GitHub监控消息提醒!!!
更新了:RCE
描述:GitLabRCECVE-2021-22205Tool
URL:https://github.com/whiex/GitLabRCECVE-2021-22205Tool
标签:#RCE
更新了:RCE
描述:GitLabRCECVE-2021-22205Tool
URL:https://github.com/whiex/GitLabRCECVE-2021-22205Tool
标签:#RCE
GitHub
GitHub - whiex/GitLabRCECVE-2021-22205Tool: GitLabRCECVE-2021-22205Tool
GitLabRCECVE-2021-22205Tool. Contribute to whiex/GitLabRCECVE-2021-22205Tool development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A critical zero-auth RCE vulnerability in SharePoint (CVE-2025-53770), now exploited in the wild, building directly on the spoofing flaw CVE-2025-49706.
URL:https://github.com/AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:A critical zero-auth RCE vulnerability in SharePoint (CVE-2025-53770), now exploited in the wild, building directly on the spoofing flaw CVE-2025-49706.
URL:https://github.com/AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE
标签:#CVE-2025
GitHub
GitHub - AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE: A critical zero-auth RCE vulnerability…
A critical zero-auth RCE vulnerability in SharePoint (CVE-2025-53770), now exploited in the wild, building directly on the spoofing flaw CVE-2025-49706. - AdityaBhatt3010/CVE-2025-53770-SharePoint-...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x
URL:https://github.com/Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass
标签:#CVE-2025
更新了:CVE-2025
描述:Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x
URL:https://github.com/Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass
标签:#CVE-2025
GitHub
GitHub - Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass: Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x
Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x - Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass
GitHub监控消息提醒!!!
更新了:反序列化
描述:C++20协程和基于io_uringの百万并发服务器; 可异步读写, 支持Transfer-Encoding分块编码传输文件, 支持断点续传; 基于压缩前缀树编写的路由, 支持通配符解析;+ http/https/websocket、socks5代理、Json无宏反射(支持序列化与反序列化)
URL:https://github.com/HengXin666/HXLibs
标签:#反序列化
更新了:反序列化
描述:C++20协程和基于io_uringの百万并发服务器; 可异步读写, 支持Transfer-Encoding分块编码传输文件, 支持断点续传; 基于压缩前缀树编写的路由, 支持通配符解析;+ http/https/websocket、socks5代理、Json无宏反射(支持序列化与反序列化)
URL:https://github.com/HengXin666/HXLibs
标签:#反序列化
GitHub
GitHub - HengXin666/HXLibs: 现代C++20协程编写的基于io_uring/iocp百万并发HTTP服务器; 可异步读写, 支持分块编码传输文件, 支持断点续传; http/websocket、客户端socks5代理、JSON…
现代C++20协程编写的基于io_uring/iocp百万并发HTTP服务器; 可异步读写, 支持分块编码传输文件, 支持断点续传; http/websocket、客户端socks5代理、JSON解析、聚合类无宏反射/宏反射支持别名 - HengXin666/HXLibs
GitHub监控消息提醒!!!
更新了:蓝队
描述:HW蓝队溯源工具,可以快速处理IP信息、威胁情报、基本信息查询、贴吧信息查询、确认攻击者是否从事安全行业。
URL:https://github.com/Di-duo/TrackAttacker
标签:#蓝队
更新了:蓝队
描述:HW蓝队溯源工具,可以快速处理IP信息、威胁情报、基本信息查询、贴吧信息查询、确认攻击者是否从事安全行业。
URL:https://github.com/Di-duo/TrackAttacker
标签:#蓝队
GitHub
GitHub - Di-duo/TrackAttacker: HW蓝队溯源工具,可以快速处理IP信息、威胁情报、基本信息查询、贴吧信息查询、确认攻击者是否从事安全行业。
HW蓝队溯源工具,可以快速处理IP信息、威胁情报、基本信息查询、贴吧信息查询、确认攻击者是否从事安全行业。 - Di-duo/TrackAttacker
GitHub监控消息提醒!!!
更新了:bypass av
描述:BypassAV 是一款小型免杀辅助工具,旨在帮助渗透人员应对主流杀软。
URL:https://github.com/Taowmw/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
标签:#bypass av
更新了:bypass av
描述:BypassAV 是一款小型免杀辅助工具,旨在帮助渗透人员应对主流杀软。
URL:https://github.com/Taowmw/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
标签:#bypass av
GitHub监控消息提醒!!!
更新了:Red Team
描述:Group project with the Build Red Team and HackTheHood
URL:https://github.com/Yajham/ShellCode-Encrypt-Tool-Xor-Aes-Fud-Stable
标签:#Red Team
更新了:Red Team
描述:Group project with the Build Red Team and HackTheHood
URL:https://github.com/Yajham/ShellCode-Encrypt-Tool-Xor-Aes-Fud-Stable
标签:#Red Team
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:多线程路径爆破,漏洞检测,生成报告自动打包为ZIP文件
URL:https://github.com/xiaoshao798/web-
标签:#漏洞检测
更新了:漏洞检测
描述:多线程路径爆破,漏洞检测,生成报告自动打包为ZIP文件
URL:https://github.com/xiaoshao798/web-
标签:#漏洞检测
GitHub
GitHub - xiaoshao798/web-: 多线程路径爆破,漏洞检测,生成报告自动打包为ZIP文件
多线程路径爆破,漏洞检测,生成报告自动打包为ZIP文件. Contribute to xiaoshao798/web- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:burp
描述:burp
URL:https://github.com/SibghaMursaleen/api-hardening-internshipTask
标签:#burp
更新了:burp
描述:burp
URL:https://github.com/SibghaMursaleen/api-hardening-internshipTask
标签:#burp
GitHub
GitHub - SibghaMursaleen/api-hardening-internshipTask: DVWA (Damn Vulnerable Web App) was used in this internship to perform ethical…
DVWA (Damn Vulnerable Web App) was used in this internship to perform ethical hacking and security audits. Tools like Nmap, Nikto, SQLMap, Burp Suite, and Metasploit were used to test for SQLi, CSR...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Python-based reconnaissance scanner for safely identifying potential exposure to SharePoint vulnerability CVE-2025-53770.
URL:https://github.com/Sec-Dan/CVE-2025-53770-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:A Python-based reconnaissance scanner for safely identifying potential exposure to SharePoint vulnerability CVE-2025-53770.
URL:https://github.com/Sec-Dan/CVE-2025-53770-Scanner
标签:#CVE-2025
GitHub
GitHub - Sec-Dan/CVE-2025-53770-Scanner: A Python-based reconnaissance scanner for safely identifying potential exposure to SharePoint…
A Python-based reconnaissance scanner for safely identifying potential exposure to SharePoint vulnerability CVE-2025-53770. - Sec-Dan/CVE-2025-53770-Scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Explore the Microsoft SharePoint CVE-2025-53770 proof of concept. Learn about this vulnerability and its implications. 🐙💻
URL:https://github.com/Lapesha/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:Explore the Microsoft SharePoint CVE-2025-53770 proof of concept. Learn about this vulnerability and its implications. 🐙💻
URL:https://github.com/Lapesha/CVE-2025-53770
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:渗透测试
描述:利用Python写黑客渗透工具(持续更新中,后续难度对本人来说难度较大,所以更新速度放缓),书籍:《python黑帽子:黑客与渗透测试编程之道》,《Python渗透测试编程技术:方法与实践》 因本人水平有限,代码可能会出现bug,如果你发现了bug,欢迎提交修改,谢谢.
URL:https://github.com/TonyD0g/PythonHacker
标签:#渗透测试
更新了:渗透测试
描述:利用Python写黑客渗透工具(持续更新中,后续难度对本人来说难度较大,所以更新速度放缓),书籍:《python黑帽子:黑客与渗透测试编程之道》,《Python渗透测试编程技术:方法与实践》 因本人水平有限,代码可能会出现bug,如果你发现了bug,欢迎提交修改,谢谢.
URL:https://github.com/TonyD0g/PythonHacker
标签:#渗透测试
GitHub
GitHub - TonyD0g/PythonHacker: 利用Python写黑客渗透工具(持续更新中,后续难度对本人来说难度较大,所以更新速度放缓),书籍:《python黑帽子:黑客与渗透测试编程之道》,《Python渗透测试编程技术:方法与实践》…
利用Python写黑客渗透工具(持续更新中,后续难度对本人来说难度较大,所以更新速度放缓),书籍:《python黑帽子:黑客与渗透测试编程之道》,《Python渗透测试编程技术:方法与实践》 因本人水平有限,代码可能会出现bug,如果你发现了bug,欢迎提交修改,谢谢. - TonyD0g/PythonHacker
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53770 – Vulnerability Research & Exploitation
URL:https://github.com/b33b0y/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53770 – Vulnerability Research & Exploitation
URL:https://github.com/b33b0y/CVE-2025-53770
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:渗透测试
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/huaimeng666/gofinger
标签:#渗透测试
更新了:渗透测试
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/huaimeng666/gofinger
标签:#渗透测试
GitHub
GitHub - huaimeng666/gofinger: GoFinger是一款专为红队攻防和企业资产管理设计的下一代web指纹发现、指纹识别工具。基于 Go 语言开发,它不仅继承了传统指纹工具的识别能力,更在性能、可扩展性和输出质量上进行了深度优化。…
GoFinger是一款专为红队攻防和企业资产管理设计的下一代web指纹发现、指纹识别工具。基于 Go 语言开发,它不仅继承了传统指纹工具的识别能力,更在性能、可扩展性和输出质量上进行了深度优化。 它旨在帮助安全工程师和渗透测试人员快速、精准地识别网络资产指纹,并以美观、易读的格式呈现结果。工具原生支持本地指纹库与 Fofa、Quake、Hunter 等主流API联动,并集成了 Chainr...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔥 PoC for CVE-2025-5777 – Auth Bypass + RCE in Trend Micro Apex Central
URL:https://github.com/Shivshantp/CVE-2025-5777-TrendMicro-ApexCentral-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:🔥 PoC for CVE-2025-5777 – Auth Bypass + RCE in Trend Micro Apex Central
URL:https://github.com/Shivshantp/CVE-2025-5777-TrendMicro-ApexCentral-RCE
标签:#CVE-2025
GitHub
GitHub - Shivshantp/CVE-2025-5777-TrendMicro-ApexCentral-RCE: PoC for CVE-2025-5777 – Auth Bypass and RCE in Trend Micro Apex Central
PoC for CVE-2025-5777 – Auth Bypass and RCE in Trend Micro Apex Central - Shivshantp/CVE-2025-5777-TrendMicro-ApexCentral-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:How CVE-2025-29774 Vulnerabilities and the SIGHASH_SINGLE Bug Threaten Multi-Signature Wallet Operational Methods with Fake RawTX
URL:https://github.com/demining/Digital-Signature-Forgery-Attack
标签:#CVE-2025
更新了:CVE-2025
描述:How CVE-2025-29774 Vulnerabilities and the SIGHASH_SINGLE Bug Threaten Multi-Signature Wallet Operational Methods with Fake RawTX
URL:https://github.com/demining/Digital-Signature-Forgery-Attack
标签:#CVE-2025
GitHub
GitHub - demining/Digital-Signature-Forgery-Attack: How CVE-2025-29774 Vulnerabilities and the SIGHASH_SINGLE Bug Threaten Multi…
How CVE-2025-29774 Vulnerabilities and the SIGHASH_SINGLE Bug Threaten Multi-Signature Wallet Operational Methods with Fake RawTX - demining/Digital-Signature-Forgery-Attack