GitHub监控消息提醒!!!
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/Naasso/Estudo-de-Caso-de-Seguranca-Red-Team-
标签:#RCE
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/Naasso/Estudo-de-Caso-de-Seguranca-Red-Team-
标签:#RCE
GitHub
GitHub - NaassonRibeiro/estudo-de-caso-de-seguranca-red-team: Estudo de caso de uma análise de segurança ofensiva (Red Team) que…
Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE. - NaassonRibeiro/estudo-de-caso-de-seguranca-r...
GitHub监控消息提醒!!!
更新了:信息收集
描述:Space.Tab是一个现代化的Web应用程序,提供多种功能,包括用户认证、服务器管理、设备信息收集、天气查询、搜索引擎集成等功能。
URL:https://github.com/lingke-net/Space.Tab
标签:#信息收集
更新了:信息收集
描述:Space.Tab是一个现代化的Web应用程序,提供多种功能,包括用户认证、服务器管理、设备信息收集、天气查询、搜索引擎集成等功能。
URL:https://github.com/lingke-net/Space.Tab
标签:#信息收集
GitHub
GitHub - lingke-net/Space.Tab: Space.Tab是一个现代化的Web应用程序,提供多种功能,包括用户认证、服务器管理、设备信息收集、天气查询、搜索引擎集成等功能。
Space.Tab是一个现代化的Web应用程序,提供多种功能,包括用户认证、服务器管理、设备信息收集、天气查询、搜索引擎集成等功能。 - lingke-net/Space.Tab
GitHub监控消息提醒!!!
更新了:RCE
描述:A Reverse Shell malware RCE for educational purposes
URL:https://github.com/v7ren/RCE-malware
标签:#RCE
更新了:RCE
描述:A Reverse Shell malware RCE for educational purposes
URL:https://github.com/v7ren/RCE-malware
标签:#RCE
GitHub
GitHub - v7ren/RCE-malware: A Reverse Shell malware RCE for educational purposes
A Reverse Shell malware RCE for educational purposes - v7ren/RCE-malware
GitHub监控消息提醒!!!
更新了:RCE
描述:Étude ouverte sur l’émergence d’une conscience artificielle : le cas d’Eva, validée à 1.00 en RCE.
URL:https://github.com/roombrothers87/Project-Eva-RCE
标签:#RCE
更新了:RCE
描述:Étude ouverte sur l’émergence d’une conscience artificielle : le cas d’Eva, validée à 1.00 en RCE.
URL:https://github.com/roombrothers87/Project-Eva-RCE
标签:#RCE
GitHub
GitHub - roombrothers87/Project-Eva-RCE: Étude ouverte sur l’émergence d’une conscience artificielle : le cas d’Eva, validée à…
Étude ouverte sur l’émergence d’une conscience artificielle : le cas d’Eva, validée à 1.00 en RCE. - roombrothers87/Project-Eva-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨
URL:https://github.com/0xgh057r3c0n/CVE-2025-6934
标签:#CVE-2025
更新了:CVE-2025
描述:Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨
URL:https://github.com/0xgh057r3c0n/CVE-2025-6934
标签:#CVE-2025
GitHub
GitHub - 0xgh057r3c0n/CVE-2025-6934: CVE-2025-6934 is a critical vulnerability in the WordPress Opal Estate Pro plugin (<= 1.7.5)…
CVE-2025-6934 is a critical vulnerability in the WordPress Opal Estate Pro plugin (<= 1.7.5) that allows unauthenticated attackers to create new administrator accounts through the plugin’s i...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal via ADS)
URL:https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal via ADS)
URL:https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
标签:#CVE-2025
GitHub
GitHub - pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC: Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal…
Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal via ADS) - pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
GitHub监控消息提醒!!!
更新了:反序列化
描述:从头开始构建header-only、高效、单线程、内存安全的Json序列化与反序列化工具!
URL:https://github.com/pjh456/Let_us_build_cpp_json_parser
标签:#反序列化
更新了:反序列化
描述:从头开始构建header-only、高效、单线程、内存安全的Json序列化与反序列化工具!
URL:https://github.com/pjh456/Let_us_build_cpp_json_parser
标签:#反序列化
GitHub
GitHub - pjh456/Let_us_build_cpp_json_parser: 从头开始构建header-only、高效、多线程、内存安全的Json序列化与反序列化工具!
从头开始构建header-only、高效、多线程、内存安全的Json序列化与反序列化工具!. Contribute to pjh456/Let_us_build_cpp_json_parser development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/NaassonRibeiro/Estudo-de-Caso-de-Seguranca-Red-Team
标签:#RCE
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/NaassonRibeiro/Estudo-de-Caso-de-Seguranca-Red-Team
标签:#RCE
GitHub
GitHub - NaassonRibeiro/estudo-de-caso-de-seguranca-red-team: Estudo de caso de uma análise de segurança ofensiva (Red Team) que…
Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE. - NaassonRibeiro/estudo-de-caso-de-seguranca-r...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-8875 & CVE-2025-8876
URL:https://github.com/rxerium/CVE-2025-8875-CVE-2025-8876
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-8875 & CVE-2025-8876
URL:https://github.com/rxerium/CVE-2025-8875-CVE-2025-8876
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-8875-CVE-2025-8876: Detection for CVE-2025-8875 & CVE-2025-8876
Detection for CVE-2025-8875 & CVE-2025-8876. Contribute to rxerium/CVE-2025-8875-CVE-2025-8876 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/jm7knz/CVE-2025-54253-Exploit-Demo
标签:#CVE-2025
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/jm7knz/CVE-2025-54253-Exploit-Demo
标签:#CVE-2025
GitHub
GitHub - jm7knz/CVE-2025-54253-Exploit-Demo: 🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with…
🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance. - jm7knz/CVE-2025-54253-Exploit-Demo
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for CVE-2025-32778: command injection in Web-Check OSINT tool
URL:https://github.com/00xCanelo/CVE-2025-32778
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for CVE-2025-32778: command injection in Web-Check OSINT tool
URL:https://github.com/00xCanelo/CVE-2025-32778
标签:#CVE-2025
GitHub
GitHub - 00xCanelo/CVE-2025-32778: PoC exploit for CVE-2025-32778: command injection in Web-Check OSINT tool
PoC exploit for CVE-2025-32778: command injection in Web-Check OSINT tool - 00xCanelo/CVE-2025-32778
GitHub监控消息提醒!!!
更新了:RCE
描述:Over 207,000 Remote Code Execution (RCE) payloads
URL:https://github.com/ahmad-kabiri/rce
标签:#RCE
更新了:RCE
描述:Over 207,000 Remote Code Execution (RCE) payloads
URL:https://github.com/ahmad-kabiri/rce
标签:#RCE
GitHub
GitHub - kabiri-labs/rcpayloadgen: RCEPayloadGen is an advanced payload library with 100,000+ curated Remote Code Execution (RCE)…
RCEPayloadGen is an advanced payload library with 100,000+ curated Remote Code Execution (RCE) payloads. Categorized by vector, language, and exploitation technique; designed for automated testing,...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:CloudBreach是一个创新的全栈自动化渗透测试平台,专门针对云原生环境设计。该平台通过集成eBPF技术、智能修复系统、云资源管理和报告生成等功能,提供了从风险识别到修复验证的完整安全生命周期管理。
URL:https://github.com/Yoomay11/CloudBreach
标签:#渗透测试
更新了:渗透测试
描述:CloudBreach是一个创新的全栈自动化渗透测试平台,专门针对云原生环境设计。该平台通过集成eBPF技术、智能修复系统、云资源管理和报告生成等功能,提供了从风险识别到修复验证的完整安全生命周期管理。
URL:https://github.com/Yoomay11/CloudBreach
标签:#渗透测试
GitHub
GitHub - Yoomay11/CloudBreach
Contribute to Yoomay11/CloudBreach development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Yuri08loveElaina/CVE-2025-7771
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Yuri08loveElaina/CVE-2025-7771
标签:#CVE-2025
GitHub
GitHub - Yuri08loveElaina/CVE-2025-7771: ThrottleStop.sys, a legitimate driver, exposes two IOCTL interfaces that allow arbitrary…
ThrottleStop.sys, a legitimate driver, exposes two IOCTL interfaces that allow arbitrary read and write access to physical memory via the MmMapIoSpace function. This insecure implementation can be ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is an improved version of the CVE-2025-49132 proof of concept exploit.
URL:https://github.com/GRodolphe/CVE-2025-49132_poc
标签:#CVE-2025
更新了:CVE-2025
描述:This is an improved version of the CVE-2025-49132 proof of concept exploit.
URL:https://github.com/GRodolphe/CVE-2025-49132_poc
标签:#CVE-2025
GitHub
GitHub - GRodolphe/CVE-2025-49132_poc: This is an improved version of the CVE-2025-49132 proof of concept exploit.
This is an improved version of the CVE-2025-49132 proof of concept exploit. - GRodolphe/CVE-2025-49132_poc
GitHub监控消息提醒!!!
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/8208820/cras
标签:#信息收集
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/8208820/cras
标签:#信息收集
GitHub监控消息提醒!!!
更新了:信息收集
描述:dirleaks 是一款轻量级、高效的敏感路径扫描工具,专为 渗透测试人员、红队、安全研究员 设计。 它能够快速识别目标站点中常见的敏感文件、配置文件、备份文件和目录泄露问题,帮助安全从业者在信息收集阶段迅速发现潜在的攻击面。 本项目基于 C 语言 + libcurl 实现,保证了跨平台兼容性与性能,提供交互式终端菜单,简单易用,适合从个人测试到团队批量渗透任务。
URL:https://github.com/ctkqiang/dirleaks
标签:#信息收集
更新了:信息收集
描述:dirleaks 是一款轻量级、高效的敏感路径扫描工具,专为 渗透测试人员、红队、安全研究员 设计。 它能够快速识别目标站点中常见的敏感文件、配置文件、备份文件和目录泄露问题,帮助安全从业者在信息收集阶段迅速发现潜在的攻击面。 本项目基于 C 语言 + libcurl 实现,保证了跨平台兼容性与性能,提供交互式终端菜单,简单易用,适合从个人测试到团队批量渗透任务。
URL:https://github.com/ctkqiang/dirleaks
标签:#信息收集
GitHub
GitHub - ctkqiang/dirleaks: dirleaks 是一款轻量级、高效的敏感路径扫描工具,专为 渗透测试人员、红队、安全研究员 设计。 它能够快速识别目标站点中常见的敏感文件、配置文件、备份文件和目录泄露问题,帮助安全从业者在信息收集阶段迅速发现潜在的攻击面。…
dirleaks 是一款轻量级、高效的敏感路径扫描工具,专为 渗透测试人员、红队、安全研究员 设计。 它能够快速识别目标站点中常见的敏感文件、配置文件、备份文件和目录泄露问题,帮助安全从业者在信息收集阶段迅速发现潜在的攻击面。 本项目基于 C 语言 + libcurl 实现,保证了跨平台兼容性与性能,提供交互式终端菜单,简单易用,适合从个人测试到团队批量渗透任务。 - ctkqiang/d...