-53770-Checker
标签:#CVE-2025
GitHub
GitHub - grupooruss/CVE-2025-53770-Checker: Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770
Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770 - grupooruss/CVE-2025-53770-Checker
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection
URL:https://github.com/00xCanelo/CVE-2025-27591-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection
URL:https://github.com/00xCanelo/CVE-2025-27591-PoC
标签:#CVE-2025
GitHub
GitHub - 00xCanelo/CVE-2025-27591: 🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below…
🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection - 00xCanelo/CVE-2025-27591
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25014
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-25014
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25014
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-25014
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Ashwesker-CVE-2025-25014: CVE-2025-25014
CVE-2025-25014. Contribute to Ashwesker/Ashwesker-CVE-2025-25014 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution.
URL:https://github.com/byteReaper77/CVE-2025-47917
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution.
URL:https://github.com/byteReaper77/CVE-2025-47917
标签:#CVE-2025
GitHub
GitHub - byteReaper77/CVE-2025-47917: PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution.
PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution. - byteReaper77/CVE-2025-47917