GitHub监控消息提醒!!!
更新了:域渗透
描述:FOFA Google Plugin 是一款基于 FOFA API 的 Chrome 浏览器插件,能够自动识别当前访问网站的域名或 IP,并实时查询其资产信息,如开放端口、服务类型等。该插件主要面向安全研究员、红队渗透人员、CTF 选手以及网络测绘从业者,用于快速识别目标的边界资产和潜在攻击面。
URL:https://github.com/Maikefee/Fofa_Google_Plugin
标签:#域渗透
更新了:域渗透
描述:FOFA Google Plugin 是一款基于 FOFA API 的 Chrome 浏览器插件,能够自动识别当前访问网站的域名或 IP,并实时查询其资产信息,如开放端口、服务类型等。该插件主要面向安全研究员、红队渗透人员、CTF 选手以及网络测绘从业者,用于快速识别目标的边界资产和潜在攻击面。
URL:https://github.com/Maikefee/Fofa_Google_Plugin
标签:#域渗透
GitHub
GitHub - Maikefee/Fofa_Google_Plugin: FOFA Google Plugin 是一款基于 FOFA API 的 Chrome 浏览器插件,能够自动识别当前访问网站的域名或 IP,并实时查询其资产信息,如开放端口、服务…
FOFA Google Plugin 是一款基于 FOFA API 的 Chrome 浏览器插件,能够自动识别当前访问网站的域名或 IP,并实时查询其资产信息,如开放端口、服务类型等。该插件主要面向安全研究员、红队渗透人员、CTF 选手以及网络测绘从业者,用于快速识别目标的边界资产和潜在攻击面。 - Maikefee/Fofa_Google_Plugin
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/anuj-akotkar/RCE_system
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/anuj-akotkar/RCE_system
标签:#RCE
GitHub
GitHub - anuj-akotkar/RCE_system: The RCE (Remote Code Execution) system lets users write and run code safely in a browser. It…
The RCE (Remote Code Execution) system lets users write and run code safely in a browser. It uses Docker to execute code in isolated environments with time and memory limits. The system supports te...
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC for CVE-2024-25600 (Bricks Builder RCE) — educational use only
URL:https://github.com/frankfm-labs/bricks-rce
标签:#RCE
更新了:RCE
描述:PoC for CVE-2024-25600 (Bricks Builder RCE) — educational use only
URL:https://github.com/frankfm-labs/bricks-rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-32429 (SQL Injection in PHP PDO prepared statements) – for educational and security research purposes only
URL:https://github.com/amir-othman/CVE-2025-32429
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-32429 (SQL Injection in PHP PDO prepared statements) – for educational and security research purposes only
URL:https://github.com/amir-othman/CVE-2025-32429
标签:#CVE-2025
GitHub
GitHub - amir-othman/CVE-2025-32429: Proof-of-Concept exploit for CVE-2025-32429 (SQL Injection in PHP PDO prepared statements)…
Proof-of-Concept exploit for CVE-2025-32429 (SQL Injection in PHP PDO prepared statements) – for educational and security research purposes only - amir-othman/CVE-2025-32429
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting SysAid On-Premise servers running on Windows.
URL:https://github.com/0xgh057r3c0n/SysAid-PreAuth-RCE-Chain
标签:#RCE
更新了:RCE
描述:This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting SysAid On-Premise servers running on Windows.
URL:https://github.com/0xgh057r3c0n/SysAid-PreAuth-RCE-Chain
标签:#RCE
GitHub
GitHub - 0xgh057r3c0n/SysAid-PreAuth-RCE-Chain: This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting…
This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting SysAid On-Premise servers running on Windows. - 0xgh057r3c0n/SysAid-PreAuth-RCE-Chain
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Sharepoint ToolPane - CVE-2025-53770 & CVE-2025-53771
URL:https://github.com/unk9vvn/sharepoint-toolpane
标签:#CVE-2025
更新了:CVE-2025
描述:Sharepoint ToolPane - CVE-2025-53770 & CVE-2025-53771
URL:https://github.com/unk9vvn/sharepoint-toolpane
标签:#CVE-2025
GitHub
GitHub - unk9vvn/sharepoint-toolpane: Sharepoint ToolPane - PoC
Sharepoint ToolPane - PoC. Contribute to unk9vvn/sharepoint-toolpane development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Reference to https://github.com/mulwareX/CVE-2025-6218-POC?tab=readme-ov-file, with some small changes
URL:https://github.com/vulnerbyte/CVE-2025-6218
标签:#CVE-2025
更新了:CVE-2025
描述:Reference to https://github.com/mulwareX/CVE-2025-6218-POC?tab=readme-ov-file, with some small changes
URL:https://github.com/vulnerbyte/CVE-2025-6218
标签:#CVE-2025
GitHub
GitHub - mulwareX/CVE-2025-6218-POC: RARLAB WinRAR Directory Traversal Remote Code Execution
RARLAB WinRAR Directory Traversal Remote Code Execution - mulwareX/CVE-2025-6218-POC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/ShinP451/scavenger_scanner
标签:#CVE-2025
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/ShinP451/scavenger_scanner
标签:#CVE-2025
GitHub
GitHub - ShinP451/scavenger_scanner: Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows - ShinP451/scavenger_scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/m3m0o/engeman-web-languagecombobox-sqli
标签:#CVE-2025
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/m3m0o/engeman-web-languagecombobox-sqli
标签:#CVE-2025
GitHub
GitHub - m3m0o/engeman-web-language-combobox-sqli: Proof of concept for exploitation of the vulnerability described in CVE-2025…
Proof of concept for exploitation of the vulnerability described in CVE-2025-8220, which concerns the possibility of SQL Injection during the password recovery page load in the Engeman Web software...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/m3m0o/engeman-web-language-combobox-sqli
标签:#CVE-2025
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/m3m0o/engeman-web-language-combobox-sqli
标签:#CVE-2025
GitHub
GitHub - m3m0o/engeman-web-language-combobox-sqli: Proof of concept for exploitation of the vulnerability described in CVE-2025…
Proof of concept for exploitation of the vulnerability described in CVE-2025-8220, which concerns the possibility of SQL Injection during the password recovery page load in the Engeman Web software...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-7404 exploit.
URL:https://github.com/mind2hex/CVE-2025-7404-CalibreWeb-0.6.24-BlindCommandInjection
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-7404 exploit.
URL:https://github.com/mind2hex/CVE-2025-7404-CalibreWeb-0.6.24-BlindCommandInjection
标签:#CVE-2025
GitHub
GitHub - mind2hex/CVE-2025-7404-CalibreWeb-0.6.24-BlindCommandInjection: CVE-2025-7404 exploit.
CVE-2025-7404 exploit. Contribute to mind2hex/CVE-2025-7404-CalibreWeb-0.6.24-BlindCommandInjection development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Linux CTF from VulnHub with a focus on enumeration, RCE, steganography, and privilege escalation to nested
URL:https://github.com/malik027/Double-1
标签:#RCE
更新了:RCE
描述:Linux CTF from VulnHub with a focus on enumeration, RCE, steganography, and privilege escalation to nested
URL:https://github.com/malik027/Double-1
标签:#RCE
GitHub
GitHub - malik027/Double-1: Linux CTF from VulnHub with a focus on enumeration, RCE, steganography, and privilege escalation to…
Linux CTF from VulnHub with a focus on enumeration, RCE, steganography, and privilege escalation to nested - malik027/Double-1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53770 Mass Scanner
URL:https://github.com/3a7/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53770 Mass Scanner
URL:https://github.com/3a7/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - 3a7/CVE-2025-53770: CVE-2025-53770 Mass Scanner
CVE-2025-53770 Mass Scanner. Contribute to 3a7/CVE-2025-53770 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/bosombaby/javascript
标签:#代码注入
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/bosombaby/javascript
标签:#代码注入
GitHub
GitHub - bosombaby/javascript: 这个仓库是一个专注于前端面试知识点的宝库,涵盖了各种重要的前端技术主题。无论你是正在准备面试,还是想要巩固和提升你的前端技术水平,这个仓库都将是你的理想选择。 仓库中包含了丰富的场景题,可…
这个仓库是一个专注于前端面试知识点的宝库,涵盖了各种重要的前端技术主题。无论你是正在准备面试,还是想要巩固和提升你的前端技术水平,这个仓库都将是你的理想选择。 仓库中包含了丰富的场景题,可以帮助你理解和掌握实际开发中可能遇到的各种问题和挑战。同时,我们还深入探讨了防抖节流、promise、闭包等高级主题,这些都是前端开发中常常见的技术难点,掌握它们将对你的技术提升有着重要的帮助。 此外,...
GitHub监控消息提醒!!!
更新了:RCE
描述:Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0)
URL:https://github.com/CSpanias/rpc-rce.py
标签:#RCE
更新了:RCE
描述:Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0)
URL:https://github.com/CSpanias/rpc-rce.py
标签:#RCE
GitHub
GitHub - CSpanias/rpc-rce.py: Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0)
Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0) - CSpanias/rpc-rce.py
GitHub监控消息提醒!!!
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/1-hexene/auto-commit
标签:#代码注入
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/1-hexene/auto-commit
标签:#代码注入
GitHub
GitHub - 1-hexene/auto-commit: 你说的对,但是GitHub是由Tom Preston-Werner、Chris Wanstrath、PJ Hyett和Scott Chacon自主研发的一款基于Git的代码托管平台。它发生在…
你说的对,但是GitHub是由Tom Preston-Werner、Chris Wanstrath、PJ Hyett和Scott Chacon自主研发的一款基于Git的代码托管平台。它发生在一个被称作互联网的全球信息网络中,在这里,被注册为GitHub用户的人将被授予创建和管理仓库的权限,导引开源软件和协作开发。你将扮演一位名为your_username的开发者,创建或加入项目,和他们一起编...
GitHub监控消息提醒!!!
更新了:RCE
描述:Authenticated File Upload to RCE via Mimetype Manipulation
URL:https://github.com/Yucaerin/MagicAI
标签:#RCE
更新了:RCE
描述:Authenticated File Upload to RCE via Mimetype Manipulation
URL:https://github.com/Yucaerin/MagicAI
标签:#RCE
GitHub
GitHub - Yucaerin/MagicAI: Authenticated File Upload to RCE via Mimetype Manipulation
Authenticated File Upload to RCE via Mimetype Manipulation - Yucaerin/MagicAI
GitHub监控消息提醒!!!
更新了:RCE
描述:Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL Injection, and XSS
URL:https://github.com/Mihirk23/dvwa-penetration-testing
标签:#RCE
更新了:RCE
描述:Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL Injection, and XSS
URL:https://github.com/Mihirk23/dvwa-penetration-testing
标签:#RCE
GitHub
GitHub - Mihirk23/dvwa-penetration-testing: Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL…
Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL Injection, and XSS - Mihirk23/dvwa-penetration-testing
GitHub监控消息提醒!!!
更新了:RCE
描述: Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC
URL:https://github.com/Shivshantp/CVE-2025-24813
标签:#RCE
更新了:RCE
描述: Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC
URL:https://github.com/Shivshantp/CVE-2025-24813
标签:#RCE
GitHub
GitHub - Shivshantp/CVE-2025-24813: Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC
Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC - Shivshantp/CVE-2025-24813