GitHub监控消息提醒!!!
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/NaassonRibeiro/estudo-de-caso-de-seguranca-red-team
标签:#RCE
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/NaassonRibeiro/estudo-de-caso-de-seguranca-red-team
标签:#RCE
GitHub
GitHub - NaassonRibeiro/estudo-de-caso-de-seguranca-red-team: Estudo de caso de uma análise de segurança ofensiva (Red Team) que…
Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE. - NaassonRibeiro/estudo-de-caso-de-seguranca-r...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Demonstrate CVE-2025-55188, a 7-Zip vulnerability allowing symlink attacks to overwrite files, highlighting crucial security risks for users.
URL:https://github.com/rhllsingh/CVE-2025-55188-7z-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Demonstrate CVE-2025-55188, a 7-Zip vulnerability allowing symlink attacks to overwrite files, highlighting crucial security risks for users.
URL:https://github.com/rhllsingh/CVE-2025-55188-7z-exploit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚀 Demonstrate the WinRAR CVE-2025-8088 exploit with a PoC RAR archive that installs a VBScript on startup, showcasing its impact on vulnerable systems.
URL:https://github.com/amel-62/WinRAR-CVE-2025-8088-PoC-RAR
标签:#CVE-2025
更新了:CVE-2025
描述:🚀 Demonstrate the WinRAR CVE-2025-8088 exploit with a PoC RAR archive that installs a VBScript on startup, showcasing its impact on vulnerable systems.
URL:https://github.com/amel-62/WinRAR-CVE-2025-8088-PoC-RAR
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse may violate laws or cause harm. Update to WinRAR 7.13+ to avoid suspicious RARs.
URL:https://github.com/ghostn4444/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse may violate laws or cause harm. Update to WinRAR 7.13+ to avoid suspicious RARs.
URL:https://github.com/ghostn4444/CVE-2025-8088
标签:#CVE-2025
GitHub
GitHub - ghostn4444/CVE-2025-8088: This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse…
This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse may violate laws or cause harm. Update to WinRAR 7.13+ to avoid suspicious RARs. - ghostn4444/CVE-2025-...
GitHub监控消息提醒!!!
更新了:webshell
描述:serial port webshell simulation
URL:https://github.com/skyrover001/com_ws
标签:#webshell
更新了:webshell
描述:serial port webshell simulation
URL:https://github.com/skyrover001/com_ws
标签:#webshell
GitHub
skyrover001/com_ws
serial port webshell simulation. Contribute to skyrover001/com_ws development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:红队
描述:A.I.G (AI-Infra-Guard) 是腾讯朱雀实验室推出的 AI 红队安全测试平台,支持AI基础设施漏洞扫描、MCP Server风险检测与大模型安全体检。
URL:https://github.com/Tencent/AI-Infra-Guard
标签:#红队
更新了:红队
描述:A.I.G (AI-Infra-Guard) 是腾讯朱雀实验室推出的 AI 红队安全测试平台,支持AI基础设施漏洞扫描、MCP Server风险检测与大模型安全体检。
URL:https://github.com/Tencent/AI-Infra-Guard
标签:#红队
GitHub
GitHub - Tencent/AI-Infra-Guard: A.I.G (AI-Infra-Guard) is a comprehensive, intelligent, and easy-to-use AI Red Teaming platform…
A.I.G (AI-Infra-Guard) is a comprehensive, intelligent, and easy-to-use AI Red Teaming platform developed by Tencent Zhuque Lab. - Tencent/AI-Infra-Guard
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection CVE PoC (Proof of Concept)
URL:https://github.com/JMS-Security/CVE-2025-25256-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection CVE PoC (Proof of Concept)
URL:https://github.com/JMS-Security/CVE-2025-25256-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:信息收集
描述:一款面向SRC漏洞挖掘中,页面信息收集场景的浏览器扩展,自动收集页面及相关资源中的敏感信息与可疑线索,支持基础扫描、深度递归扫描、批量 API 测试及结果导出与自定义正则配置
URL:https://github.com/yumyum-05/longxinzhiyou
标签:#信息收集
更新了:信息收集
描述:一款面向SRC漏洞挖掘中,页面信息收集场景的浏览器扩展,自动收集页面及相关资源中的敏感信息与可疑线索,支持基础扫描、深度递归扫描、批量 API 测试及结果导出与自定义正则配置
URL:https://github.com/yumyum-05/longxinzhiyou
标签:#信息收集
GitHub
GitHub - yumyum-05/Dragon-Optimize: 龙芯智优软件是一款针对于国产操作系统智能调优的软件,为帮助运维人员直观可视化对银河麒麟操作系统进行监控调优,系统设计分为管理端应用和服务探针两个核心部分。运维人员通过终端设备访问N…
龙芯智优软件是一款针对于国产操作系统智能调优的软件,为帮助运维人员直观可视化对银河麒麟操作系统进行监控调优,系统设计分为管理端应用和服务探针两个核心部分。运维人员通过终端设备访问NGINX服务,通过请求将任务分发到管理端节点,管理端与服务探针进行通讯,发送命令对部署了服务探针的服务器进行监控、数据采集、性能优化,采集的数据返回到管理端。数据实现持久化存储,支持mysql或达梦数据库,使用消息...
GitHub监控消息提醒!!!
更新了:RCE
描述:灵当CRM getLogInfo.php 文件上传致RCE的poc
URL:https://github.com/1424306324/-CRM-getLogInfo.php-RCE-poc
标签:#RCE
更新了:RCE
描述:灵当CRM getLogInfo.php 文件上传致RCE的poc
URL:https://github.com/1424306324/-CRM-getLogInfo.php-RCE-poc
标签:#RCE
GitHub
1424306324/-CRM-getLogInfo.php-RCE-poc
灵当CRM getLogInfo.php 文件上传致RCE的poc. Contribute to 1424306324/-CRM-getLogInfo.php-RCE-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:ANTI-RCE Remote Command Execution From HRDP
URL:https://github.com/SentityX/Xworm-RCEBlock
标签:#RCE
更新了:RCE
描述:ANTI-RCE Remote Command Execution From HRDP
URL:https://github.com/SentityX/Xworm-RCEBlock
标签:#RCE
GitHub
GitHub - SentityX/Xworm-RCEBlock: ANTI-RCE Remote Command Execution From HRDP
ANTI-RCE Remote Command Execution From HRDP. Contribute to SentityX/Xworm-RCEBlock development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:The IoT smart water meter monitoring platform affiliated to Shandong Kede Electronics Co., Ltd. has an unauthorized remote code execution (RCE) vulnerability
URL:https://github.com/songqb-xx/Internet-of-Things-Smart-Water-Meter-Monitoring-Platform-Unauthorized-RCE
标签:#RCE
更新了:RCE
描述:The IoT smart water meter monitoring platform affiliated to Shandong Kede Electronics Co., Ltd. has an unauthorized remote code execution (RCE) vulnerability
URL:https://github.com/songqb-xx/Internet-of-Things-Smart-Water-Meter-Monitoring-Platform-Unauthorized-RCE
标签:#RCE
GitHub
GitHub - songqb-xx/Internet-of-Things-Smart-Water-Meter-Monitoring-Platform-Unauthorized-RCE: The IoT smart water meter monitoring…
The IoT smart water meter monitoring platform affiliated to Shandong Kede Electronics Co., Ltd. has an unauthorized remote code execution (RCE) vulnerability - songqb-xx/Internet-of-Things-Smart-Wa...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-43300的在野利用代码.
URL:https://github.com/XiaomingX/CVE-2025-43300-exp
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-43300的在野利用代码.
URL:https://github.com/XiaomingX/CVE-2025-43300-exp
标签:#CVE-2025
GitHub
GitHub - XiaomingX/CVE-2025-43300-exp: CVE-2025-43300的在野利用代码.
CVE-2025-43300的在野利用代码. Contribute to XiaomingX/CVE-2025-43300-exp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for Below privilege escalation (CVE-2025-27591) allowing local root access via symlink manipulation in world-writable log directory.
URL:https://github.com/Diabl0xE/CVE-2025-27519
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for Below privilege escalation (CVE-2025-27591) allowing local root access via symlink manipulation in world-writable log directory.
URL:https://github.com/Diabl0xE/CVE-2025-27519
标签:#CVE-2025
GitHub
GitHub - Diabl0xE/CVE-2025-27519: PoC exploit for Below privilege escalation (CVE-2025-27591) allowing local root access via symlink…
PoC exploit for Below privilege escalation (CVE-2025-27591) allowing local root access via symlink manipulation in world-writable log directory. - Diabl0xE/CVE-2025-27519
GitHub监控消息提醒!!!
更新了:RCE
描述:This repository contains a Proof of Concept (PoC) for CVE-2024-37054, a critical deserialization vulnerability in MLflow that allows for Remote Code Execution (RCE).
URL:https://github.com/NiteeshPujari/CVE-2024-37054-MLflow-RCE
标签:#RCE
更新了:RCE
描述:This repository contains a Proof of Concept (PoC) for CVE-2024-37054, a critical deserialization vulnerability in MLflow that allows for Remote Code Execution (RCE).
URL:https://github.com/NiteeshPujari/CVE-2024-37054-MLflow-RCE
标签:#RCE
GitHub
GitHub - NiteeshPujari/CVE-2024-37054-MLflow-RCE: NiteeshPujari/CVE-2024-37054, This repository contains a Proof of Concept (PoC)…
NiteeshPujari/CVE-2024-37054, This repository contains a Proof of Concept (PoC) a critical deserialization vulnerability in MLflow that allows for Remote Code Execution (RCE). - GitHub - NiteeshPu...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC exploit for CVE-2025-33053 (External control of file execution path in URL file)
URL:https://github.com/4n4s4zi/CVE-2025-33053_PoC
标签:#CVE-2025
更新了:CVE-2025
描述:POC exploit for CVE-2025-33053 (External control of file execution path in URL file)
URL:https://github.com/4n4s4zi/CVE-2025-33053_PoC
标签:#CVE-2025
GitHub
GitHub - 4n4s4zi/CVE-2025-33053_PoC: POC exploit for CVE-2025-33053 (External control of file execution path in URL file)
POC exploit for CVE-2025-33053 (External control of file execution path in URL file) - 4n4s4zi/CVE-2025-33053_PoC
GitHub监控消息提醒!!!
更新了:RCE
描述:Over 207,000 Remote Code Execution (RCE) payloads
URL:https://github.com/ahmad-kabiri/rcpayloadgen
标签:#RCE
更新了:RCE
描述:Over 207,000 Remote Code Execution (RCE) payloads
URL:https://github.com/ahmad-kabiri/rcpayloadgen
标签:#RCE
GitHub
GitHub - kabiri-labs/rcpayloadgen: RCEPayloadGen is an advanced payload library with 100,000+ curated Remote Code Execution (RCE)…
RCEPayloadGen is an advanced payload library with 100,000+ curated Remote Code Execution (RCE) payloads. Categorized by vector, language, and exploitation technique; designed for automated testing,...
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/JGoyd/glass-cage-ios18-cve-2025-24085-cve-2025-24201
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/JGoyd/glass-cage-ios18-cve-2025-24085-cve-2025-24201
标签:#RCE
GitHub
GitHub - JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201: Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing…
Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), then WebKit(CVE-2025-24201) and Core Media(CVE-2025-24085) t...