GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2017-XXXX-Audacious-3.8-3.9-AAC-Stack-Overflow-RCE
URL:https://github.com/hdbreaker/Audacious-3.8-3.9-AAC-Stack-Overflow-RCE
标签:#RCE
更新了:RCE
描述:CVE-2017-XXXX-Audacious-3.8-3.9-AAC-Stack-Overflow-RCE
URL:https://github.com/hdbreaker/Audacious-3.8-3.9-AAC-Stack-Overflow-RCE
标签:#RCE
GitHub
GitHub - hdbreaker/Audacious-3.8-3.9-AAC-Stack-Overflow-RCE: CVE-2017-XXXX-Audacious-3.8-3.9-AAC-Stack-Overflow-RCE
CVE-2017-XXXX-Audacious-3.8-3.9-AAC-Stack-Overflow-RCE - hdbreaker/Audacious-3.8-3.9-AAC-Stack-Overflow-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50472
URL:https://github.com/xhjy2020/CVE-2025-50472
标签:#CVE-2025
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50472
URL:https://github.com/xhjy2020/CVE-2025-50472
标签:#CVE-2025
GitHub
GitHub - xhjy2020/CVE-2025-50472: Technical Details and Exploit for CVE-2025-50472
Technical Details and Exploit for CVE-2025-50472. Contribute to xhjy2020/CVE-2025-50472 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50460
URL:https://github.com/Anchor0221/CVE-2025-50460
标签:#CVE-2025
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50460
URL:https://github.com/Anchor0221/CVE-2025-50460
标签:#CVE-2025
GitHub
GitHub - Anchor0221/CVE-2025-50460: Technical Details and Exploit for CVE-2025-50460
Technical Details and Exploit for CVE-2025-50460. Contribute to Anchor0221/CVE-2025-50460 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Toolkits and setup scripts for the Latin America Cybersecurity Challenge CTF. Includes reversing and web exploitation environments for SQLi, XSS, SSTI, RCE, and binary analysis.
URL:https://github.com/Jagf0511/cyber-ctf-toolkit
标签:#RCE
更新了:RCE
描述:Toolkits and setup scripts for the Latin America Cybersecurity Challenge CTF. Includes reversing and web exploitation environments for SQLi, XSS, SSTI, RCE, and binary analysis.
URL:https://github.com/Jagf0511/cyber-ctf-toolkit
标签:#RCE
GitHub
GitHub - jagfxx/cyber-ctf-toolkit: Toolkits and setup scripts for the Latin America Cybersecurity Challenge CTF. Includes reversing…
Toolkits and setup scripts for the Latin America Cybersecurity Challenge CTF. Includes reversing and web exploitation environments for SQLi, XSS, SSTI, RCE, and binary analysis. - jagfxx/cyber-ctf-...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:EDNS Client Subnet (ECS) Remote Detection Tool - CVE-2025-40766
URL:https://github.com/FurkanKAYAPINAR/ecs_checker
标签:#CVE-2025
更新了:CVE-2025
描述:EDNS Client Subnet (ECS) Remote Detection Tool - CVE-2025-40766
URL:https://github.com/FurkanKAYAPINAR/ecs_checker
标签:#CVE-2025
GitHub
GitHub - FurkanKAYAPINAR/ecs_checker: EDNS Client Subnet (ECS) Remote Detection Tool - CVE-2025-40766
EDNS Client Subnet (ECS) Remote Detection Tool - CVE-2025-40766 - FurkanKAYAPINAR/ecs_checker
GitHub监控消息提醒!!!
更新了:渗透测试
描述:ShadowShell 是一个高度模块化的Shell生成器,专为渗透测试和安全研究设计。该工具提供了加密的反向Shell客户端生成功能,具有高级混淆和反检测特性。
URL:https://github.com/sysfox/ShadowShell
标签:#渗透测试
更新了:渗透测试
描述:ShadowShell 是一个高度模块化的Shell生成器,专为渗透测试和安全研究设计。该工具提供了加密的反向Shell客户端生成功能,具有高级混淆和反检测特性。
URL:https://github.com/sysfox/ShadowShell
标签:#渗透测试
GitHub
GitHub - sysfox/ShadowShell: ShadowShell 是一个高度模块化的Shell生成器,专为渗透测试和安全研究设计。该工具提供了加密的反向Shell客户端生成功能,具有高级混淆和反检测特性。
ShadowShell 是一个高度模块化的Shell生成器,专为渗透测试和安全研究设计。该工具提供了加密的反向Shell客户端生成功能,具有高级混淆和反检测特性。 - sysfox/ShadowShell
GitHub监控消息提醒!!!
更新了:信息收集
描述:Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。
URL:https://github.com/Hyperia-CN/Recoin
标签:#信息收集
更新了:信息收集
描述:Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。
URL:https://github.com/Hyperia-CN/Recoin
标签:#信息收集
GitHub
GitHub - 0xHyperia/Recoin: Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。
Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。 - 0xHyperia/Recoin
GitHub监控消息提醒!!!
更新了:信息收集
描述:Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。
URL:https://github.com/0xHyperia/Recoin
标签:#信息收集
更新了:信息收集
描述:Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。
URL:https://github.com/0xHyperia/Recoin
标签:#信息收集
GitHub
GitHub - 0xHyperia/Recoin: Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。
Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。 - 0xHyperia/Recoin
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE PoC for Tensorflow using a malicious Lambda layer
URL:https://github.com/Splinter0/tensorflow-rce
标签:#RCE
更新了:RCE
描述:RCE PoC for Tensorflow using a malicious Lambda layer
URL:https://github.com/Splinter0/tensorflow-rce
标签:#RCE
GitHub
GitHub - Splinter0/tensorflow-rce: RCE PoC for Tensorflow using a malicious Lambda layer
RCE PoC for Tensorflow using a malicious Lambda layer - Splinter0/tensorflow-rce
GitHub监控消息提醒!!!
更新了:护网
描述:客家文化展示与遗产保护网站(Hakka Culture Archive)
URL:https://github.com/YF1190124114/THEHakkas
标签:#护网
更新了:护网
描述:客家文化展示与遗产保护网站(Hakka Culture Archive)
URL:https://github.com/YF1190124114/THEHakkas
标签:#护网
GitHub
GitHub - YF1190124114/THEHakkas: 客家文化展示与遗产保护网站(Hakka Culture Archive)
客家文化展示与遗产保护网站(Hakka Culture Archive). Contribute to YF1190124114/THEHakkas development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。
URL:https://github.com/y4ney/CVE-2025-32463-lab
标签:#CVE-2025
更新了:CVE-2025
描述:本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。
URL:https://github.com/y4ney/CVE-2025-32463-lab
标签:#CVE-2025
GitHub
GitHub - y4ney/CVE-2025-32463-lab: 本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。
本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。 - y4ney/CVE-2025-32463-lab
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit scripts for CVE-2025-27581
URL:https://github.com/Henryisnotavailable/CVE-2025-27581
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit scripts for CVE-2025-27581
URL:https://github.com/Henryisnotavailable/CVE-2025-27581
标签:#CVE-2025
GitHub
GitHub - Henryisnotavailable/CVE-2025-27581: Exploit scripts for CVE-2025-27581
Exploit scripts for CVE-2025-27581. Contribute to Henryisnotavailable/CVE-2025-27581 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-6018
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-6018
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-6018
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-6018
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-6018: CVE-2025-6018
CVE-2025-6018. Contribute to Ashwesker/Blackash-CVE-2025-6018 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike UDRL for memory scanner evasion.
URL:https://github.com/frknaykc/Dragon-ThreatResearchHQ
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike UDRL for memory scanner evasion.
URL:https://github.com/frknaykc/Dragon-ThreatResearchHQ
标签:#Cobalt Strike
GitHub
GitHub - frknaykc/Dragon-ThreatResearchHQ: A comprehensive repository for malware analysis and threat intelligence, including Cobalt…
A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs, Suricata rules, and malware samples to support cybersecurit...
GitHub监控消息提醒!!!
更新了:红队
描述:使用cursor开发的基于任务驱动的全自动化红队打点和扫描工具,也可用于企业安全风险自查。
URL:https://github.com/handbye/Tscan
标签:#红队
更新了:红队
描述:使用cursor开发的基于任务驱动的全自动化红队打点和扫描工具,也可用于企业安全风险自查。
URL:https://github.com/handbye/Tscan
标签:#红队
GitHub
GitHub - handbye/Tscan: 使用cursor开发的基于任务驱动的全自动化红队打点和扫描工具,也可用于企业安全风险自查。
使用cursor开发的基于任务驱动的全自动化红队打点和扫描工具,也可用于企业安全风险自查。. Contribute to handbye/Tscan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public advisory for CVE-2025-50341 in Axelor
URL:https://github.com/millad7/Axelor-vulnerability-CVE-2025-50341
标签:#CVE-2025
更新了:CVE-2025
描述:Public advisory for CVE-2025-50341 in Axelor
URL:https://github.com/millad7/Axelor-vulnerability-CVE-2025-50341
标签:#CVE-2025
GitHub
GitHub - millad7/Axelor-vulnerability-CVE-2025-50341: Public advisory for CVE-2025-50341 in Axelor
Public advisory for CVE-2025-50341 in Axelor. Contribute to millad7/Axelor-vulnerability-CVE-2025-50341 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Advanced XML External Entity (XXE) Exploitation: File Disclosure, Blind OOB Exfiltration, and Remote Code Execution (RCE) via Misconfigured XML Parsers.
URL:https://github.com/ramyardaneshgar/XML-External-Entity-XXE-Exploitation
标签:#RCE
更新了:RCE
描述:Advanced XML External Entity (XXE) Exploitation: File Disclosure, Blind OOB Exfiltration, and Remote Code Execution (RCE) via Misconfigured XML Parsers.
URL:https://github.com/ramyardaneshgar/XML-External-Entity-XXE-Exploitation
标签:#RCE
GitHub
GitHub - ramyardaneshgar/XML-External-Entity-XXE-Exploitation: Advanced XML External Entity (XXE) Exploitation: File Disclosure…
Advanced XML External Entity (XXE) Exploitation: File Disclosure, Blind OOB Exfiltration, and Remote Code Execution (RCE) via Misconfigured XML Parsers. - ramyardaneshgar/XML-External-Entity-XXE-Ex...
GitHub监控消息提醒!!!
更新了:RCE
描述:SQL Injections - exploitation and mitigation techniques like enumeration, UNION injections, file reading/writing, and RCE for offensive security.
URL:https://github.com/ramyardaneshgar/SQLInjection
标签:#RCE
更新了:RCE
描述:SQL Injections - exploitation and mitigation techniques like enumeration, UNION injections, file reading/writing, and RCE for offensive security.
URL:https://github.com/ramyardaneshgar/SQLInjection
标签:#RCE
GitHub
GitHub - ramyardaneshgar/SQLInjection: SQL Injections - exploitation and mitigation techniques like enumeration, UNION injections…
SQL Injections - exploitation and mitigation techniques like enumeration, UNION injections, file reading/writing, and RCE for offensive security. - ramyardaneshgar/SQLInjection
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Stored XSS in a CMS platform leads to remote code execution (CVE-2025-50754)
URL:https://github.com/furk4nyildiz/CVE-2025-50754-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Stored XSS in a CMS platform leads to remote code execution (CVE-2025-50754)
URL:https://github.com/furk4nyildiz/CVE-2025-50754-PoC
标签:#CVE-2025
GitHub
GitHub - furk4nyildiz/CVE-2025-50754-PoC: Stored XSS in a CMS platform leads to remote code execution (CVE-2025-50754)
Stored XSS in a CMS platform leads to remote code execution (CVE-2025-50754) - furk4nyildiz/CVE-2025-50754-PoC