GitHub监控消息提醒!!!
更新了:漏洞检测
描述:通过训练一个源码与二进制的跨模态对齐模型,来应用于二进制漏洞检测,通过源码与二进制之间的映射,在模型认知层面扩展二进制漏洞数据,缓解传统二进制漏洞检测模型对二进制漏洞数据集的依赖
URL:https://github.com/Binary-Bai/Ali2Vul
标签:#漏洞检测
更新了:漏洞检测
描述:通过训练一个源码与二进制的跨模态对齐模型,来应用于二进制漏洞检测,通过源码与二进制之间的映射,在模型认知层面扩展二进制漏洞数据,缓解传统二进制漏洞检测模型对二进制漏洞数据集的依赖
URL:https://github.com/Binary-Bai/Ali2Vul
标签:#漏洞检测
GitHub
GitHub - Binary-Bai/Ali2Vul: 通过训练一个源码与二进制的跨模态对齐模型,来应用于二进制漏洞检测,通过源码与二进制之间的映射,在模型认知层面扩展二进制漏洞数据,缓解传统二进制漏洞检测模型对二进制漏洞数据集的依赖
通过训练一个源码与二进制的跨模态对齐模型,来应用于二进制漏洞检测,通过源码与二进制之间的映射,在模型认知层面扩展二进制漏洞数据,缓解传统二进制漏洞检测模型对二进制漏洞数据集的依赖 - Binary-Bai/Ali2Vul
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30406 ViewState Exploit PoC
URL:https://github.com/mchklt/CVE-2025-30406
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30406 ViewState Exploit PoC
URL:https://github.com/mchklt/CVE-2025-30406
标签:#CVE-2025
GitHub
GitHub - mchklt/CVE-2025-30406: CVE-2025-30406 ViewState Exploit PoC
CVE-2025-30406 ViewState Exploit PoC. Contribute to mchklt/CVE-2025-30406 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-54589 – a reflected XSS vulnerability in Copyparty ≤ 1.18.6.
URL:https://github.com/byteReaper77/CVE-2025-54589
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-54589 – a reflected XSS vulnerability in Copyparty ≤ 1.18.6.
URL:https://github.com/byteReaper77/CVE-2025-54589
标签:#CVE-2025
GitHub
GitHub - byteReaper77/CVE-2025-54589: PoC for CVE-2025-54589 – a reflected XSS vulnerability in Copyparty ≤ 1.18.6.
PoC for CVE-2025-54589 – a reflected XSS vulnerability in Copyparty ≤ 1.18.6. - byteReaper77/CVE-2025-54589
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit
URL:https://github.com/itstarsec/CVE-2025-48703
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit
URL:https://github.com/itstarsec/CVE-2025-48703
标签:#CVE-2025
GitHub
GitHub - itstarsec/CVE-2025-48703: CVE-2025-48703 là lỗ hổng mức độ nghiêm trọng trong CentOS Web Panel (CWP) cho phép kẻ tấn công…
CVE-2025-48703 là lỗ hổng mức độ nghiêm trọng trong CentOS Web Panel (CWP) cho phép kẻ tấn công không xác thực (unauthenticated) có thể thực thi mã từ xa (RCE) thông qua bỏ qua cơ chế xác thực và t...
GitHub监控消息提醒!!!
更新了:RCE
描述:Dashboard RCE Streamlit
URL:https://github.com/PedroVic12/Repopulation-With-Elite-Set
标签:#RCE
更新了:RCE
描述:Dashboard RCE Streamlit
URL:https://github.com/PedroVic12/Repopulation-With-Elite-Set
标签:#RCE
GitHub
GitHub - PedroVic12/Repopulation-With-Elite-Set: Dashboard RCE Streamlit
Dashboard RCE Streamlit. Contribute to PedroVic12/Repopulation-With-Elite-Set development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:test for CVE-2025-48384
URL:https://github.com/f1shh/CVE-2025-48384
标签:#CVE-2025
更新了:CVE-2025
描述:test for CVE-2025-48384
URL:https://github.com/f1shh/CVE-2025-48384
标签:#CVE-2025
GitHub
GitHub - f1shh/CVE-2025-48384: test for CVE-2025-48384
test for CVE-2025-48384. Contribute to f1shh/CVE-2025-48384 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:changeHeaders是一个功能强大的Burp Suite扩展插件,允许安全专业人员和开发人员轻松修改HTTP请求头。无论您是在进行渗透测试、漏洞赏金 hunting,还是应用程序调试,changeHeaders都能简化跨多个Burp Suite工具的请求头操作过程。
URL:https://github.com/GitHubNull/changeHeaders
标签:#渗透测试
更新了:渗透测试
描述:changeHeaders是一个功能强大的Burp Suite扩展插件,允许安全专业人员和开发人员轻松修改HTTP请求头。无论您是在进行渗透测试、漏洞赏金 hunting,还是应用程序调试,changeHeaders都能简化跨多个Burp Suite工具的请求头操作过程。
URL:https://github.com/GitHubNull/changeHeaders
标签:#渗透测试
GitHub
GitHub - GitHubNull/changeHeaders: changeHeaders是一个功能强大的Burp Suite扩展插件,允许安全专业人员和开发人员轻松修改HTTP请求头。
changeHeaders是一个功能强大的Burp Suite扩展插件,允许安全专业人员和开发人员轻松修改HTTP请求头。 - GitHubNull/changeHeaders
GitHub监控消息提醒!!!
更新了:应急响应
描述:这是一个基于 Jetpack Compose 的 Android 应用,专为安全学习者设计,包含渗透测试、内网渗透、Web 安全、应急响应和权限提升相关的题目,帮助用户学习。
URL:https://github.com/Aining777/MyFirstQuizApp
标签:#应急响应
更新了:应急响应
描述:这是一个基于 Jetpack Compose 的 Android 应用,专为安全学习者设计,包含渗透测试、内网渗透、Web 安全、应急响应和权限提升相关的题目,帮助用户学习。
URL:https://github.com/Aining777/MyFirstQuizApp
标签:#应急响应
GitHub
GitHub - Aining777/MyFirstQuizApp: 这是一个基于 Jetpack Compose 的 Android 应用,专为安全学习者设计,包含渗透测试、内网渗透、Web 安全、应急响应和权限提升相关的题目,帮助用户学习。
这是一个基于 Jetpack Compose 的 Android 应用,专为安全学习者设计,包含渗透测试、内网渗透、Web 安全、应急响应和权限提升相关的题目,帮助用户学习。 - Aining777/MyFirstQuizApp
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure of CVE-2025-46018: A Bluetooth-based payment bypass vulnerability in CSC Pay Mobile App v2.19.4\"
URL:https://github.com/niranjangaire1995/CVE-2025-46018-CSC-Pay-Mobile-App-Payment-Authentication-Bypass
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure of CVE-2025-46018: A Bluetooth-based payment bypass vulnerability in CSC Pay Mobile App v2.19.4\"
URL:https://github.com/niranjangaire1995/CVE-2025-46018-CSC-Pay-Mobile-App-Payment-Authentication-Bypass
标签:#CVE-2025
GitHub
GitHub - niranjangaire1995/CVE-2025-46018-CSC-Pay-Mobile-App-Payment-Authentication-Bypass: Disclosure of CVE-2025-46018: A Bluetooth…
Disclosure of CVE-2025-46018: A Bluetooth-based payment bypass vulnerability in CSC Pay Mobile App v2.19.4" - niranjangaire1995/CVE-2025-46018-CSC-Pay-Mobile-App-Payment-Authentication-Bypass
GitHub监控消息提醒!!!
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/rix4uni/GarudRecon
标签:#RCE
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/rix4uni/GarudRecon
标签:#RCE
GitHub
GitHub - rix4uni/GarudRecon: GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains…
GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & more. - rix4uni/GarudRecon
GitHub监控消息提醒!!!
更新了:RCE
描述:A demonstration of the RCE vulnerability in the @nestjs/devtools-integration
URL:https://github.com/JLLeitschuh/nestjs-devtools-integration-rce-poc
标签:#RCE
更新了:RCE
描述:A demonstration of the RCE vulnerability in the @nestjs/devtools-integration
URL:https://github.com/JLLeitschuh/nestjs-devtools-integration-rce-poc
标签:#RCE
GitHub
GitHub - JLLeitschuh/nestjs-devtools-integration-rce-poc: A demonstration of the RCE vulnerability in the @nestjs/devtools-integration
A demonstration of the RCE vulnerability in the @nestjs/devtools-integration - JLLeitschuh/nestjs-devtools-integration-rce-poc
GitHub监控消息提醒!!!
更新了:sql注入
描述:CN:基于我个人的服务器设定的黑名单ip网段,包括ssh、邮件、sql注入
URL:https://github.com/holywd/blacklist-iproute
标签:#sql注入
更新了:sql注入
描述:CN:基于我个人的服务器设定的黑名单ip网段,包括ssh、邮件、sql注入
URL:https://github.com/holywd/blacklist-iproute
标签:#sql注入
GitHub
GitHub - holywd/blacklist-iproute: CN:基于我个人的服务器设定的黑名单ip网段,包括ssh、邮件、sql注入
CN:基于我个人的服务器设定的黑名单ip网段,包括ssh、邮件、sql注入. Contribute to holywd/blacklist-iproute development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:在利用pdf进行xss攻击时会有waf拦截,因为alert()函数属于危险函数,此项目使用response()函数弹窗能绕过一些waf进行上传pdf
URL:https://github.com/SunDay2t/XSS-PDF
标签:#绕过
更新了:绕过
描述:在利用pdf进行xss攻击时会有waf拦截,因为alert()函数属于危险函数,此项目使用response()函数弹窗能绕过一些waf进行上传pdf
URL:https://github.com/SunDay2t/XSS-PDF
标签:#绕过
GitHub
GitHub - SunDay2t/XSS-PDF: 在利用pdf进行xss攻击时会有waf拦截,因为alert()函数属于危险函数,此项目使用response()函数弹窗能绕过一些waf进行上传pdf
在利用pdf进行xss攻击时会有waf拦截,因为alert()函数属于危险函数,此项目使用response()函数弹窗能绕过一些waf进行上传pdf - SunDay2t/XSS-PDF
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:一个简单的数据库漏洞扫描系统,漏洞来源主要是cnvd、cve、阿里云
URL:https://github.com/zwang0621/shixi-proj
标签:#漏洞扫描
更新了:漏洞扫描
描述:一个简单的数据库漏洞扫描系统,漏洞来源主要是cnvd、cve、阿里云
URL:https://github.com/zwang0621/shixi-proj
标签:#漏洞扫描
GitHub
GitHub - zwang0621/shixi-proj: 一个简单的数据库漏洞扫描系统,漏洞来源主要是cnvd、cve、阿里云
一个简单的数据库漏洞扫描系统,漏洞来源主要是cnvd、cve、阿里云. Contribute to zwang0621/shixi-proj development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-41373 Authenticated SQL Injection in Gandia Integra Total v2.1.2217.3–4.4.2236.1
URL:https://github.com/byteReaper77/CVE-2025-41373
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-41373 Authenticated SQL Injection in Gandia Integra Total v2.1.2217.3–4.4.2236.1
URL:https://github.com/byteReaper77/CVE-2025-41373
标签:#CVE-2025
GitHub
GitHub - byteReaper77/CVE-2025-41373: PoC for CVE-2025-41373 Authenticated SQL Injection in Gandia Integra Total v2.1.2217.3–4.4.2236.1
PoC for CVE-2025-41373 Authenticated SQL Injection in Gandia Integra Total v2.1.2217.3–4.4.2236.1 - GitHub - byteReaper77/CVE-2025-41373: PoC for CVE-2025-41373 Authenticated SQL Injection in G...
GitHub监控消息提醒!!!
更新了:RCE
描述:A project that tries to document every potential path from any web app to RCE
URL:https://github.com/AnvithLobo/WEB2RCE
标签:#RCE
更新了:RCE
描述:A project that tries to document every potential path from any web app to RCE
URL:https://github.com/AnvithLobo/WEB2RCE
标签:#RCE
GitHub
GitHub - AnvithLobo/WEB2RCE: A project that tries to document every potential path from any web app to RCE
A project that tries to document every potential path from any web app to RCE - AnvithLobo/WEB2RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
URL:https://github.com/cyberpoul/CVE-Alert-Bot
标签:#RCE
更新了:RCE
描述:TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
URL:https://github.com/cyberpoul/CVE-Alert-Bot
标签:#RCE