GitHub监控消息提醒!!!
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/bosombaby/javascript
标签:#代码注入
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/bosombaby/javascript
标签:#代码注入
GitHub
GitHub - bosombaby/javascript: 这个仓库是一个专注于前端面试知识点的宝库,涵盖了各种重要的前端技术主题。无论你是正在准备面试,还是想要巩固和提升你的前端技术水平,这个仓库都将是你的理想选择。 仓库中包含了丰富的场景题,可…
这个仓库是一个专注于前端面试知识点的宝库,涵盖了各种重要的前端技术主题。无论你是正在准备面试,还是想要巩固和提升你的前端技术水平,这个仓库都将是你的理想选择。 仓库中包含了丰富的场景题,可以帮助你理解和掌握实际开发中可能遇到的各种问题和挑战。同时,我们还深入探讨了防抖节流、promise、闭包等高级主题,这些都是前端开发中常常见的技术难点,掌握它们将对你的技术提升有着重要的帮助。 此外,...
GitHub监控消息提醒!!!
更新了:RCE
描述:Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0)
URL:https://github.com/CSpanias/rpc-rce.py
标签:#RCE
更新了:RCE
描述:Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0)
URL:https://github.com/CSpanias/rpc-rce.py
标签:#RCE
GitHub
GitHub - CSpanias/rpc-rce.py: Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0)
Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0) - CSpanias/rpc-rce.py
GitHub监控消息提醒!!!
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/1-hexene/auto-commit
标签:#代码注入
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/1-hexene/auto-commit
标签:#代码注入
GitHub
GitHub - 1-hexene/auto-commit: 你说的对,但是GitHub是由Tom Preston-Werner、Chris Wanstrath、PJ Hyett和Scott Chacon自主研发的一款基于Git的代码托管平台。它发生在…
你说的对,但是GitHub是由Tom Preston-Werner、Chris Wanstrath、PJ Hyett和Scott Chacon自主研发的一款基于Git的代码托管平台。它发生在一个被称作互联网的全球信息网络中,在这里,被注册为GitHub用户的人将被授予创建和管理仓库的权限,导引开源软件和协作开发。你将扮演一位名为your_username的开发者,创建或加入项目,和他们一起编...
GitHub监控消息提醒!!!
更新了:RCE
描述:Authenticated File Upload to RCE via Mimetype Manipulation
URL:https://github.com/Yucaerin/MagicAI
标签:#RCE
更新了:RCE
描述:Authenticated File Upload to RCE via Mimetype Manipulation
URL:https://github.com/Yucaerin/MagicAI
标签:#RCE
GitHub
GitHub - Yucaerin/MagicAI: Authenticated File Upload to RCE via Mimetype Manipulation
Authenticated File Upload to RCE via Mimetype Manipulation - Yucaerin/MagicAI
GitHub监控消息提醒!!!
更新了:RCE
描述:Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL Injection, and XSS
URL:https://github.com/Mihirk23/dvwa-penetration-testing
标签:#RCE
更新了:RCE
描述:Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL Injection, and XSS
URL:https://github.com/Mihirk23/dvwa-penetration-testing
标签:#RCE
GitHub
GitHub - Mihirk23/dvwa-penetration-testing: Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL…
Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL Injection, and XSS - Mihirk23/dvwa-penetration-testing
GitHub监控消息提醒!!!
更新了:RCE
描述: Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC
URL:https://github.com/Shivshantp/CVE-2025-24813
标签:#RCE
更新了:RCE
描述: Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC
URL:https://github.com/Shivshantp/CVE-2025-24813
标签:#RCE
GitHub
GitHub - Shivshantp/CVE-2025-24813: Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC
Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC - Shivshantp/CVE-2025-24813
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE in Amazon Managed Workflows for Apache Airflow (MWAA) service
URL:https://github.com/ricardojoserf/amazon-mwaa-RCE
标签:#RCE
更新了:RCE
描述:RCE in Amazon Managed Workflows for Apache Airflow (MWAA) service
URL:https://github.com/ricardojoserf/amazon-mwaa-RCE
标签:#RCE
GitHub
GitHub - ricardojoserf/amazon-mwaa-RCE: RCE in Amazon Managed Workflows for Apache Airflow (MWAA) service
RCE in Amazon Managed Workflows for Apache Airflow (MWAA) service - ricardojoserf/amazon-mwaa-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🎯 Vulnerability scanner for SharePoint servers affected by CVE-2025-53770. Detects unsafe deserialization using ToolPane.aspx with a crafted base64+gzip payload. 🛡️ Developed by Ahmed Tamer.
URL:https://github.com/0x-crypt/CVE-2025-53770-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:🎯 Vulnerability scanner for SharePoint servers affected by CVE-2025-53770. Detects unsafe deserialization using ToolPane.aspx with a crafted base64+gzip payload. 🛡️ Developed by Ahmed Tamer.
URL:https://github.com/0x-crypt/CVE-2025-53770-Scanner
标签:#CVE-2025
GitHub
GitHub - 0x-crypt/CVE-2025-53770-Scanner: 🎯 Vulnerability scanner for SharePoint servers affected by CVE-2025-53770. Detects unsafe…
🎯 Vulnerability scanner for SharePoint servers affected by CVE-2025-53770. Detects unsafe deserialization using ToolPane.aspx with a crafted base64+gzip payload. 🛡️ Developed by Ahmed Tamer. - 0x-c...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一款图形化的Web漏洞利用工具,用于渗透测试。支持Jeecg-Boot、泛微OA以及强大的Fastjson漏洞利用功能
URL:https://github.com/danran12/-web-exploit-tool
标签:#渗透测试
更新了:渗透测试
描述:一款图形化的Web漏洞利用工具,用于渗透测试。支持Jeecg-Boot、泛微OA以及强大的Fastjson漏洞利用功能
URL:https://github.com/danran12/-web-exploit-tool
标签:#渗透测试
GitHub
GitHub - danran12/-web-exploit-tool: 一款功能强大的桌面化红队信息收集与漏洞利用辅助工具。项目核心围绕“资产发现 → 指纹识别 → 漏洞利用”的实战流程,内置了丰富的信息收集模块和针对常见高危漏洞(如 Fastjson、Log4j2、Spring…
一款功能强大的桌面化红队信息收集与漏洞利用辅助工具。项目核心围绕“资产发现 → 指纹识别 → 漏洞利用”的实战流程,内置了丰富的信息收集模块和针对常见高危漏洞(如 Fastjson、Log4j2、Spring Boot 等)的一键化利用方案。 - danran12/-web-exploit-tool
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains a proof-of-concept (PoC) for exploiting the OpenSSH ProxyCommand vulnerability — CVE-2025-51385 — affecting OpenSSH servers <9.6 Version
URL:https://github.com/saarcastified/CVE-2023-51385---OpenSSH-ProxyCommand-Injection-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains a proof-of-concept (PoC) for exploiting the OpenSSH ProxyCommand vulnerability — CVE-2025-51385 — affecting OpenSSH servers <9.6 Version
URL:https://github.com/saarcastified/CVE-2023-51385---OpenSSH-ProxyCommand-Injection-PoC
标签:#CVE-2025
GitHub
GitHub - saarcastified/CVE-2023-51385---OpenSSH-ProxyCommand-Injection-PoC: This repository contains a proof-of-concept (PoC) for…
This repository contains a proof-of-concept (PoC) for exploiting the OpenSSH ProxyCommand vulnerability — CVE-2025-51385 — affecting OpenSSH servers <9.6 Version - saarcastified/CVE-2023-513...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit
URL:https://github.com/KaiHT-Ladiant/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit
URL:https://github.com/KaiHT-Ladiant/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - KaiHT-Ladiant/CVE-2025-32463: CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit
CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit - KaiHT-Ladiant/CVE-2025-32463
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-47227
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-47227
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-47227
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-47227
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-47227: CVE-2025-47227
CVE-2025-47227. Contribute to B1ack4sh/Blackash-CVE-2025-47227 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Dependency Confusion to RCE POC
URL:https://github.com/Hun33er/NPM-RCE
标签:#RCE
更新了:RCE
描述:Dependency Confusion to RCE POC
URL:https://github.com/Hun33er/NPM-RCE
标签:#RCE
GitHub
GitHub - Hun33er/NPM-RCE: Dependency Confusion to RCE POC
Dependency Confusion to RCE POC. Contribute to Hun33er/NPM-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-54352 PoC
URL:https://github.com/yohannslm/CVE-2025-54352
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-54352 PoC
URL:https://github.com/yohannslm/CVE-2025-54352
标签:#CVE-2025
GitHub
GitHub - yohannslm/CVE-2025-54352: CVE-2025-54352 PoC
CVE-2025-54352 PoC. Contribute to yohannslm/CVE-2025-54352 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:→ poc for CVE-2025-29927
URL:https://github.com/b4sh0xf/PoC-CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:→ poc for CVE-2025-29927
URL:https://github.com/b4sh0xf/PoC-CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - b4sh0xf/PoC-CVE-2025-29927: → poc for CVE-2025-29927
→ poc for CVE-2025-29927. Contribute to b4sh0xf/PoC-CVE-2025-29927 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Explore Crystal Loaders, a collection of PIC loaders for Cobalt Strike. Enhance your toolkit with easy setup and integration. 🌟🔧
URL:https://github.com/Akshaysagar31/Crystal-Loaders
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Explore Crystal Loaders, a collection of PIC loaders for Cobalt Strike. Enhance your toolkit with easy setup and integration. 🌟🔧
URL:https://github.com/Akshaysagar31/Crystal-Loaders
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:Red Team
描述:lab environment designed for Purple Team operations, including tools, scripts, and documentation for Blue Team and Red Team cybersecurity exercises, threat detection, and adversary emulation.
URL:https://github.com/DiegoPretelt/Purple-Team-Home-Lab
标签:#Red Team
更新了:Red Team
描述:lab environment designed for Purple Team operations, including tools, scripts, and documentation for Blue Team and Red Team cybersecurity exercises, threat detection, and adversary emulation.
URL:https://github.com/DiegoPretelt/Purple-Team-Home-Lab
标签:#Red Team
GitHub
GitHub - DiegoPretelt/Purple-Team-Home-Lab: lab environment designed for Purple Team operations, including tools, scripts, and…
lab environment designed for Purple Team operations, including tools, scripts, and documentation for Blue Team and Red Team cybersecurity exercises, threat detection, and adversary emulation. - Die...
GitHub监控消息提醒!!!
更新了:横向移动
描述:WindowsAD环境下使用GPO进行横向移动
URL:https://github.com/wqreytuk/AD_GPO_EXEC
标签:#横向移动
更新了:横向移动
描述:WindowsAD环境下使用GPO进行横向移动
URL:https://github.com/wqreytuk/AD_GPO_EXEC
标签:#横向移动
GitHub
GitHub - wqreytuk/AD_GPO_EXEC: WindowsAD环境下使用GPO进行横向移动
WindowsAD环境下使用GPO进行横向移动. Contribute to wqreytuk/AD_GPO_EXEC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:攻防
描述::atom: [WIP] 整理过去的分享,从零开始的Kubernetes攻防 🧐
URL:https://github.com/neargle/re0-kubernetes-sec-archive
标签:#攻防
更新了:攻防
描述::atom: [WIP] 整理过去的分享,从零开始的Kubernetes攻防 🧐
URL:https://github.com/neargle/re0-kubernetes-sec-archive
标签:#攻防
GitHub
GitHub - neargle/re0-kubernetes-sec-archive: :atom: [WIP] 整理过去我和K8s、容器、虚拟化相关的分享 🧐
:atom: [WIP] 整理过去我和K8s、容器、虚拟化相关的分享 🧐. Contribute to neargle/re0-kubernetes-sec-archive development by creating an account on GitHub.