GitHub监控消息提醒!!!
更新了:RCE
描述:This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting SysAid On-Premise servers running on Windows.
URL:https://github.com/0xgh057r3c0n/SysAid-PreAuth-RCE-Chain
标签:#RCE
更新了:RCE
描述:This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting SysAid On-Premise servers running on Windows.
URL:https://github.com/0xgh057r3c0n/SysAid-PreAuth-RCE-Chain
标签:#RCE
GitHub
GitHub - 0xgh057r3c0n/SysAid-PreAuth-RCE-Chain: This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting…
This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting SysAid On-Premise servers running on Windows. - 0xgh057r3c0n/SysAid-PreAuth-RCE-Chain
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Sharepoint ToolPane - CVE-2025-53770 & CVE-2025-53771
URL:https://github.com/unk9vvn/sharepoint-toolpane
标签:#CVE-2025
更新了:CVE-2025
描述:Sharepoint ToolPane - CVE-2025-53770 & CVE-2025-53771
URL:https://github.com/unk9vvn/sharepoint-toolpane
标签:#CVE-2025
GitHub
GitHub - unk9vvn/sharepoint-toolpane: Sharepoint ToolPane - PoC
Sharepoint ToolPane - PoC. Contribute to unk9vvn/sharepoint-toolpane development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Reference to https://github.com/mulwareX/CVE-2025-6218-POC?tab=readme-ov-file, with some small changes
URL:https://github.com/vulnerbyte/CVE-2025-6218
标签:#CVE-2025
更新了:CVE-2025
描述:Reference to https://github.com/mulwareX/CVE-2025-6218-POC?tab=readme-ov-file, with some small changes
URL:https://github.com/vulnerbyte/CVE-2025-6218
标签:#CVE-2025
GitHub
GitHub - mulwareX/CVE-2025-6218-POC: RARLAB WinRAR Directory Traversal Remote Code Execution
RARLAB WinRAR Directory Traversal Remote Code Execution - mulwareX/CVE-2025-6218-POC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/ShinP451/scavenger_scanner
标签:#CVE-2025
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/ShinP451/scavenger_scanner
标签:#CVE-2025
GitHub
GitHub - ShinP451/scavenger_scanner: Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows - ShinP451/scavenger_scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/m3m0o/engeman-web-languagecombobox-sqli
标签:#CVE-2025
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/m3m0o/engeman-web-languagecombobox-sqli
标签:#CVE-2025
GitHub
GitHub - m3m0o/engeman-web-language-combobox-sqli: Proof of concept for exploitation of the vulnerability described in CVE-2025…
Proof of concept for exploitation of the vulnerability described in CVE-2025-8220, which concerns the possibility of SQL Injection during the password recovery page load in the Engeman Web software...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/m3m0o/engeman-web-language-combobox-sqli
标签:#CVE-2025
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/m3m0o/engeman-web-language-combobox-sqli
标签:#CVE-2025
GitHub
GitHub - m3m0o/engeman-web-language-combobox-sqli: Proof of concept for exploitation of the vulnerability described in CVE-2025…
Proof of concept for exploitation of the vulnerability described in CVE-2025-8220, which concerns the possibility of SQL Injection during the password recovery page load in the Engeman Web software...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-7404 exploit.
URL:https://github.com/mind2hex/CVE-2025-7404-CalibreWeb-0.6.24-BlindCommandInjection
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-7404 exploit.
URL:https://github.com/mind2hex/CVE-2025-7404-CalibreWeb-0.6.24-BlindCommandInjection
标签:#CVE-2025
GitHub
GitHub - mind2hex/CVE-2025-7404-CalibreWeb-0.6.24-BlindCommandInjection: CVE-2025-7404 exploit.
CVE-2025-7404 exploit. Contribute to mind2hex/CVE-2025-7404-CalibreWeb-0.6.24-BlindCommandInjection development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Linux CTF from VulnHub with a focus on enumeration, RCE, steganography, and privilege escalation to nested
URL:https://github.com/malik027/Double-1
标签:#RCE
更新了:RCE
描述:Linux CTF from VulnHub with a focus on enumeration, RCE, steganography, and privilege escalation to nested
URL:https://github.com/malik027/Double-1
标签:#RCE
GitHub
GitHub - malik027/Double-1: Linux CTF from VulnHub with a focus on enumeration, RCE, steganography, and privilege escalation to…
Linux CTF from VulnHub with a focus on enumeration, RCE, steganography, and privilege escalation to nested - malik027/Double-1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53770 Mass Scanner
URL:https://github.com/3a7/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53770 Mass Scanner
URL:https://github.com/3a7/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - 3a7/CVE-2025-53770: CVE-2025-53770 Mass Scanner
CVE-2025-53770 Mass Scanner. Contribute to 3a7/CVE-2025-53770 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/bosombaby/javascript
标签:#代码注入
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/bosombaby/javascript
标签:#代码注入
GitHub
GitHub - bosombaby/javascript: 这个仓库是一个专注于前端面试知识点的宝库,涵盖了各种重要的前端技术主题。无论你是正在准备面试,还是想要巩固和提升你的前端技术水平,这个仓库都将是你的理想选择。 仓库中包含了丰富的场景题,可…
这个仓库是一个专注于前端面试知识点的宝库,涵盖了各种重要的前端技术主题。无论你是正在准备面试,还是想要巩固和提升你的前端技术水平,这个仓库都将是你的理想选择。 仓库中包含了丰富的场景题,可以帮助你理解和掌握实际开发中可能遇到的各种问题和挑战。同时,我们还深入探讨了防抖节流、promise、闭包等高级主题,这些都是前端开发中常常见的技术难点,掌握它们将对你的技术提升有着重要的帮助。 此外,...
GitHub监控消息提醒!!!
更新了:RCE
描述:Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0)
URL:https://github.com/CSpanias/rpc-rce.py
标签:#RCE
更新了:RCE
描述:Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0)
URL:https://github.com/CSpanias/rpc-rce.py
标签:#RCE
GitHub
GitHub - CSpanias/rpc-rce.py: Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0)
Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0) - CSpanias/rpc-rce.py
GitHub监控消息提醒!!!
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/1-hexene/auto-commit
标签:#代码注入
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/1-hexene/auto-commit
标签:#代码注入
GitHub
GitHub - 1-hexene/auto-commit: 你说的对,但是GitHub是由Tom Preston-Werner、Chris Wanstrath、PJ Hyett和Scott Chacon自主研发的一款基于Git的代码托管平台。它发生在…
你说的对,但是GitHub是由Tom Preston-Werner、Chris Wanstrath、PJ Hyett和Scott Chacon自主研发的一款基于Git的代码托管平台。它发生在一个被称作互联网的全球信息网络中,在这里,被注册为GitHub用户的人将被授予创建和管理仓库的权限,导引开源软件和协作开发。你将扮演一位名为your_username的开发者,创建或加入项目,和他们一起编...
GitHub监控消息提醒!!!
更新了:RCE
描述:Authenticated File Upload to RCE via Mimetype Manipulation
URL:https://github.com/Yucaerin/MagicAI
标签:#RCE
更新了:RCE
描述:Authenticated File Upload to RCE via Mimetype Manipulation
URL:https://github.com/Yucaerin/MagicAI
标签:#RCE
GitHub
GitHub - Yucaerin/MagicAI: Authenticated File Upload to RCE via Mimetype Manipulation
Authenticated File Upload to RCE via Mimetype Manipulation - Yucaerin/MagicAI
GitHub监控消息提醒!!!
更新了:RCE
描述:Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL Injection, and XSS
URL:https://github.com/Mihirk23/dvwa-penetration-testing
标签:#RCE
更新了:RCE
描述:Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL Injection, and XSS
URL:https://github.com/Mihirk23/dvwa-penetration-testing
标签:#RCE
GitHub
GitHub - Mihirk23/dvwa-penetration-testing: Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL…
Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL Injection, and XSS - Mihirk23/dvwa-penetration-testing
GitHub监控消息提醒!!!
更新了:RCE
描述: Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC
URL:https://github.com/Shivshantp/CVE-2025-24813
标签:#RCE
更新了:RCE
描述: Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC
URL:https://github.com/Shivshantp/CVE-2025-24813
标签:#RCE
GitHub
GitHub - Shivshantp/CVE-2025-24813: Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC
Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC - Shivshantp/CVE-2025-24813
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE in Amazon Managed Workflows for Apache Airflow (MWAA) service
URL:https://github.com/ricardojoserf/amazon-mwaa-RCE
标签:#RCE
更新了:RCE
描述:RCE in Amazon Managed Workflows for Apache Airflow (MWAA) service
URL:https://github.com/ricardojoserf/amazon-mwaa-RCE
标签:#RCE
GitHub
GitHub - ricardojoserf/amazon-mwaa-RCE: RCE in Amazon Managed Workflows for Apache Airflow (MWAA) service
RCE in Amazon Managed Workflows for Apache Airflow (MWAA) service - ricardojoserf/amazon-mwaa-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🎯 Vulnerability scanner for SharePoint servers affected by CVE-2025-53770. Detects unsafe deserialization using ToolPane.aspx with a crafted base64+gzip payload. 🛡️ Developed by Ahmed Tamer.
URL:https://github.com/0x-crypt/CVE-2025-53770-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:🎯 Vulnerability scanner for SharePoint servers affected by CVE-2025-53770. Detects unsafe deserialization using ToolPane.aspx with a crafted base64+gzip payload. 🛡️ Developed by Ahmed Tamer.
URL:https://github.com/0x-crypt/CVE-2025-53770-Scanner
标签:#CVE-2025
GitHub
GitHub - 0x-crypt/CVE-2025-53770-Scanner: 🎯 Vulnerability scanner for SharePoint servers affected by CVE-2025-53770. Detects unsafe…
🎯 Vulnerability scanner for SharePoint servers affected by CVE-2025-53770. Detects unsafe deserialization using ToolPane.aspx with a crafted base64+gzip payload. 🛡️ Developed by Ahmed Tamer. - 0x-c...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一款图形化的Web漏洞利用工具,用于渗透测试。支持Jeecg-Boot、泛微OA以及强大的Fastjson漏洞利用功能
URL:https://github.com/danran12/-web-exploit-tool
标签:#渗透测试
更新了:渗透测试
描述:一款图形化的Web漏洞利用工具,用于渗透测试。支持Jeecg-Boot、泛微OA以及强大的Fastjson漏洞利用功能
URL:https://github.com/danran12/-web-exploit-tool
标签:#渗透测试
GitHub
GitHub - danran12/-web-exploit-tool: 一款功能强大的桌面化红队信息收集与漏洞利用辅助工具。项目核心围绕“资产发现 → 指纹识别 → 漏洞利用”的实战流程,内置了丰富的信息收集模块和针对常见高危漏洞(如 Fastjson、Log4j2、Spring…
一款功能强大的桌面化红队信息收集与漏洞利用辅助工具。项目核心围绕“资产发现 → 指纹识别 → 漏洞利用”的实战流程,内置了丰富的信息收集模块和针对常见高危漏洞(如 Fastjson、Log4j2、Spring Boot 等)的一键化利用方案。 - danran12/-web-exploit-tool