GitHub监控消息提醒!!!
更新了:webshell
描述:serial port webshell simulation
URL:https://github.com/skyrover001/com_ws
标签:#webshell
更新了:webshell
描述:serial port webshell simulation
URL:https://github.com/skyrover001/com_ws
标签:#webshell
GitHub
skyrover001/com_ws
serial port webshell simulation. Contribute to skyrover001/com_ws development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:红队
描述:A.I.G (AI-Infra-Guard) 是腾讯朱雀实验室推出的 AI 红队安全测试平台,支持AI基础设施漏洞扫描、MCP Server风险检测与大模型安全体检。
URL:https://github.com/Tencent/AI-Infra-Guard
标签:#红队
更新了:红队
描述:A.I.G (AI-Infra-Guard) 是腾讯朱雀实验室推出的 AI 红队安全测试平台,支持AI基础设施漏洞扫描、MCP Server风险检测与大模型安全体检。
URL:https://github.com/Tencent/AI-Infra-Guard
标签:#红队
GitHub
GitHub - Tencent/AI-Infra-Guard: A.I.G (AI-Infra-Guard) is a comprehensive, intelligent, and easy-to-use AI Red Teaming platform…
A.I.G (AI-Infra-Guard) is a comprehensive, intelligent, and easy-to-use AI Red Teaming platform developed by Tencent Zhuque Lab. - Tencent/AI-Infra-Guard
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection CVE PoC (Proof of Concept)
URL:https://github.com/JMS-Security/CVE-2025-25256-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection CVE PoC (Proof of Concept)
URL:https://github.com/JMS-Security/CVE-2025-25256-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:信息收集
描述:一款面向SRC漏洞挖掘中,页面信息收集场景的浏览器扩展,自动收集页面及相关资源中的敏感信息与可疑线索,支持基础扫描、深度递归扫描、批量 API 测试及结果导出与自定义正则配置
URL:https://github.com/yumyum-05/longxinzhiyou
标签:#信息收集
更新了:信息收集
描述:一款面向SRC漏洞挖掘中,页面信息收集场景的浏览器扩展,自动收集页面及相关资源中的敏感信息与可疑线索,支持基础扫描、深度递归扫描、批量 API 测试及结果导出与自定义正则配置
URL:https://github.com/yumyum-05/longxinzhiyou
标签:#信息收集
GitHub
GitHub - yumyum-05/Dragon-Optimize: 龙芯智优软件是一款针对于国产操作系统智能调优的软件,为帮助运维人员直观可视化对银河麒麟操作系统进行监控调优,系统设计分为管理端应用和服务探针两个核心部分。运维人员通过终端设备访问N…
龙芯智优软件是一款针对于国产操作系统智能调优的软件,为帮助运维人员直观可视化对银河麒麟操作系统进行监控调优,系统设计分为管理端应用和服务探针两个核心部分。运维人员通过终端设备访问NGINX服务,通过请求将任务分发到管理端节点,管理端与服务探针进行通讯,发送命令对部署了服务探针的服务器进行监控、数据采集、性能优化,采集的数据返回到管理端。数据实现持久化存储,支持mysql或达梦数据库,使用消息...
GitHub监控消息提醒!!!
更新了:RCE
描述:灵当CRM getLogInfo.php 文件上传致RCE的poc
URL:https://github.com/1424306324/-CRM-getLogInfo.php-RCE-poc
标签:#RCE
更新了:RCE
描述:灵当CRM getLogInfo.php 文件上传致RCE的poc
URL:https://github.com/1424306324/-CRM-getLogInfo.php-RCE-poc
标签:#RCE
GitHub
1424306324/-CRM-getLogInfo.php-RCE-poc
灵当CRM getLogInfo.php 文件上传致RCE的poc. Contribute to 1424306324/-CRM-getLogInfo.php-RCE-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:ANTI-RCE Remote Command Execution From HRDP
URL:https://github.com/SentityX/Xworm-RCEBlock
标签:#RCE
更新了:RCE
描述:ANTI-RCE Remote Command Execution From HRDP
URL:https://github.com/SentityX/Xworm-RCEBlock
标签:#RCE
GitHub
GitHub - SentityX/Xworm-RCEBlock: ANTI-RCE Remote Command Execution From HRDP
ANTI-RCE Remote Command Execution From HRDP. Contribute to SentityX/Xworm-RCEBlock development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:The IoT smart water meter monitoring platform affiliated to Shandong Kede Electronics Co., Ltd. has an unauthorized remote code execution (RCE) vulnerability
URL:https://github.com/songqb-xx/Internet-of-Things-Smart-Water-Meter-Monitoring-Platform-Unauthorized-RCE
标签:#RCE
更新了:RCE
描述:The IoT smart water meter monitoring platform affiliated to Shandong Kede Electronics Co., Ltd. has an unauthorized remote code execution (RCE) vulnerability
URL:https://github.com/songqb-xx/Internet-of-Things-Smart-Water-Meter-Monitoring-Platform-Unauthorized-RCE
标签:#RCE
GitHub
GitHub - songqb-xx/Internet-of-Things-Smart-Water-Meter-Monitoring-Platform-Unauthorized-RCE: The IoT smart water meter monitoring…
The IoT smart water meter monitoring platform affiliated to Shandong Kede Electronics Co., Ltd. has an unauthorized remote code execution (RCE) vulnerability - songqb-xx/Internet-of-Things-Smart-Wa...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-43300的在野利用代码.
URL:https://github.com/XiaomingX/CVE-2025-43300-exp
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-43300的在野利用代码.
URL:https://github.com/XiaomingX/CVE-2025-43300-exp
标签:#CVE-2025
GitHub
GitHub - XiaomingX/CVE-2025-43300-exp: CVE-2025-43300的在野利用代码.
CVE-2025-43300的在野利用代码. Contribute to XiaomingX/CVE-2025-43300-exp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for Below privilege escalation (CVE-2025-27591) allowing local root access via symlink manipulation in world-writable log directory.
URL:https://github.com/Diabl0xE/CVE-2025-27519
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for Below privilege escalation (CVE-2025-27591) allowing local root access via symlink manipulation in world-writable log directory.
URL:https://github.com/Diabl0xE/CVE-2025-27519
标签:#CVE-2025
GitHub
GitHub - Diabl0xE/CVE-2025-27519: PoC exploit for Below privilege escalation (CVE-2025-27591) allowing local root access via symlink…
PoC exploit for Below privilege escalation (CVE-2025-27591) allowing local root access via symlink manipulation in world-writable log directory. - Diabl0xE/CVE-2025-27519
GitHub监控消息提醒!!!
更新了:RCE
描述:This repository contains a Proof of Concept (PoC) for CVE-2024-37054, a critical deserialization vulnerability in MLflow that allows for Remote Code Execution (RCE).
URL:https://github.com/NiteeshPujari/CVE-2024-37054-MLflow-RCE
标签:#RCE
更新了:RCE
描述:This repository contains a Proof of Concept (PoC) for CVE-2024-37054, a critical deserialization vulnerability in MLflow that allows for Remote Code Execution (RCE).
URL:https://github.com/NiteeshPujari/CVE-2024-37054-MLflow-RCE
标签:#RCE
GitHub
GitHub - NiteeshPujari/CVE-2024-37054-MLflow-RCE: NiteeshPujari/CVE-2024-37054, This repository contains a Proof of Concept (PoC)…
NiteeshPujari/CVE-2024-37054, This repository contains a Proof of Concept (PoC) a critical deserialization vulnerability in MLflow that allows for Remote Code Execution (RCE). - GitHub - NiteeshPu...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC exploit for CVE-2025-33053 (External control of file execution path in URL file)
URL:https://github.com/4n4s4zi/CVE-2025-33053_PoC
标签:#CVE-2025
更新了:CVE-2025
描述:POC exploit for CVE-2025-33053 (External control of file execution path in URL file)
URL:https://github.com/4n4s4zi/CVE-2025-33053_PoC
标签:#CVE-2025
GitHub
GitHub - 4n4s4zi/CVE-2025-33053_PoC: POC exploit for CVE-2025-33053 (External control of file execution path in URL file)
POC exploit for CVE-2025-33053 (External control of file execution path in URL file) - 4n4s4zi/CVE-2025-33053_PoC
GitHub监控消息提醒!!!
更新了:RCE
描述:Over 207,000 Remote Code Execution (RCE) payloads
URL:https://github.com/ahmad-kabiri/rcpayloadgen
标签:#RCE
更新了:RCE
描述:Over 207,000 Remote Code Execution (RCE) payloads
URL:https://github.com/ahmad-kabiri/rcpayloadgen
标签:#RCE
GitHub
GitHub - kabiri-labs/rcpayloadgen: RCEPayloadGen is an advanced payload library with 100,000+ curated Remote Code Execution (RCE)…
RCEPayloadGen is an advanced payload library with 100,000+ curated Remote Code Execution (RCE) payloads. Categorized by vector, language, and exploitation technique; designed for automated testing,...
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/JGoyd/glass-cage-ios18-cve-2025-24085-cve-2025-24201
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/JGoyd/glass-cage-ios18-cve-2025-24085-cve-2025-24201
标签:#RCE
GitHub
GitHub - JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201: Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing…
Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), then WebKit(CVE-2025-24201) and Core Media(CVE-2025-24085) t...
GitHub监控消息提醒!!!
更新了:代码审计
描述:CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。
URL:https://github.com/a1265137718/042_houserent2-public
标签:#代码审计
更新了:代码审计
描述:CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。
URL:https://github.com/a1265137718/042_houserent2-public
标签:#代码审计
GitHub
GitHub - a1265137718/042_houserent2-public: 基于Springboot的房屋租赁系统(源代码+数据库) 本项目分为管理员、经纪人、维修员、普通用户四种角色 管理员角色包含以下功能: - 房源管理 所有房源、待审…
基于Springboot的房屋租赁系统(源代码+数据库) 本项目分为管理员、经纪人、维修员、普通用户四种角色 管理员角色包含以下功能: - 房源管理 所有房源、待审核房源、添加房源、我的房源、房源出租 - 账户管理 用户管理、员工管理 - 统计管理 出租量统计,出租金额统计 - 收租管理 已出租房源,待交租房源,已交租房源 - 房屋报修管理 用户角色包含以下功能: - 看房、关注房源、联系中...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-43960 - PHP Object Injection en Adminer < 4.8.1 con Monolog (DoS)
URL:https://github.com/far00t01/CVE-2025-43960
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-43960 - PHP Object Injection en Adminer < 4.8.1 con Monolog (DoS)
URL:https://github.com/far00t01/CVE-2025-43960
标签:#CVE-2025
GitHub
GitHub - far00t01/CVE-2025-43960: CVE-2025-43960 - PHP Object Injection en Adminer < 4.8.1 con Monolog (DoS)
CVE-2025-43960 - PHP Object Injection en Adminer < 4.8.1 con Monolog (DoS) - far00t01/CVE-2025-43960
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC éducatif pour la vulnérabilité CVE-2025-8671 (DoS HTTP/2 sur lighttpd). À utiliser uniquement en laboratoire local.
URL:https://github.com/abiyeenzo/CVE-2025-8671
标签:#CVE-2025
更新了:CVE-2025
描述:PoC éducatif pour la vulnérabilité CVE-2025-8671 (DoS HTTP/2 sur lighttpd). À utiliser uniquement en laboratoire local.
URL:https://github.com/abiyeenzo/CVE-2025-8671
标签:#CVE-2025
GitHub
GitHub - abiyeenzo/CVE-2025-8671: PoC éducatif pour la vulnérabilité CVE-2025-8671 (DoS HTTP/2 sur lighttpd). À utiliser uniquement…
PoC éducatif pour la vulnérabilité CVE-2025-8671 (DoS HTTP/2 sur lighttpd). À utiliser uniquement en laboratoire local. - abiyeenzo/CVE-2025-8671