GitHub监控消息提醒!!!
更新了:渗透测试
描述:由山东大学“fl4g”团队开发的一站式网络安全实训平台。平台集成渗透测试靶场、文件加解密、漏洞复现三大模块,采用 Vue + SpringBoot 前后端分离架构,支持在线攻防演练、实时 WebSocket 互动、Redis 高速缓存与 ECharts 可视化分析。只需一键启动,即可在本地快速拉起完整的红蓝对抗环境,为课程教学、CTF 培训与企业安全演练提供高效、直观、可扩展的解决方案。
URL:https://github.com/2023cghacker/Cyber-Security-Range-Platform
标签:#渗透测试
更新了:渗透测试
描述:由山东大学“fl4g”团队开发的一站式网络安全实训平台。平台集成渗透测试靶场、文件加解密、漏洞复现三大模块,采用 Vue + SpringBoot 前后端分离架构,支持在线攻防演练、实时 WebSocket 互动、Redis 高速缓存与 ECharts 可视化分析。只需一键启动,即可在本地快速拉起完整的红蓝对抗环境,为课程教学、CTF 培训与企业安全演练提供高效、直观、可扩展的解决方案。
URL:https://github.com/2023cghacker/Cyber-Security-Range-Platform
标签:#渗透测试
GitHub
GitHub - 2023cghacker/Cyber-Security-Range-Platform: 由山东大学“fl4g”团队开发的一站式网络安全实训平台。平台集成渗透测试靶场、文件加解密、漏洞复现三大模块,采用 Vue + SpringBoot…
由山东大学“fl4g”团队开发的一站式网络安全实训平台。平台集成渗透测试靶场、文件加解密、漏洞复现三大模块,采用 Vue + SpringBoot 前后端分离架构,支持在线攻防演练、实时 WebSocket 互动、Redis 高速缓存与 ECharts 可视化分析。只需一键启动,即可在本地快速拉起完整的红蓝对抗环境,为课程教学、CTF 培训与企业安全演练提供高效、直观、可扩展的解决方案。 -...
GitHub监控消息提醒!!!
更新了:代码审计
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/LFenX/-
标签:#代码审计
更新了:代码审计
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/LFenX/-
标签:#代码审计
GitHub
GitHub - LFenX/-: 我每天写 Markdown 式 To-Do 日记,结果月底想盘点时间分配、计划完成度时,被一堆文字整崩:没法统计、没法对比。于是我写了这个脚本:自动读 Yesterday / Plan / Actual 三段清单,解…
我每天写 Markdown 式 To-Do 日记,结果月底想盘点时间分配、计划完成度时,被一堆文字整崩:没法统计、没法对比。于是我写了这个脚本:自动读 Yesterday / Plan / Actual 三段清单,解析时间段、标签和完成标记,直接写进 MySQL。点一下就能生成报表——今天写代码几小时?运动坚持了没?计划执行率多少?全部一目了然,还能按标签做多维度分析。如果你也想保留随手记笔...
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC exploit and vulnerable server demo for CVE-2025-1302 in jsonpath-plus.
URL:https://github.com/abrewer251/CVE-2025-1302_jsonpath-plus_RCE
标签:#RCE
更新了:RCE
描述:PoC exploit and vulnerable server demo for CVE-2025-1302 in jsonpath-plus.
URL:https://github.com/abrewer251/CVE-2025-1302_jsonpath-plus_RCE
标签:#RCE
GitHub
GitHub - abrewer251/CVE-2025-1302_jsonpath-plus_RCE: PoC exploit and vulnerable server demo for CVE-2025-1302 in jsonpath-plus.
PoC exploit and vulnerable server demo for CVE-2025-1302 in jsonpath-plus. - abrewer251/CVE-2025-1302_jsonpath-plus_RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC exploit and vulnerable server demo for CVE-2025-1302 in jsonpath-plus.
URL:https://github.com/DAVIDAROCA27/CVE-2024-23346-exploit
标签:#RCE
更新了:RCE
描述:PoC exploit and vulnerable server demo for CVE-2025-1302 in jsonpath-plus.
URL:https://github.com/DAVIDAROCA27/CVE-2024-23346-exploit
标签:#RCE
GitHub
GitHub - DAVIDAROCA27/CVE-2024-23346-exploit: This is a exploit for the known Remote Code Execution (RCE) vulnerability in the…
This is a exploit for the known Remote Code Execution (RCE) vulnerability in the `pymatgen` (CVE-2024-23346) Python library by uploading a malicious `CIF` file to the hosted `CIF Analyzer` website ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-6018 Poc and Exploit
URL:https://github.com/ibrahmsql/CVE-2025-6018-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-6018 Poc and Exploit
URL:https://github.com/ibrahmsql/CVE-2025-6018-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-6018 Poc and Exploit
URL:https://github.com/ibrahmsql/CVE-2025-6018
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-6018 Poc and Exploit
URL:https://github.com/ibrahmsql/CVE-2025-6018
标签:#CVE-2025
GitHub
GitHub - ibrahmsql/CVE-2025-6018: CVE-2025-6018 Poc and Exploit
CVE-2025-6018 Poc and Exploit . Contribute to ibrahmsql/CVE-2025-6018 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:In this write up, we will go over reverse engineering and exploiting a vulnerable MIPS OpenWRT router in order to get RCE and a reverse shell.
URL:https://github.com/Archan6el/OpenWRT-Router-Exploit-RCE-Writeup
标签:#RCE
更新了:RCE
描述:In this write up, we will go over reverse engineering and exploiting a vulnerable MIPS OpenWRT router in order to get RCE and a reverse shell.
URL:https://github.com/Archan6el/OpenWRT-Router-Exploit-RCE-Writeup
标签:#RCE
GitHub
GitHub - Archan6el/OpenWRT-Router-Exploit-RCE-Writeup: In this write up, we will go over reverse engineering and exploiting a vulnerable…
In this write up, we will go over reverse engineering and exploiting a vulnerable MIPS OpenWRT router in order to get RCE and a reverse shell. - Archan6el/OpenWRT-Router-Exploit-RCE-Writeup
GitHub监控消息提醒!!!
更新了:信息收集
描述:Whois_Google_Plugin 是一款为安全研究员、红队人员和渗透测试工程师设计的 Chrome 浏览器插件,能够在访问目标站点时自动提取当前网页的域名,并实时查询其 Whois 信息(包括注册时间、到期时间、注册商、联系方式等)。 该插件可用于信息收集阶段(Reconnaissance),为目标资产分析提供第一手域名情报。
URL:https://github.com/Maikefee/Whois_Google_Plugin
标签:#信息收集
更新了:信息收集
描述:Whois_Google_Plugin 是一款为安全研究员、红队人员和渗透测试工程师设计的 Chrome 浏览器插件,能够在访问目标站点时自动提取当前网页的域名,并实时查询其 Whois 信息(包括注册时间、到期时间、注册商、联系方式等)。 该插件可用于信息收集阶段(Reconnaissance),为目标资产分析提供第一手域名情报。
URL:https://github.com/Maikefee/Whois_Google_Plugin
标签:#信息收集
GitHub
GitHub - Maikefee/Whois_Google_Plugin: Whois_Google_Plugin 是一款为安全研究员、红队人员和渗透测试工程师设计的 Chrome 浏览器插件,能够在访问目标站点时自动提取当前网页的域名,并实时查询其…
Whois_Google_Plugin 是一款为安全研究员、红队人员和渗透测试工程师设计的 Chrome 浏览器插件,能够在访问目标站点时自动提取当前网页的域名,并实时查询其 Whois 信息(包括注册时间、到期时间、注册商、联系方式等)。 该插件可用于信息收集阶段(Reconnaissance),为目标资产分析提供第一手域名情报。 - Maikefee/Whois_Google_Plugin
GitHub监控消息提醒!!!
更新了:RCE
描述:Malicious Maven pom.xml that uses \"groovy-maven-plugin\" to get RCE
URL:https://github.com/mbadanoiu/mvn_pwn
标签:#RCE
更新了:RCE
描述:Malicious Maven pom.xml that uses \"groovy-maven-plugin\" to get RCE
URL:https://github.com/mbadanoiu/mvn_pwn
标签:#RCE
GitHub
GitHub - mbadanoiu/mvn_pwn: Malicious Maven pom.xml that uses "groovy-maven-plugin" to get RCE
Malicious Maven pom.xml that uses "groovy-maven-plugin" to get RCE - mbadanoiu/mvn_pwn
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-52914
URL:https://github.com/rxerium/CVE-2025-52914
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-52914
URL:https://github.com/rxerium/CVE-2025-52914
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-52914: Detection for CVE-2025-52914
Detection for CVE-2025-52914. Contribute to rxerium/CVE-2025-52914 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53652: Jenkins Git Parameter Analysis
URL:https://github.com/pl4tyz/CVE-2025-53652-Jenkins-Git-Parameter-Analysis
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53652: Jenkins Git Parameter Analysis
URL:https://github.com/pl4tyz/CVE-2025-53652-Jenkins-Git-Parameter-Analysis
标签:#CVE-2025
GitHub
GitHub - pl4tyz/CVE-2025-53652-Jenkins-Git-Parameter-Analysis: CVE-2025-53652: Jenkins Git Parameter Analysis
CVE-2025-53652: Jenkins Git Parameter Analysis. Contribute to pl4tyz/CVE-2025-53652-Jenkins-Git-Parameter-Analysis development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Honeypot for CVE-2025-53770 aka ToolShell
URL:https://github.com/a-hydrae/ToolShell-Honeypot
标签:#CVE-2025
更新了:CVE-2025
描述:Honeypot for CVE-2025-53770 aka ToolShell
URL:https://github.com/a-hydrae/ToolShell-Honeypot
标签:#CVE-2025
GitHub
GitHub - a-hydrae/ToolShell-Honeypot: Honeypot for CVE-2025-53770 aka ToolShell
Honeypot for CVE-2025-53770 aka ToolShell. Contribute to a-hydrae/ToolShell-Honeypot development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-32429 – SQLi in XWiki REST API (getdeleteddocuments.vm).
URL:https://github.com/byteReaper77/CVE-2025-32429
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-32429 – SQLi in XWiki REST API (getdeleteddocuments.vm).
URL:https://github.com/byteReaper77/CVE-2025-32429
标签:#CVE-2025
GitHub
GitHub - byteReaper77/CVE-2025-32429: Exploit for CVE-2025-32429 – SQLi in XWiki REST API (getdeleteddocuments.vm).
Exploit for CVE-2025-32429 – SQLi in XWiki REST API (getdeleteddocuments.vm). - byteReaper77/CVE-2025-32429
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public Disclosure: CVE-2025-54554 – Unauthenticated Access in tiaudit REST API leading to Sensitive Information Disclosure
URL:https://github.com/Aman-Parmar/CVE-2025-54554
标签:#CVE-2025
更新了:CVE-2025
描述:Public Disclosure: CVE-2025-54554 – Unauthenticated Access in tiaudit REST API leading to Sensitive Information Disclosure
URL:https://github.com/Aman-Parmar/CVE-2025-54554
标签:#CVE-2025
GitHub
GitHub - Aman-Parmar/CVE-2025-54554: CVE-2025-54554 – Unauthenticated Access in tiaudit REST API leading to Sensitive Information…
CVE-2025-54554 – Unauthenticated Access in tiaudit REST API leading to Sensitive Information Disclosure - Aman-Parmar/CVE-2025-54554
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Scans Windows IIS logs for signs of CVE-2025-53770 & CVE-2025-53771
URL:https://github.com/zach115th/ToolShellFinder
标签:#CVE-2025
更新了:CVE-2025
描述:Scans Windows IIS logs for signs of CVE-2025-53770 & CVE-2025-53771
URL:https://github.com/zach115th/ToolShellFinder
标签:#CVE-2025
GitHub
GitHub - zach115th/ToolShellFinder: Scans Windows IIS logs for signs of CVE-2025-53770 & CVE-2025-53771
Scans Windows IIS logs for signs of CVE-2025-53770 & CVE-2025-53771 - zach115th/ToolShellFinder
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-34085
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-34085
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-34085
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-34085
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-34085: CVE-2025-34085
CVE-2025-34085. Contribute to B1ack4sh/Blackash-CVE-2025-34085 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:域渗透
描述:FOFA Google Plugin 是一款基于 FOFA API 的 Chrome 浏览器插件,能够自动识别当前访问网站的域名或 IP,并实时查询其资产信息,如开放端口、服务类型等。该插件主要面向安全研究员、红队渗透人员、CTF 选手以及网络测绘从业者,用于快速识别目标的边界资产和潜在攻击面。
URL:https://github.com/Maikefee/Fofa_Google_Plugin
标签:#域渗透
更新了:域渗透
描述:FOFA Google Plugin 是一款基于 FOFA API 的 Chrome 浏览器插件,能够自动识别当前访问网站的域名或 IP,并实时查询其资产信息,如开放端口、服务类型等。该插件主要面向安全研究员、红队渗透人员、CTF 选手以及网络测绘从业者,用于快速识别目标的边界资产和潜在攻击面。
URL:https://github.com/Maikefee/Fofa_Google_Plugin
标签:#域渗透
GitHub
GitHub - Maikefee/Fofa_Google_Plugin: FOFA Google Plugin 是一款基于 FOFA API 的 Chrome 浏览器插件,能够自动识别当前访问网站的域名或 IP,并实时查询其资产信息,如开放端口、服务…
FOFA Google Plugin 是一款基于 FOFA API 的 Chrome 浏览器插件,能够自动识别当前访问网站的域名或 IP,并实时查询其资产信息,如开放端口、服务类型等。该插件主要面向安全研究员、红队渗透人员、CTF 选手以及网络测绘从业者,用于快速识别目标的边界资产和潜在攻击面。 - Maikefee/Fofa_Google_Plugin
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/anuj-akotkar/RCE_system
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/anuj-akotkar/RCE_system
标签:#RCE
GitHub
GitHub - anuj-akotkar/RCE_system: The RCE (Remote Code Execution) system lets users write and run code safely in a browser. It…
The RCE (Remote Code Execution) system lets users write and run code safely in a browser. It uses Docker to execute code in isolated environments with time and memory limits. The system supports te...
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC for CVE-2024-25600 (Bricks Builder RCE) — educational use only
URL:https://github.com/frankfm-labs/bricks-rce
标签:#RCE
更新了:RCE
描述:PoC for CVE-2024-25600 (Bricks Builder RCE) — educational use only
URL:https://github.com/frankfm-labs/bricks-rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-32429 (SQL Injection in PHP PDO prepared statements) – for educational and security research purposes only
URL:https://github.com/amir-othman/CVE-2025-32429
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-32429 (SQL Injection in PHP PDO prepared statements) – for educational and security research purposes only
URL:https://github.com/amir-othman/CVE-2025-32429
标签:#CVE-2025
GitHub
GitHub - amir-othman/CVE-2025-32429: Proof-of-Concept exploit for CVE-2025-32429 (SQL Injection in PHP PDO prepared statements)…
Proof-of-Concept exploit for CVE-2025-32429 (SQL Injection in PHP PDO prepared statements) – for educational and security research purposes only - amir-othman/CVE-2025-32429
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting SysAid On-Premise servers running on Windows.
URL:https://github.com/0xgh057r3c0n/SysAid-PreAuth-RCE-Chain
标签:#RCE
更新了:RCE
描述:This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting SysAid On-Premise servers running on Windows.
URL:https://github.com/0xgh057r3c0n/SysAid-PreAuth-RCE-Chain
标签:#RCE
GitHub
GitHub - 0xgh057r3c0n/SysAid-PreAuth-RCE-Chain: This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting…
This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting SysAid On-Premise servers running on Windows. - 0xgh057r3c0n/SysAid-PreAuth-RCE-Chain