GitHub监控消息提醒!!!
更新了:CVE-2025
描述:this is a poc for the CVE-2025-24893
URL:https://github.com/AliElKhatteb/CVE-2024-32019-POC
标签:#CVE-2025
更新了:CVE-2025
描述:this is a poc for the CVE-2025-24893
URL:https://github.com/AliElKhatteb/CVE-2024-32019-POC
标签:#CVE-2025
GitHub
GitHub - AliElKhatteb/CVE-2024-32019-POC: this is a poc for the CVE-2025-24893
this is a poc for the CVE-2025-24893. Contribute to AliElKhatteb/CVE-2024-32019-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:スタックオーバーフロー RCE 脆弱性の学習用
URL:https://github.com/kouhei0/vulnerable-webapp
标签:#RCE
更新了:RCE
描述:スタックオーバーフロー RCE 脆弱性の学習用
URL:https://github.com/kouhei0/vulnerable-webapp
标签:#RCE
GitHub
GitHub - kouhei0/vulnerable-webapp: スタックオーバーフロー RCE 脆弱性の学習用
スタックオーバーフロー RCE 脆弱性の学習用. Contribute to kouhei0/vulnerable-webapp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Modified exploit for CVE-2025-24893
URL:https://github.com/hackersonsteroids/cve-2025-24893
标签:#CVE-2025
更新了:CVE-2025
描述:Modified exploit for CVE-2025-24893
URL:https://github.com/hackersonsteroids/cve-2025-24893
标签:#CVE-2025
GitHub
GitHub - hackersonsteroids/cve-2025-24893: Modified exploit for CVE-2025-24893
Modified exploit for CVE-2025-24893. Contribute to hackersonsteroids/cve-2025-24893 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:攻防
描述:我只是餓了,怎麼變成 prompt injection 攻防戰?
URL:https://github.com/April-Aries/AIS3-2025-Project
标签:#攻防
更新了:攻防
描述:我只是餓了,怎麼變成 prompt injection 攻防戰?
URL:https://github.com/April-Aries/AIS3-2025-Project
标签:#攻防
GitHub
GitHub - April-Aries/AIS3-2025-Project: 我只是餓了,怎麼變成 prompt injection 攻防戰?
我只是餓了,怎麼變成 prompt injection 攻防戰?. Contribute to April-Aries/AIS3-2025-Project development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models
URL:https://github.com/Infinit3i/CVE-2025-24893
标签:#CVE-2025
更新了:CVE-2025
描述:A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models
URL:https://github.com/Infinit3i/CVE-2025-24893
标签:#CVE-2025
GitHub
GitHub - Infinit3i/CVE-2025-24893: PoC exploits CVE-2025-24893 , a remote code execution (RCE) vulnerability in XWiki caused by…
PoC exploits CVE-2025-24893 , a remote code execution (RCE) vulnerability in XWiki caused by improper sandboxing in Groovy macros rendered asynchronously. It allows arbitrary command execution thro...
GitHub监控消息提醒!!!
更新了:RCE
描述:A short and sweet simple exploit script for the CVE-2012-2982 Authenticated RCE vulnerability in the /file/show.cgi/bin endpoint.
URL:https://github.com/SincIDK/CVE-2012-2982-Exploit-Script
标签:#RCE
更新了:RCE
描述:A short and sweet simple exploit script for the CVE-2012-2982 Authenticated RCE vulnerability in the /file/show.cgi/bin endpoint.
URL:https://github.com/SincIDK/CVE-2012-2982-Exploit-Script
标签:#RCE
GitHub
GitHub - SincIDK/CVE-2012-2982-Exploit-Script: A short and sweet simple exploit script for the CVE-2012-2982 Authenticated RCE…
A short and sweet simple exploit script for the CVE-2012-2982 Authenticated RCE vulnerability in the /file/show.cgi/bin endpoint. - SincIDK/CVE-2012-2982-Exploit-Script
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-24893: XWiki' Remote Code Execution exploit for versions prior to 15.10.11, 16.4.1 and 16.5.0RC1.
URL:https://github.com/gunzf0x/CVE-2025-24893
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-24893: XWiki' Remote Code Execution exploit for versions prior to 15.10.11, 16.4.1 and 16.5.0RC1.
URL:https://github.com/gunzf0x/CVE-2025-24893
标签:#CVE-2025
GitHub
GitHub - gunzf0x/CVE-2025-24893: PoC for CVE-2025-24893: XWiki' Remote Code Execution exploit for versions prior to 15.10.11, 16.4.1…
PoC for CVE-2025-24893: XWiki' Remote Code Execution exploit for versions prior to 15.10.11, 16.4.1 and 16.5.0RC1. - gunzf0x/CVE-2025-24893
GitHub监控消息提醒!!!
更新了:RCE
描述:A critical Remote Code Execution (RCE) vulnerability (CVE-2025-51820) has been discovered in the Shopping Portal v1.0.
URL:https://github.com/shk-mubashshir/CVE-2025-51820
标签:#RCE
更新了:RCE
描述:A critical Remote Code Execution (RCE) vulnerability (CVE-2025-51820) has been discovered in the Shopping Portal v1.0.
URL:https://github.com/shk-mubashshir/CVE-2025-51820
标签:#RCE
GitHub
GitHub - shk-mubashshir/CVE-2025-51820: A critical Remote Code Execution (RCE) vulnerability (CVE-2025-51820) has been discovered…
A critical Remote Code Execution (RCE) vulnerability (CVE-2025-51820) has been discovered in the Shopping Portal v1.0. - shk-mubashshir/CVE-2025-51820
GitHub监控消息提醒!!!
更新了:漏洞挖掘
描述:漏洞挖掘神器-发现页面隐藏接口、URL批量打开 | Vulnerability Mining Tool - Discover Hidden Interfaces on Pages and Batch Open URLs
URL:https://github.com/n0name-X/LoveJS
标签:#漏洞挖掘
更新了:漏洞挖掘
描述:漏洞挖掘神器-发现页面隐藏接口、URL批量打开 | Vulnerability Mining Tool - Discover Hidden Interfaces on Pages and Batch Open URLs
URL:https://github.com/n0name-X/LoveJS
标签:#漏洞挖掘
GitHub
GitHub - n0name-X/LoveJS: 漏洞挖掘神器 | 浏览器插件 | 发现页面和JS中的隐藏接口和敏感信息、URL批量打开 & Vulnerability Mining Tool | Browser Plugin | Discover Hidden…
漏洞挖掘神器 | 浏览器插件 | 发现页面和JS中的隐藏接口和敏感信息、URL批量打开 & Vulnerability Mining Tool | Browser Plugin | Discover Hidden Interfaces, Sensitive Information in Pages and JS, Open Multiple URLs | Notepad - ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint Server (CVE-2025-53770)
URL:https://github.com/MuhammadWaseem29/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint Server (CVE-2025-53770)
URL:https://github.com/MuhammadWaseem29/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - MuhammadWaseem29/CVE-2025-53770: Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint…
Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint Server (CVE-2025-53770) - MuhammadWaseem29/CVE-2025-53770
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-54424:1Panel 客户端证书绕过RCE漏洞 一体化工具 (扫描+利用)
URL:https://github.com/Mr-xn/CVE-2025-54424
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-54424:1Panel 客户端证书绕过RCE漏洞 一体化工具 (扫描+利用)
URL:https://github.com/Mr-xn/CVE-2025-54424
标签:#CVE-2025
GitHub
GitHub - Mr-xn/CVE-2025-54424: CVE-2025-54424:1Panel 客户端证书绕过RCE漏洞 一体化工具 (扫描+利用)
CVE-2025-54424:1Panel 客户端证书绕过RCE漏洞 一体化工具 (扫描+利用). Contribute to Mr-xn/CVE-2025-54424 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:这是基于c++17写的一个json解析器项目,支持序列化与反序列化。
URL:https://github.com/hcc123231/hcJson
标签:#反序列化
更新了:反序列化
描述:这是基于c++17写的一个json解析器项目,支持序列化与反序列化。
URL:https://github.com/hcc123231/hcJson
标签:#反序列化
GitHub
GitHub - hcc123231/hcJson: 这是基于c++17写的一个json解析器项目,支持序列化与反序列化。
这是基于c++17写的一个json解析器项目,支持序列化与反序列化。. Contribute to hcc123231/hcJson development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Universal Red Teaming Framework for Large Language Models
URL:https://github.com/sam8k/urLLM
标签:#Red Team
更新了:Red Team
描述:Universal Red Teaming Framework for Large Language Models
URL:https://github.com/sam8k/urLLM
标签:#Red Team
GitHub
GitHub - sam8k/urLLM: Universal Red Teaming Framework for Large Language Models
Universal Red Teaming Framework for Large Language Models - sam8k/urLLM
GitHub监控消息提醒!!!
更新了:钓鱼
描述:钓鱼户外平台应用 - React + Vite
URL:https://github.com/TAnderson2718/fishing-1
标签:#钓鱼
更新了:钓鱼
描述:钓鱼户外平台应用 - React + Vite
URL:https://github.com/TAnderson2718/fishing-1
标签:#钓鱼
GitHub
GitHub - TAnderson2718/fishing-1: 钓鱼户外平台应用 - React + Vite
钓鱼户外平台应用 - React + Vite. Contribute to TAnderson2718/fishing-1 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8517: Session Fixation in Vvveb CMS v1.0.6.1
URL:https://github.com/helloandrewpaul/Session-Fixation-in-Vvveb-CMS-v1.0.6.1
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8517: Session Fixation in Vvveb CMS v1.0.6.1
URL:https://github.com/helloandrewpaul/Session-Fixation-in-Vvveb-CMS-v1.0.6.1
标签:#CVE-2025
GitHub
GitHub - helloandrewpaul/Session-Fixation-in-Vvveb-CMS-v1.0.6.1: CVE-2025-8517: Session Fixation in Vvveb CMS v1.0.6.1
CVE-2025-8517: Session Fixation in Vvveb CMS v1.0.6.1 - helloandrewpaul/Session-Fixation-in-Vvveb-CMS-v1.0.6.1
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Bypass40X是一款专业级Web安全测试工具,通过30+种实时混淆技术自动化检测403/401权限校验漏洞。结合动态反检测策略与智能响应过滤,显著提升渗透测试效率。
URL:https://github.com/anansec/Bypass40X
标签:#渗透测试
更新了:渗透测试
描述:Bypass40X是一款专业级Web安全测试工具,通过30+种实时混淆技术自动化检测403/401权限校验漏洞。结合动态反检测策略与智能响应过滤,显著提升渗透测试效率。
URL:https://github.com/anansec/Bypass40X
标签:#渗透测试
GitHub
GitHub - anansec/Bypass40X: Bypass40X是一款专业级Web安全测试工具,通过30+种实时混淆技术自动化检测403/401权限校验漏洞。结合动态反检测策略与智能响应过滤,显著提升渗透测试效率。
Bypass40X是一款专业级Web安全测试工具,通过30+种实时混淆技术自动化检测403/401权限校验漏洞。结合动态反检测策略与智能响应过滤,显著提升渗透测试效率。 - anansec/Bypass40X
GitHub监控消息提醒!!!
更新了:渗透测试
描述:基于大佬Mustard404的Savior系统二开的渗透测试报告辅助系统
URL:https://github.com/ohj-dmw/Savior-2.0
标签:#渗透测试
更新了:渗透测试
描述:基于大佬Mustard404的Savior系统二开的渗透测试报告辅助系统
URL:https://github.com/ohj-dmw/Savior-2.0
标签:#渗透测试
👍1