GitHub监控消息提醒!!!
更新了:攻防
描述:我只是餓了,怎麼變成 prompt injection 攻防戰?
URL:https://github.com/April-Aries/AIS3-2025-Project
标签:#攻防
更新了:攻防
描述:我只是餓了,怎麼變成 prompt injection 攻防戰?
URL:https://github.com/April-Aries/AIS3-2025-Project
标签:#攻防
GitHub
GitHub - April-Aries/AIS3-2025-Project: 我只是餓了,怎麼變成 prompt injection 攻防戰?
我只是餓了,怎麼變成 prompt injection 攻防戰?. Contribute to April-Aries/AIS3-2025-Project development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models
URL:https://github.com/Infinit3i/CVE-2025-24893
标签:#CVE-2025
更新了:CVE-2025
描述:A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models
URL:https://github.com/Infinit3i/CVE-2025-24893
标签:#CVE-2025
GitHub
GitHub - Infinit3i/CVE-2025-24893: PoC exploits CVE-2025-24893 , a remote code execution (RCE) vulnerability in XWiki caused by…
PoC exploits CVE-2025-24893 , a remote code execution (RCE) vulnerability in XWiki caused by improper sandboxing in Groovy macros rendered asynchronously. It allows arbitrary command execution thro...
GitHub监控消息提醒!!!
更新了:RCE
描述:A short and sweet simple exploit script for the CVE-2012-2982 Authenticated RCE vulnerability in the /file/show.cgi/bin endpoint.
URL:https://github.com/SincIDK/CVE-2012-2982-Exploit-Script
标签:#RCE
更新了:RCE
描述:A short and sweet simple exploit script for the CVE-2012-2982 Authenticated RCE vulnerability in the /file/show.cgi/bin endpoint.
URL:https://github.com/SincIDK/CVE-2012-2982-Exploit-Script
标签:#RCE
GitHub
GitHub - SincIDK/CVE-2012-2982-Exploit-Script: A short and sweet simple exploit script for the CVE-2012-2982 Authenticated RCE…
A short and sweet simple exploit script for the CVE-2012-2982 Authenticated RCE vulnerability in the /file/show.cgi/bin endpoint. - SincIDK/CVE-2012-2982-Exploit-Script
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-24893: XWiki' Remote Code Execution exploit for versions prior to 15.10.11, 16.4.1 and 16.5.0RC1.
URL:https://github.com/gunzf0x/CVE-2025-24893
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-24893: XWiki' Remote Code Execution exploit for versions prior to 15.10.11, 16.4.1 and 16.5.0RC1.
URL:https://github.com/gunzf0x/CVE-2025-24893
标签:#CVE-2025
GitHub
GitHub - gunzf0x/CVE-2025-24893: PoC for CVE-2025-24893: XWiki' Remote Code Execution exploit for versions prior to 15.10.11, 16.4.1…
PoC for CVE-2025-24893: XWiki' Remote Code Execution exploit for versions prior to 15.10.11, 16.4.1 and 16.5.0RC1. - gunzf0x/CVE-2025-24893
GitHub监控消息提醒!!!
更新了:RCE
描述:A critical Remote Code Execution (RCE) vulnerability (CVE-2025-51820) has been discovered in the Shopping Portal v1.0.
URL:https://github.com/shk-mubashshir/CVE-2025-51820
标签:#RCE
更新了:RCE
描述:A critical Remote Code Execution (RCE) vulnerability (CVE-2025-51820) has been discovered in the Shopping Portal v1.0.
URL:https://github.com/shk-mubashshir/CVE-2025-51820
标签:#RCE
GitHub
GitHub - shk-mubashshir/CVE-2025-51820: A critical Remote Code Execution (RCE) vulnerability (CVE-2025-51820) has been discovered…
A critical Remote Code Execution (RCE) vulnerability (CVE-2025-51820) has been discovered in the Shopping Portal v1.0. - shk-mubashshir/CVE-2025-51820
GitHub监控消息提醒!!!
更新了:漏洞挖掘
描述:漏洞挖掘神器-发现页面隐藏接口、URL批量打开 | Vulnerability Mining Tool - Discover Hidden Interfaces on Pages and Batch Open URLs
URL:https://github.com/n0name-X/LoveJS
标签:#漏洞挖掘
更新了:漏洞挖掘
描述:漏洞挖掘神器-发现页面隐藏接口、URL批量打开 | Vulnerability Mining Tool - Discover Hidden Interfaces on Pages and Batch Open URLs
URL:https://github.com/n0name-X/LoveJS
标签:#漏洞挖掘
GitHub
GitHub - n0name-X/LoveJS: 漏洞挖掘神器 | 浏览器插件 | 发现页面和JS中的隐藏接口和敏感信息、URL批量打开 & Vulnerability Mining Tool | Browser Plugin | Discover Hidden…
漏洞挖掘神器 | 浏览器插件 | 发现页面和JS中的隐藏接口和敏感信息、URL批量打开 & Vulnerability Mining Tool | Browser Plugin | Discover Hidden Interfaces, Sensitive Information in Pages and JS, Open Multiple URLs | Notepad - ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint Server (CVE-2025-53770)
URL:https://github.com/MuhammadWaseem29/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint Server (CVE-2025-53770)
URL:https://github.com/MuhammadWaseem29/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - MuhammadWaseem29/CVE-2025-53770: Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint…
Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint Server (CVE-2025-53770) - MuhammadWaseem29/CVE-2025-53770
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-54424:1Panel 客户端证书绕过RCE漏洞 一体化工具 (扫描+利用)
URL:https://github.com/Mr-xn/CVE-2025-54424
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-54424:1Panel 客户端证书绕过RCE漏洞 一体化工具 (扫描+利用)
URL:https://github.com/Mr-xn/CVE-2025-54424
标签:#CVE-2025
GitHub
GitHub - Mr-xn/CVE-2025-54424: CVE-2025-54424:1Panel 客户端证书绕过RCE漏洞 一体化工具 (扫描+利用)
CVE-2025-54424:1Panel 客户端证书绕过RCE漏洞 一体化工具 (扫描+利用). Contribute to Mr-xn/CVE-2025-54424 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:这是基于c++17写的一个json解析器项目,支持序列化与反序列化。
URL:https://github.com/hcc123231/hcJson
标签:#反序列化
更新了:反序列化
描述:这是基于c++17写的一个json解析器项目,支持序列化与反序列化。
URL:https://github.com/hcc123231/hcJson
标签:#反序列化
GitHub
GitHub - hcc123231/hcJson: 这是基于c++17写的一个json解析器项目,支持序列化与反序列化。
这是基于c++17写的一个json解析器项目,支持序列化与反序列化。. Contribute to hcc123231/hcJson development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Universal Red Teaming Framework for Large Language Models
URL:https://github.com/sam8k/urLLM
标签:#Red Team
更新了:Red Team
描述:Universal Red Teaming Framework for Large Language Models
URL:https://github.com/sam8k/urLLM
标签:#Red Team
GitHub
GitHub - sam8k/urLLM: Universal Red Teaming Framework for Large Language Models
Universal Red Teaming Framework for Large Language Models - sam8k/urLLM
GitHub监控消息提醒!!!
更新了:钓鱼
描述:钓鱼户外平台应用 - React + Vite
URL:https://github.com/TAnderson2718/fishing-1
标签:#钓鱼
更新了:钓鱼
描述:钓鱼户外平台应用 - React + Vite
URL:https://github.com/TAnderson2718/fishing-1
标签:#钓鱼
GitHub
GitHub - TAnderson2718/fishing-1: 钓鱼户外平台应用 - React + Vite
钓鱼户外平台应用 - React + Vite. Contribute to TAnderson2718/fishing-1 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8517: Session Fixation in Vvveb CMS v1.0.6.1
URL:https://github.com/helloandrewpaul/Session-Fixation-in-Vvveb-CMS-v1.0.6.1
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8517: Session Fixation in Vvveb CMS v1.0.6.1
URL:https://github.com/helloandrewpaul/Session-Fixation-in-Vvveb-CMS-v1.0.6.1
标签:#CVE-2025
GitHub
GitHub - helloandrewpaul/Session-Fixation-in-Vvveb-CMS-v1.0.6.1: CVE-2025-8517: Session Fixation in Vvveb CMS v1.0.6.1
CVE-2025-8517: Session Fixation in Vvveb CMS v1.0.6.1 - helloandrewpaul/Session-Fixation-in-Vvveb-CMS-v1.0.6.1
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Bypass40X是一款专业级Web安全测试工具,通过30+种实时混淆技术自动化检测403/401权限校验漏洞。结合动态反检测策略与智能响应过滤,显著提升渗透测试效率。
URL:https://github.com/anansec/Bypass40X
标签:#渗透测试
更新了:渗透测试
描述:Bypass40X是一款专业级Web安全测试工具,通过30+种实时混淆技术自动化检测403/401权限校验漏洞。结合动态反检测策略与智能响应过滤,显著提升渗透测试效率。
URL:https://github.com/anansec/Bypass40X
标签:#渗透测试
GitHub
GitHub - anansec/Bypass40X: Bypass40X是一款专业级Web安全测试工具,通过30+种实时混淆技术自动化检测403/401权限校验漏洞。结合动态反检测策略与智能响应过滤,显著提升渗透测试效率。
Bypass40X是一款专业级Web安全测试工具,通过30+种实时混淆技术自动化检测403/401权限校验漏洞。结合动态反检测策略与智能响应过滤,显著提升渗透测试效率。 - anansec/Bypass40X
GitHub监控消息提醒!!!
更新了:渗透测试
描述:基于大佬Mustard404的Savior系统二开的渗透测试报告辅助系统
URL:https://github.com/ohj-dmw/Savior-2.0
标签:#渗透测试
更新了:渗透测试
描述:基于大佬Mustard404的Savior系统二开的渗透测试报告辅助系统
URL:https://github.com/ohj-dmw/Savior-2.0
标签:#渗透测试
👍1
GitHub监控消息提醒!!!
更新了:渗透测试
描述:LingJing 是一款由go+fyne打造的满足复杂网络环境渗透测试需求的本地网络安全靶场平台(支持在线一键安装靶机)
URL:https://github.com/youmulijiang/BpArsenal
标签:#渗透测试
更新了:渗透测试
描述:LingJing 是一款由go+fyne打造的满足复杂网络环境渗透测试需求的本地网络安全靶场平台(支持在线一键安装靶机)
URL:https://github.com/youmulijiang/BpArsenal
标签:#渗透测试
GitHub
GitHub - youmulijiang/BpArsenal: BpArsenal, a Burp Suite plugin that can quickly convert http requests into command-line tool execution…
BpArsenal, a Burp Suite plugin that can quickly convert http requests into command-line tool execution, launch third-party tools and open related websites, can improve the efficiency of penetration...
GitHub监控消息提醒!!!
更新了:webshell
描述:just simple webshell with upload
URL:https://github.com/nvth/webshell
标签:#webshell
更新了:webshell
描述:just simple webshell with upload
URL:https://github.com/nvth/webshell
标签:#webshell
GitHub
GitHub - nvth/webshell: just simple webshell with upload
just simple webshell with upload. Contribute to nvth/webshell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:Serde 是一个 高效和通用的序列化和反序列化Rust数据结构的框架。
URL:https://github.com/eclipse-oniro-openharmony/third_party_rust_serde
标签:#反序列化
更新了:反序列化
描述:Serde 是一个 高效和通用的序列化和反序列化Rust数据结构的框架。
URL:https://github.com/eclipse-oniro-openharmony/third_party_rust_serde
标签:#反序列化
GitHub
GitHub - eclipse-oniro-openharmony/third_party_rust_serde: Serde 是一个 高效和通用的序列化和反序列化Rust数据结构的框架。
Serde 是一个 高效和通用的序列化和反序列化Rust数据结构的框架。. Contribute to eclipse-oniro-openharmony/third_party_rust_serde development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:NewCobaltstrikeTeamServer 是一个尝试用 Go 语言重写的 Cobalt Strike 服务端项目,目前正在开发中
URL:https://github.com/TryGOTry/NewCobaltstrikeTeamServer
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:NewCobaltstrikeTeamServer 是一个尝试用 Go 语言重写的 Cobalt Strike 服务端项目,目前正在开发中
URL:https://github.com/TryGOTry/NewCobaltstrikeTeamServer
标签:#Cobalt Strike
GitHub
GitHub - TryGOTry/NewCobaltstrikeTeamServer: NewCobaltstrikeTeamServer 是一个尝试用 Go 语言重写的 Cobalt Strike 服务端项目,目前正在开发中,一个学习的产物
NewCobaltstrikeTeamServer 是一个尝试用 Go 语言重写的 Cobalt Strike 服务端项目,目前正在开发中,一个学习的产物 - TryGOTry/NewCobaltstrikeTeamServer