GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public advisory for CVE-2025-50341 in Axelor
URL:https://github.com/millad7/Axelor-vulnerability-CVE-2025-50341
标签:#CVE-2025
更新了:CVE-2025
描述:Public advisory for CVE-2025-50341 in Axelor
URL:https://github.com/millad7/Axelor-vulnerability-CVE-2025-50341
标签:#CVE-2025
GitHub
GitHub - millad7/Axelor-vulnerability-CVE-2025-50341: Public advisory for CVE-2025-50341 in Axelor
Public advisory for CVE-2025-50341 in Axelor. Contribute to millad7/Axelor-vulnerability-CVE-2025-50341 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Advanced XML External Entity (XXE) Exploitation: File Disclosure, Blind OOB Exfiltration, and Remote Code Execution (RCE) via Misconfigured XML Parsers.
URL:https://github.com/ramyardaneshgar/XML-External-Entity-XXE-Exploitation
标签:#RCE
更新了:RCE
描述:Advanced XML External Entity (XXE) Exploitation: File Disclosure, Blind OOB Exfiltration, and Remote Code Execution (RCE) via Misconfigured XML Parsers.
URL:https://github.com/ramyardaneshgar/XML-External-Entity-XXE-Exploitation
标签:#RCE
GitHub
GitHub - ramyardaneshgar/XML-External-Entity-XXE-Exploitation: Advanced XML External Entity (XXE) Exploitation: File Disclosure…
Advanced XML External Entity (XXE) Exploitation: File Disclosure, Blind OOB Exfiltration, and Remote Code Execution (RCE) via Misconfigured XML Parsers. - ramyardaneshgar/XML-External-Entity-XXE-Ex...
GitHub监控消息提醒!!!
更新了:RCE
描述:SQL Injections - exploitation and mitigation techniques like enumeration, UNION injections, file reading/writing, and RCE for offensive security.
URL:https://github.com/ramyardaneshgar/SQLInjection
标签:#RCE
更新了:RCE
描述:SQL Injections - exploitation and mitigation techniques like enumeration, UNION injections, file reading/writing, and RCE for offensive security.
URL:https://github.com/ramyardaneshgar/SQLInjection
标签:#RCE
GitHub
GitHub - ramyardaneshgar/SQLInjection: SQL Injections - exploitation and mitigation techniques like enumeration, UNION injections…
SQL Injections - exploitation and mitigation techniques like enumeration, UNION injections, file reading/writing, and RCE for offensive security. - ramyardaneshgar/SQLInjection
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Stored XSS in a CMS platform leads to remote code execution (CVE-2025-50754)
URL:https://github.com/furk4nyildiz/CVE-2025-50754-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Stored XSS in a CMS platform leads to remote code execution (CVE-2025-50754)
URL:https://github.com/furk4nyildiz/CVE-2025-50754-PoC
标签:#CVE-2025
GitHub
GitHub - furk4nyildiz/CVE-2025-50754-PoC: Stored XSS in a CMS platform leads to remote code execution (CVE-2025-50754)
Stored XSS in a CMS platform leads to remote code execution (CVE-2025-50754) - furk4nyildiz/CVE-2025-50754-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:a C exploit for CVE-2025-27591, which allow an attacker to escalate privilege to root.
URL:https://github.com/Cythonic1/CVE-2025-27591
标签:#CVE-2025
更新了:CVE-2025
描述:a C exploit for CVE-2025-27591, which allow an attacker to escalate privilege to root.
URL:https://github.com/Cythonic1/CVE-2025-27591
标签:#CVE-2025
GitHub
GitHub - Cythonic1/CVE-2025-27591: a C exploit for CVE-2025-27591, which allow an attacker to escalate privilege to root.
a C exploit for CVE-2025-27591, which allow an attacker to escalate privilege to root. - Cythonic1/CVE-2025-27591
GitHub监控消息提醒!!!
更新了:绕过
描述:通过模拟鼠标和其他技巧,来绕过网站的反机器人检测,从而批量获取数据。 Through simulating mouse movements and other techniques to bypass websites' bot detection systems and scrape data in bulk.
URL:https://github.com/Yanagisawa2002/StimulativeMouseForData
标签:#绕过
更新了:绕过
描述:通过模拟鼠标和其他技巧,来绕过网站的反机器人检测,从而批量获取数据。 Through simulating mouse movements and other techniques to bypass websites' bot detection systems and scrape data in bulk.
URL:https://github.com/Yanagisawa2002/StimulativeMouseForData
标签:#绕过
GitHub
GitHub - Yanagisawa2002/StimulativeMouseForData: 通过模拟鼠标和其他技巧,来绕过网站的反机器人检测,从而批量获取数据。 Through simulating mouse movements and other…
通过模拟鼠标和其他技巧,来绕过网站的反机器人检测,从而批量获取数据。 Through simulating mouse movements and other techniques to bypass websites' bot detection systems and scrape data in bulk. - Yanagisawa2002/StimulativeMo...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Custom aggressor scripts en modules voor Cobalt Strike red team operations.
URL:https://github.com/neosecurity-nl/cobalt-extensions
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Custom aggressor scripts en modules voor Cobalt Strike red team operations.
URL:https://github.com/neosecurity-nl/cobalt-extensions
标签:#Cobalt Strike
GitHub
GitHub - neosecurity-nl/cobalt-extensions: Custom aggressor scripts en modules voor Cobalt Strike red team operations.
Custom aggressor scripts en modules voor Cobalt Strike red team operations. - neosecurity-nl/cobalt-extensions
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:通过训练一个源码与二进制的跨模态对齐模型,来应用于二进制漏洞检测,通过源码与二进制之间的映射,在模型认知层面扩展二进制漏洞数据,缓解传统二进制漏洞检测模型对二进制漏洞数据集的依赖
URL:https://github.com/Binary-Bai/Ali2Vul
标签:#漏洞检测
更新了:漏洞检测
描述:通过训练一个源码与二进制的跨模态对齐模型,来应用于二进制漏洞检测,通过源码与二进制之间的映射,在模型认知层面扩展二进制漏洞数据,缓解传统二进制漏洞检测模型对二进制漏洞数据集的依赖
URL:https://github.com/Binary-Bai/Ali2Vul
标签:#漏洞检测
GitHub
GitHub - Binary-Bai/Ali2Vul: 通过训练一个源码与二进制的跨模态对齐模型,来应用于二进制漏洞检测,通过源码与二进制之间的映射,在模型认知层面扩展二进制漏洞数据,缓解传统二进制漏洞检测模型对二进制漏洞数据集的依赖
通过训练一个源码与二进制的跨模态对齐模型,来应用于二进制漏洞检测,通过源码与二进制之间的映射,在模型认知层面扩展二进制漏洞数据,缓解传统二进制漏洞检测模型对二进制漏洞数据集的依赖 - Binary-Bai/Ali2Vul
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30406 ViewState Exploit PoC
URL:https://github.com/mchklt/CVE-2025-30406
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30406 ViewState Exploit PoC
URL:https://github.com/mchklt/CVE-2025-30406
标签:#CVE-2025
GitHub
GitHub - mchklt/CVE-2025-30406: CVE-2025-30406 ViewState Exploit PoC
CVE-2025-30406 ViewState Exploit PoC. Contribute to mchklt/CVE-2025-30406 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-54589 – a reflected XSS vulnerability in Copyparty ≤ 1.18.6.
URL:https://github.com/byteReaper77/CVE-2025-54589
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-54589 – a reflected XSS vulnerability in Copyparty ≤ 1.18.6.
URL:https://github.com/byteReaper77/CVE-2025-54589
标签:#CVE-2025
GitHub
GitHub - byteReaper77/CVE-2025-54589: PoC for CVE-2025-54589 – a reflected XSS vulnerability in Copyparty ≤ 1.18.6.
PoC for CVE-2025-54589 – a reflected XSS vulnerability in Copyparty ≤ 1.18.6. - byteReaper77/CVE-2025-54589
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit
URL:https://github.com/itstarsec/CVE-2025-48703
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit
URL:https://github.com/itstarsec/CVE-2025-48703
标签:#CVE-2025
GitHub
GitHub - itstarsec/CVE-2025-48703: CVE-2025-48703 là lỗ hổng mức độ nghiêm trọng trong CentOS Web Panel (CWP) cho phép kẻ tấn công…
CVE-2025-48703 là lỗ hổng mức độ nghiêm trọng trong CentOS Web Panel (CWP) cho phép kẻ tấn công không xác thực (unauthenticated) có thể thực thi mã từ xa (RCE) thông qua bỏ qua cơ chế xác thực và t...
GitHub监控消息提醒!!!
更新了:RCE
描述:Dashboard RCE Streamlit
URL:https://github.com/PedroVic12/Repopulation-With-Elite-Set
标签:#RCE
更新了:RCE
描述:Dashboard RCE Streamlit
URL:https://github.com/PedroVic12/Repopulation-With-Elite-Set
标签:#RCE
GitHub
GitHub - PedroVic12/Repopulation-With-Elite-Set: Dashboard RCE Streamlit
Dashboard RCE Streamlit. Contribute to PedroVic12/Repopulation-With-Elite-Set development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:test for CVE-2025-48384
URL:https://github.com/f1shh/CVE-2025-48384
标签:#CVE-2025
更新了:CVE-2025
描述:test for CVE-2025-48384
URL:https://github.com/f1shh/CVE-2025-48384
标签:#CVE-2025
GitHub
GitHub - f1shh/CVE-2025-48384: test for CVE-2025-48384
test for CVE-2025-48384. Contribute to f1shh/CVE-2025-48384 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:changeHeaders是一个功能强大的Burp Suite扩展插件,允许安全专业人员和开发人员轻松修改HTTP请求头。无论您是在进行渗透测试、漏洞赏金 hunting,还是应用程序调试,changeHeaders都能简化跨多个Burp Suite工具的请求头操作过程。
URL:https://github.com/GitHubNull/changeHeaders
标签:#渗透测试
更新了:渗透测试
描述:changeHeaders是一个功能强大的Burp Suite扩展插件,允许安全专业人员和开发人员轻松修改HTTP请求头。无论您是在进行渗透测试、漏洞赏金 hunting,还是应用程序调试,changeHeaders都能简化跨多个Burp Suite工具的请求头操作过程。
URL:https://github.com/GitHubNull/changeHeaders
标签:#渗透测试
GitHub
GitHub - GitHubNull/changeHeaders: changeHeaders是一个功能强大的Burp Suite扩展插件,允许安全专业人员和开发人员轻松修改HTTP请求头。
changeHeaders是一个功能强大的Burp Suite扩展插件,允许安全专业人员和开发人员轻松修改HTTP请求头。 - GitHubNull/changeHeaders
GitHub监控消息提醒!!!
更新了:应急响应
描述:这是一个基于 Jetpack Compose 的 Android 应用,专为安全学习者设计,包含渗透测试、内网渗透、Web 安全、应急响应和权限提升相关的题目,帮助用户学习。
URL:https://github.com/Aining777/MyFirstQuizApp
标签:#应急响应
更新了:应急响应
描述:这是一个基于 Jetpack Compose 的 Android 应用,专为安全学习者设计,包含渗透测试、内网渗透、Web 安全、应急响应和权限提升相关的题目,帮助用户学习。
URL:https://github.com/Aining777/MyFirstQuizApp
标签:#应急响应
GitHub
GitHub - Aining777/MyFirstQuizApp: 这是一个基于 Jetpack Compose 的 Android 应用,专为安全学习者设计,包含渗透测试、内网渗透、Web 安全、应急响应和权限提升相关的题目,帮助用户学习。
这是一个基于 Jetpack Compose 的 Android 应用,专为安全学习者设计,包含渗透测试、内网渗透、Web 安全、应急响应和权限提升相关的题目,帮助用户学习。 - Aining777/MyFirstQuizApp
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure of CVE-2025-46018: A Bluetooth-based payment bypass vulnerability in CSC Pay Mobile App v2.19.4\"
URL:https://github.com/niranjangaire1995/CVE-2025-46018-CSC-Pay-Mobile-App-Payment-Authentication-Bypass
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure of CVE-2025-46018: A Bluetooth-based payment bypass vulnerability in CSC Pay Mobile App v2.19.4\"
URL:https://github.com/niranjangaire1995/CVE-2025-46018-CSC-Pay-Mobile-App-Payment-Authentication-Bypass
标签:#CVE-2025
GitHub
GitHub - niranjangaire1995/CVE-2025-46018-CSC-Pay-Mobile-App-Payment-Authentication-Bypass: Disclosure of CVE-2025-46018: A Bluetooth…
Disclosure of CVE-2025-46018: A Bluetooth-based payment bypass vulnerability in CSC Pay Mobile App v2.19.4" - niranjangaire1995/CVE-2025-46018-CSC-Pay-Mobile-App-Payment-Authentication-Bypass
GitHub监控消息提醒!!!
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/rix4uni/GarudRecon
标签:#RCE
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/rix4uni/GarudRecon
标签:#RCE
GitHub
GitHub - rix4uni/GarudRecon: GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains…
GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & more. - rix4uni/GarudRecon