GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detects unauthenticated POST requests to ToolPane.aspx with a SignOut.aspx referer, observed in exploitation of CVE-2025-53770 against SharePoint
URL:https://github.com/aazamil/SharePoint-ToolShell-Detection
标签:#CVE-2025
更新了:CVE-2025
描述:Detects unauthenticated POST requests to ToolPane.aspx with a SignOut.aspx referer, observed in exploitation of CVE-2025-53770 against SharePoint
URL:https://github.com/aazamil/SharePoint-ToolShell-Detection
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A comprehensive security monitoring solution for SharePoint Server with specific protection against CVE-2025-53770 and other threats
URL:https://github.com/paolokappa/SharePointSecurityMonitor
标签:#CVE-2025
更新了:CVE-2025
描述:A comprehensive security monitoring solution for SharePoint Server with specific protection against CVE-2025-53770 and other threats
URL:https://github.com/paolokappa/SharePointSecurityMonitor
标签:#CVE-2025
GitHub
GitHub - paolokappa/SharePointSecurityMonitor: A comprehensive PowerShell-based SharePoint security monitoring solution with CVE…
A comprehensive PowerShell-based SharePoint security monitoring solution with CVE-2025-53770 protection, advanced DLL analysis, threat detection, and automated alerting capabilities. - paolokappa/S...
GitHub监控消息提醒!!!
更新了:RCE
描述:vulnerable app SQLi, XSS, RCE
URL:https://github.com/m-carneiro/owaspinho
标签:#RCE
更新了:RCE
描述:vulnerable app SQLi, XSS, RCE
URL:https://github.com/m-carneiro/owaspinho
标签:#RCE
GitHub
GitHub - m-carneiro/owaspinho: vulnerable app
vulnerable app. Contribute to m-carneiro/owaspinho development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Scanner for the SharePoint CVE-2025-53770 zero day vulnerability.
URL:https://github.com/hazcod/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:Scanner for the SharePoint CVE-2025-53770 zero day vulnerability.
URL:https://github.com/hazcod/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - hazcod/CVE-2025-53770: Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability.
Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability. - hazcod/CVE-2025-53770
GitHub监控消息提醒!!!
更新了:getshell
描述:This is a Compilation of ueditor exps like file upload 、xss 、ssrf 、getshell
URL:https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance
标签:#getshell
更新了:getshell
描述:This is a Compilation of ueditor exps like file upload 、xss 、ssrf 、getshell
URL:https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance
标签:#getshell
GitHub
GitHub - peiqiF4ck/WebFrameworkTools-5.5-enhance: 本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getsh…
本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getshell。批量自动化测试。例如:Thinkphp,Struts2,weblogic。出现的最新漏洞进行实时跟踪并且更新例如:log4jRCE,向日葵 禅道RCE 瑞友天翼应用虚拟化系统sql注入导致RCE大华智慧园区上传,金蝶云星空漏洞等等. ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-6019
URL:https://github.com/dreysanox/CVE-2025-6018_Poc
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-6019
URL:https://github.com/dreysanox/CVE-2025-6018_Poc
标签:#CVE-2025
GitHub
GitHub - dreysanox/CVE-2025-6018_Poc: Exploit for CVE-2025-6019
Exploit for CVE-2025-6019. Contribute to dreysanox/CVE-2025-6018_Poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:ToolShell scanner - CVE-2025-53770
URL:https://github.com/ZephrFish/CVE-2025-53770-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:ToolShell scanner - CVE-2025-53770
URL:https://github.com/ZephrFish/CVE-2025-53770-Scanner
标签:#CVE-2025
GitHub
GitHub - ZephrFish/CVE-2025-53770-Scanner: ToolShell scanner - CVE-2025-53770 and detection information
ToolShell scanner - CVE-2025-53770 and detection information - ZephrFish/CVE-2025-53770-Scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770
URL:https://github.com/grupooruss/CVE-2025-53770-Checker
标签:#CVE-2025
更新了:CVE-2025
描述:Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770
URL:https://github.com/grupooruss/CVE-2025-53770-Checker
标签:#CVE-2025
GitHub
GitHub - grupooruss/CVE-2025-53770-Checker: Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770
Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770 - grupooruss/CVE-2025-53770-Checker
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection
URL:https://github.com/00xCanelo/CVE-2025-27591-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection
URL:https://github.com/00xCanelo/CVE-2025-27591-PoC
标签:#CVE-2025
GitHub
GitHub - 00xCanelo/CVE-2025-27591: 🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below…
🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection - 00xCanelo/CVE-2025-27591
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25014
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-25014
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25014
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-25014
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Ashwesker-CVE-2025-25014: CVE-2025-25014
CVE-2025-25014. Contribute to Ashwesker/Ashwesker-CVE-2025-25014 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution.
URL:https://github.com/byteReaper77/CVE-2025-47917
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution.
URL:https://github.com/byteReaper77/CVE-2025-47917
标签:#CVE-2025
GitHub
GitHub - byteReaper77/CVE-2025-47917: PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution.
PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution. - byteReaper77/CVE-2025-47917
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32463
URL:https://github.com/ChetanKomal/sudo_exploit
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32463
URL:https://github.com/ChetanKomal/sudo_exploit
标签:#CVE-2025
GitHub
GitHub - ChetanKomal/sudo_exploit: CVE-2025-32463
CVE-2025-32463. Contribute to ChetanKomal/sudo_exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:GitLabRCECVE-2021-22205Tool
URL:https://github.com/whiex/GitLabRCECVE-2021-22205Tool
标签:#RCE
更新了:RCE
描述:GitLabRCECVE-2021-22205Tool
URL:https://github.com/whiex/GitLabRCECVE-2021-22205Tool
标签:#RCE
GitHub
GitHub - whiex/GitLabRCECVE-2021-22205Tool: GitLabRCECVE-2021-22205Tool
GitLabRCECVE-2021-22205Tool. Contribute to whiex/GitLabRCECVE-2021-22205Tool development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A critical zero-auth RCE vulnerability in SharePoint (CVE-2025-53770), now exploited in the wild, building directly on the spoofing flaw CVE-2025-49706.
URL:https://github.com/AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:A critical zero-auth RCE vulnerability in SharePoint (CVE-2025-53770), now exploited in the wild, building directly on the spoofing flaw CVE-2025-49706.
URL:https://github.com/AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE
标签:#CVE-2025
GitHub
GitHub - AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE: A critical zero-auth RCE vulnerability…
A critical zero-auth RCE vulnerability in SharePoint (CVE-2025-53770), now exploited in the wild, building directly on the spoofing flaw CVE-2025-49706. - AdityaBhatt3010/CVE-2025-53770-SharePoint-...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x
URL:https://github.com/Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass
标签:#CVE-2025
更新了:CVE-2025
描述:Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x
URL:https://github.com/Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass
标签:#CVE-2025
GitHub
GitHub - Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass: Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x
Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x - Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass
GitHub监控消息提醒!!!
更新了:反序列化
描述:C++20协程和基于io_uringの百万并发服务器; 可异步读写, 支持Transfer-Encoding分块编码传输文件, 支持断点续传; 基于压缩前缀树编写的路由, 支持通配符解析;+ http/https/websocket、socks5代理、Json无宏反射(支持序列化与反序列化)
URL:https://github.com/HengXin666/HXLibs
标签:#反序列化
更新了:反序列化
描述:C++20协程和基于io_uringの百万并发服务器; 可异步读写, 支持Transfer-Encoding分块编码传输文件, 支持断点续传; 基于压缩前缀树编写的路由, 支持通配符解析;+ http/https/websocket、socks5代理、Json无宏反射(支持序列化与反序列化)
URL:https://github.com/HengXin666/HXLibs
标签:#反序列化
GitHub
GitHub - HengXin666/HXLibs: 现代C++20协程编写的基于io_uring/iocp百万并发HTTP服务器; 可异步读写, 支持分块编码传输文件, 支持断点续传; http/websocket、客户端socks5代理、JSON…
现代C++20协程编写的基于io_uring/iocp百万并发HTTP服务器; 可异步读写, 支持分块编码传输文件, 支持断点续传; http/websocket、客户端socks5代理、JSON解析、聚合类无宏反射/宏反射支持别名 - HengXin666/HXLibs
GitHub监控消息提醒!!!
更新了:蓝队
描述:HW蓝队溯源工具,可以快速处理IP信息、威胁情报、基本信息查询、贴吧信息查询、确认攻击者是否从事安全行业。
URL:https://github.com/Di-duo/TrackAttacker
标签:#蓝队
更新了:蓝队
描述:HW蓝队溯源工具,可以快速处理IP信息、威胁情报、基本信息查询、贴吧信息查询、确认攻击者是否从事安全行业。
URL:https://github.com/Di-duo/TrackAttacker
标签:#蓝队
GitHub
GitHub - Di-duo/TrackAttacker: HW蓝队溯源工具,可以快速处理IP信息、威胁情报、基本信息查询、贴吧信息查询、确认攻击者是否从事安全行业。
HW蓝队溯源工具,可以快速处理IP信息、威胁情报、基本信息查询、贴吧信息查询、确认攻击者是否从事安全行业。 - Di-duo/TrackAttacker