GitHub监控消息提醒!!!
更新了:RCE
描述:Program python untuk melakukan RCE pada drupal versi 7.56
URL:https://github.com/xxxTectationxxx/CVE-2018-7600
标签:#RCE
更新了:RCE
描述:Program python untuk melakukan RCE pada drupal versi 7.56
URL:https://github.com/xxxTectationxxx/CVE-2018-7600
标签:#RCE
GitHub
GitHub - xxxTectationxxx/CVE-2018-7600: Program python untuk melakukan RCE pada drupal versi 7.56
Program python untuk melakukan RCE pada drupal versi 7.56 - xxxTectationxxx/CVE-2018-7600
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53770 SharePoint Deserialization Vulnerability Checker
URL:https://github.com/behnamvanda/CVE-2025-53770-Checker
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53770 SharePoint Deserialization Vulnerability Checker
URL:https://github.com/behnamvanda/CVE-2025-53770-Checker
标签:#CVE-2025
GitHub
GitHub - behnamvanda/CVE-2025-53770-Checker: CVE-2025-53770 SharePoint Deserialization Vulnerability Checker
CVE-2025-53770 SharePoint Deserialization Vulnerability Checker - behnamvanda/CVE-2025-53770-Checker
GitHub监控消息提醒!!!
更新了:RCE
描述:Injectra – RCE tool with port scanning, IP discovery, and system info gathering.
URL:https://github.com/baranithedev/Injectra-Framework
标签:#RCE
更新了:RCE
描述:Injectra – RCE tool with port scanning, IP discovery, and system info gathering.
URL:https://github.com/baranithedev/Injectra-Framework
标签:#RCE
GitHub
GitHub - baranithedev/Injectra-Framework: Injectra – RCE tool with port scanning, IP discovery, and system info gathering.
Injectra – RCE tool with port scanning, IP discovery, and system info gathering. - baranithedev/Injectra-Framework
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for CVE-2025-54887
URL:https://github.com/shinigami-777/PoC_CVE-2025-54887
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for CVE-2025-54887
URL:https://github.com/shinigami-777/PoC_CVE-2025-54887
标签:#CVE-2025
GitHub
GitHub - shinigami-777/PoC_CVE-2025-54887: Proof of Concept for CVE-2025-54887
Proof of Concept for CVE-2025-54887. Contribute to shinigami-777/PoC_CVE-2025-54887 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Esse script explora a vulnerabilidade CVE-2025-20124 — uma falha de Java Deserialization no Cisco ISE (Identity Services Engine) que permite Remote Code Execution (RCE).
URL:https://github.com/137f/Cisco-ISE-3.0---Remote-Code-Execution-RCE-
标签:#CVE-2025
更新了:CVE-2025
描述:Esse script explora a vulnerabilidade CVE-2025-20124 — uma falha de Java Deserialization no Cisco ISE (Identity Services Engine) que permite Remote Code Execution (RCE).
URL:https://github.com/137f/Cisco-ISE-3.0---Remote-Code-Execution-RCE-
标签:#CVE-2025
GitHub
GitHub - ftz7/Cisco-ISE-3.0---Remote-Code-Execution-RCE-: Esse script explora a vulnerabilidade CVE-2025-20124 — uma falha de Java…
Esse script explora a vulnerabilidade CVE-2025-20124 — uma falha de Java Deserialization no Cisco ISE (Identity Services Engine) que permite Remote Code Execution (RCE). - ftz7/Cisco-ISE-3.0---Remo...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:NewCobaltstrikeTeamServer 是一个尝试用 Go 语言重写的 Cobalt Strike 服务端项目,目前正在开发中,一个学习的产物
URL:https://github.com/GroupVestige/BruteRatel
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:NewCobaltstrikeTeamServer 是一个尝试用 Go 语言重写的 Cobalt Strike 服务端项目,目前正在开发中,一个学习的产物
URL:https://github.com/GroupVestige/BruteRatel
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:基于深度学习结合内联汇编技术的二进制漏洞检测工具
URL:https://github.com/xincunhuqs/BinaryVul_DecteTool
标签:#漏洞检测
更新了:漏洞检测
描述:基于深度学习结合内联汇编技术的二进制漏洞检测工具
URL:https://github.com/xincunhuqs/BinaryVul_DecteTool
标签:#漏洞检测
GitHub
GitHub - xincunhuqs/BinaryVul_DecteTool: 基于深度学习结合内联汇编技术的二进制漏洞检测工具
基于深度学习结合内联汇编技术的二进制漏洞检测工具. Contribute to xincunhuqs/BinaryVul_DecteTool development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-47533 Clobber RCE
URL:https://github.com/zs1n/CVE-2024-47533
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-47533 Clobber RCE
URL:https://github.com/zs1n/CVE-2024-47533
标签:#CVE-2025
GitHub
GitHub - zs1n/CVE-2024-47533: PoC of CVE-2025-47533 Clobber RCE
PoC of CVE-2025-47533 Clobber RCE. Contribute to zs1n/CVE-2024-47533 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Vulnerable API using Java's XMLDecorder to created a RCE vulnerability
URL:https://github.com/rupton/xmldecoder-demo
标签:#RCE
更新了:RCE
描述:Vulnerable API using Java's XMLDecorder to created a RCE vulnerability
URL:https://github.com/rupton/xmldecoder-demo
标签:#RCE
GitHub
GitHub - rupton/xmldecoder-demo: Vulnerable API using Java's XMLDecorder to created a RCE vulnerability
Vulnerable API using Java's XMLDecorder to created a RCE vulnerability - rupton/xmldecoder-demo
GitHub监控消息提醒!!!
更新了:内存马
描述:基于 Agent + Instrumentation + ASM 的 Java 进程内存马检测与清除工具(含 GUI)
URL:https://github.com/CafeD1/Kill_Memshell
标签:#内存马
更新了:内存马
描述:基于 Agent + Instrumentation + ASM 的 Java 进程内存马检测与清除工具(含 GUI)
URL:https://github.com/CafeD1/Kill_Memshell
标签:#内存马
GitHub
GitHub - CafeD1/Kill_Memshell: 基于 Agent + Instrumentation + ASM 的 Java 进程内存马检测与清除查杀工具(含 GUI)
基于 Agent + Instrumentation + ASM 的 Java 进程内存马检测与清除查杀工具(含 GUI) - CafeD1/Kill_Memshell
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-47533 Clobber RCE
URL:https://github.com/NiteeshPujari/CVE-2025-32433-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-47533 Clobber RCE
URL:https://github.com/NiteeshPujari/CVE-2025-32433-PoC
标签:#CVE-2025
GitHub
GitHub - NiteeshPujari/CVE-2025-32433-PoC: CVE-2025-32433 PoC: Unauthenticated Remote Code Execution (RCE) in Erlang/OTP SSH. A…
CVE-2025-32433 PoC: Unauthenticated Remote Code Execution (RCE) in Erlang/OTP SSH. A proof-of-concept exploit for CVE-2025-32433 - NiteeshPujari/CVE-2025-32433-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for CVE-2025-50154, a Zero Day Vulnerability Leaking NTLM Challenge in 0 Click. It is a bypass for the CVE-2025-24054 Security Patch
URL:https://github.com/rubenformation/CVE-2025-50154
标签:#CVE-2025
更新了:CVE-2025
描述:POC for CVE-2025-50154, a Zero Day Vulnerability Leaking NTLM Challenge in 0 Click. It is a bypass for the CVE-2025-24054 Security Patch
URL:https://github.com/rubenformation/CVE-2025-50154
标签:#CVE-2025
GitHub
GitHub - rubenformation/CVE-2025-50154: POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer…
POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interaction. It is a bypass for the CVE-2025-24054 Security Patch - ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit)
URL:https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit)
URL:https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
标签:#CVE-2025
GitHub
GitHub - sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-: CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit)
CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit) - sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE Payload for NPM Dependency Confusion Attack
URL:https://github.com/Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload
标签:#RCE
更新了:RCE
描述:RCE Payload for NPM Dependency Confusion Attack
URL:https://github.com/Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload
标签:#RCE
GitHub
Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload
RCE Payload for NPM Dependency Confusion Attack. Contribute to Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection PoC
URL:https://github.com/barbaraeivyu/CVE-2025-25256
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection PoC
URL:https://github.com/barbaraeivyu/CVE-2025-25256
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:渗透测试
描述:RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志、提炼情报、模拟攻击链、制定作战计划。无论是迅速锁定漏洞、整理入侵痕迹,还是推演渗透路径,RedDynasty 都能在暗潮汹涌的网络战场,为你提供敏锐、精准、贴近红队思维的智力支持。
URL:https://github.com/ctkqiang/RedDynasty
标签:#渗透测试
更新了:渗透测试
描述:RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志、提炼情报、模拟攻击链、制定作战计划。无论是迅速锁定漏洞、整理入侵痕迹,还是推演渗透路径,RedDynasty 都能在暗潮汹涌的网络战场,为你提供敏锐、精准、贴近红队思维的智力支持。
URL:https://github.com/ctkqiang/RedDynasty
标签:#渗透测试
GitHub
GitHub - ctkqiang/RedDynasty: RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志…
RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志、提炼情报、模拟攻击链、制定作战计划。无论是迅速锁定漏洞、整理入侵痕迹,还是推演渗透路径,RedDynasty 都能在暗潮汹涌的网络战场,为你提供敏锐、精准、贴近红队思维的智力支持。 - ctkqian...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:this is a poc for the CVE-2025-54887
URL:https://github.com/Wizard079/CVE-2025-54887_POC
标签:#CVE-2025
更新了:CVE-2025
描述:this is a poc for the CVE-2025-54887
URL:https://github.com/Wizard079/CVE-2025-54887_POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53773
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53773
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53773
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53773
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-53773: CVE-2025-53773
CVE-2025-53773 . Contribute to B1ack4sh/Blackash-CVE-2025-53773 development by creating an account on GitHub.