GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This PowerShell script detects indicators of compromise for CVE-2025-53770 — a critical RCE vulnerability in Microsoft SharePoint. Created by @n1chr0x and @BlackRazer67
URL:https://github.com/n1chr0x/Zeropoint
标签:#CVE-2025
更新了:CVE-2025
描述:This PowerShell script detects indicators of compromise for CVE-2025-53770 — a critical RCE vulnerability in Microsoft SharePoint. Created by @n1chr0x and @BlackRazer67
URL:https://github.com/n1chr0x/Zeropoint
标签:#CVE-2025
GitHub
GitHub - n1chr0x/ZeroPoint: This PowerShell script detects indicators of compromise for CVE-2025-53770 — a critical RCE vulnerability…
This PowerShell script detects indicators of compromise for CVE-2025-53770 — a critical RCE vulnerability in Microsoft SharePoint. Created by @n1chr0x and @BlackRazer67 - n1chr0x/ZeroPoint
GitHub监控消息提醒!!!
更新了:渗透测试
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/huaimeng666/finger
标签:#渗透测试
更新了:渗透测试
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/huaimeng666/finger
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:护网
描述:市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
URL:https://github.com/161485936Bat/SpeedLiberator
标签:#护网
更新了:护网
描述:市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
URL:https://github.com/161485936Bat/SpeedLiberator
标签:#护网
GitHub
GitHub - Bat-HaibaraAI/SpeedLiberator: 市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课). Contribute to Bat-HaibaraAI/SpeedLiberator development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:护网
描述:市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
URL:https://github.com/Bat-HaibaraAI/SpeedLiberator
标签:#护网
更新了:护网
描述:市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
URL:https://github.com/Bat-HaibaraAI/SpeedLiberator
标签:#护网
GitHub
GitHub - Bat-HaibaraAI/SpeedLiberator: 市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课). Contribute to Bat-HaibaraAI/SpeedLiberator development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detects unauthenticated POST requests to ToolPane.aspx with a SignOut.aspx referer, observed in exploitation of CVE-2025-53770 against SharePoint
URL:https://github.com/aazamil/SharePoint-ToolShell-Detection
标签:#CVE-2025
更新了:CVE-2025
描述:Detects unauthenticated POST requests to ToolPane.aspx with a SignOut.aspx referer, observed in exploitation of CVE-2025-53770 against SharePoint
URL:https://github.com/aazamil/SharePoint-ToolShell-Detection
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A comprehensive security monitoring solution for SharePoint Server with specific protection against CVE-2025-53770 and other threats
URL:https://github.com/paolokappa/SharePointSecurityMonitor
标签:#CVE-2025
更新了:CVE-2025
描述:A comprehensive security monitoring solution for SharePoint Server with specific protection against CVE-2025-53770 and other threats
URL:https://github.com/paolokappa/SharePointSecurityMonitor
标签:#CVE-2025
GitHub
GitHub - paolokappa/SharePointSecurityMonitor: A comprehensive PowerShell-based SharePoint security monitoring solution with CVE…
A comprehensive PowerShell-based SharePoint security monitoring solution with CVE-2025-53770 protection, advanced DLL analysis, threat detection, and automated alerting capabilities. - paolokappa/S...
GitHub监控消息提醒!!!
更新了:RCE
描述:vulnerable app SQLi, XSS, RCE
URL:https://github.com/m-carneiro/owaspinho
标签:#RCE
更新了:RCE
描述:vulnerable app SQLi, XSS, RCE
URL:https://github.com/m-carneiro/owaspinho
标签:#RCE
GitHub
GitHub - m-carneiro/owaspinho: vulnerable app
vulnerable app. Contribute to m-carneiro/owaspinho development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Scanner for the SharePoint CVE-2025-53770 zero day vulnerability.
URL:https://github.com/hazcod/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:Scanner for the SharePoint CVE-2025-53770 zero day vulnerability.
URL:https://github.com/hazcod/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - hazcod/CVE-2025-53770: Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability.
Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability. - hazcod/CVE-2025-53770
GitHub监控消息提醒!!!
更新了:getshell
描述:This is a Compilation of ueditor exps like file upload 、xss 、ssrf 、getshell
URL:https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance
标签:#getshell
更新了:getshell
描述:This is a Compilation of ueditor exps like file upload 、xss 、ssrf 、getshell
URL:https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance
标签:#getshell
GitHub
GitHub - peiqiF4ck/WebFrameworkTools-5.5-enhance: 本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getsh…
本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getshell。批量自动化测试。例如:Thinkphp,Struts2,weblogic。出现的最新漏洞进行实时跟踪并且更新例如:log4jRCE,向日葵 禅道RCE 瑞友天翼应用虚拟化系统sql注入导致RCE大华智慧园区上传,金蝶云星空漏洞等等. ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-6019
URL:https://github.com/dreysanox/CVE-2025-6018_Poc
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-6019
URL:https://github.com/dreysanox/CVE-2025-6018_Poc
标签:#CVE-2025
GitHub
GitHub - dreysanox/CVE-2025-6018_Poc: Exploit for CVE-2025-6019
Exploit for CVE-2025-6019. Contribute to dreysanox/CVE-2025-6018_Poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:ToolShell scanner - CVE-2025-53770
URL:https://github.com/ZephrFish/CVE-2025-53770-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:ToolShell scanner - CVE-2025-53770
URL:https://github.com/ZephrFish/CVE-2025-53770-Scanner
标签:#CVE-2025
GitHub
GitHub - ZephrFish/CVE-2025-53770-Scanner: ToolShell scanner - CVE-2025-53770 and detection information
ToolShell scanner - CVE-2025-53770 and detection information - ZephrFish/CVE-2025-53770-Scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770
URL:https://github.com/grupooruss/CVE-2025-53770-Checker
标签:#CVE-2025
更新了:CVE-2025
描述:Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770
URL:https://github.com/grupooruss/CVE-2025-53770-Checker
标签:#CVE-2025
GitHub
GitHub - grupooruss/CVE-2025-53770-Checker: Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770
Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770 - grupooruss/CVE-2025-53770-Checker
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection
URL:https://github.com/00xCanelo/CVE-2025-27591-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection
URL:https://github.com/00xCanelo/CVE-2025-27591-PoC
标签:#CVE-2025
GitHub
GitHub - 00xCanelo/CVE-2025-27591: 🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below…
🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection - 00xCanelo/CVE-2025-27591
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25014
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-25014
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25014
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-25014
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Ashwesker-CVE-2025-25014: CVE-2025-25014
CVE-2025-25014. Contribute to Ashwesker/Ashwesker-CVE-2025-25014 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution.
URL:https://github.com/byteReaper77/CVE-2025-47917
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution.
URL:https://github.com/byteReaper77/CVE-2025-47917
标签:#CVE-2025
GitHub
GitHub - byteReaper77/CVE-2025-47917: PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution.
PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution. - byteReaper77/CVE-2025-47917
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32463
URL:https://github.com/ChetanKomal/sudo_exploit
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32463
URL:https://github.com/ChetanKomal/sudo_exploit
标签:#CVE-2025
GitHub
GitHub - ChetanKomal/sudo_exploit: CVE-2025-32463
CVE-2025-32463. Contribute to ChetanKomal/sudo_exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:GitLabRCECVE-2021-22205Tool
URL:https://github.com/whiex/GitLabRCECVE-2021-22205Tool
标签:#RCE
更新了:RCE
描述:GitLabRCECVE-2021-22205Tool
URL:https://github.com/whiex/GitLabRCECVE-2021-22205Tool
标签:#RCE
GitHub
GitHub - whiex/GitLabRCECVE-2021-22205Tool: GitLabRCECVE-2021-22205Tool
GitLabRCECVE-2021-22205Tool. Contribute to whiex/GitLabRCECVE-2021-22205Tool development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A critical zero-auth RCE vulnerability in SharePoint (CVE-2025-53770), now exploited in the wild, building directly on the spoofing flaw CVE-2025-49706.
URL:https://github.com/AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:A critical zero-auth RCE vulnerability in SharePoint (CVE-2025-53770), now exploited in the wild, building directly on the spoofing flaw CVE-2025-49706.
URL:https://github.com/AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE
标签:#CVE-2025
GitHub
GitHub - AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE: A critical zero-auth RCE vulnerability…
A critical zero-auth RCE vulnerability in SharePoint (CVE-2025-53770), now exploited in the wild, building directly on the spoofing flaw CVE-2025-49706. - AdityaBhatt3010/CVE-2025-53770-SharePoint-...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x
URL:https://github.com/Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass
标签:#CVE-2025
更新了:CVE-2025
描述:Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x
URL:https://github.com/Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass
标签:#CVE-2025
GitHub
GitHub - Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass: Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x
Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x - Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass