GitHub监控消息提醒!!!
更新了:弱口令
描述:一个本地弱口令爆破练习工具,基于 Python 编写。
URL:https://github.com/shiyang67/safe_bruteforce
标签:#弱口令
更新了:弱口令
描述:一个本地弱口令爆破练习工具,基于 Python 编写。
URL:https://github.com/shiyang67/safe_bruteforce
标签:#弱口令
GitHub
GitHub - shiyang67/safe_bruteforce: 一个本地弱口令爆破练习工具,基于 Python 编写。
一个本地弱口令爆破练习工具,基于 Python 编写。 . Contribute to shiyang67/safe_bruteforce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:hvv
描述:This is GitOps repository for rlt3hvvky-nodejs
URL:https://github.com/rhtap-rhdh-qe/rlt3hvvky-nodejs-gitops
标签:#hvv
更新了:hvv
描述:This is GitOps repository for rlt3hvvky-nodejs
URL:https://github.com/rhtap-rhdh-qe/rlt3hvvky-nodejs-gitops
标签:#hvv
GitHub
GitHub - rhtap-rhdh-qe/rlt3hvvky-nodejs-gitops: This is GitOps repository for rlt3hvvky-nodejs
This is GitOps repository for rlt3hvvky-nodejs. Contribute to rhtap-rhdh-qe/rlt3hvvky-nodejs-gitops development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for CVE-2025-32463 sudo_chwoot
URL:https://github.com/Yuy0ung/CVE-2025-32463_chwoot
标签:#CVE-2025
更新了:CVE-2025
描述:POC for CVE-2025-32463 sudo_chwoot
URL:https://github.com/Yuy0ung/CVE-2025-32463_chwoot
标签:#CVE-2025
GitHub
GitHub - Yuy0ung/CVE-2025-32463_chwoot: 用于CVE-2025-32463 sudo_chwoot的权限提升POC,适配了有gcc编译环境和无gcc编译环境的两种情况,下载运行即可一把梭哈
用于CVE-2025-32463 sudo_chwoot的权限提升POC,适配了有gcc编译环境和无gcc编译环境的两种情况,下载运行即可一把梭哈 - Yuy0ung/CVE-2025-32463_chwoot
GitHub监控消息提醒!!!
更新了:sql注入
描述:外网渗透学习笔记,包含常见漏洞复现(SQL 注入 / XSS / 文件上传 / SSRF)
URL:https://github.com/QYUN-R/Web-Penetration
标签:#sql注入
更新了:sql注入
描述:外网渗透学习笔记,包含常见漏洞复现(SQL 注入 / XSS / 文件上传 / SSRF)
URL:https://github.com/QYUN-R/Web-Penetration
标签:#sql注入
GitHub
GitHub - QYUN-R/Web-Penetration: 外网渗透学习笔记,包含常见漏洞复现(SQL 注入 / XSS / 文件上传 / SSRF)
外网渗透学习笔记,包含常见漏洞复现(SQL 注入 / XSS / 文件上传 / SSRF). Contribute to QYUN-R/Web-Penetration development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A high-performance, memory-safe implementation of the WinRAR CVE-2025-8088 exploit tool, rewritten in Rust for better reliability and performance.
URL:https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition
标签:#CVE-2025
更新了:CVE-2025
描述:A high-performance, memory-safe implementation of the WinRAR CVE-2025-8088 exploit tool, rewritten in Rust for better reliability and performance.
URL:https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition
标签:#CVE-2025
GitHub
GitHub - kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition: A high-performance, memory-safe implementation of the WinRAR CVE-2025…
A high-performance, memory-safe implementation of the WinRAR CVE-2025-8088 exploit tool, rewritten in Rust for better reliability and performance. - kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition
GitHub监控消息提醒!!!
更新了:漏洞挖掘
描述:漏洞挖掘神器 | 浏览器插件 | 发现页面和JS中的隐藏接口和敏感信息、URL批量打开 & Vulnerability Mining Tool | Browser Plugin | Discover Hidden Interfaces, Sensitive Information in Pages and JS, Open Multiple URLs | Notepad
URL:https://github.com/JIAChenyu525/-
标签:#漏洞挖掘
更新了:漏洞挖掘
描述:漏洞挖掘神器 | 浏览器插件 | 发现页面和JS中的隐藏接口和敏感信息、URL批量打开 & Vulnerability Mining Tool | Browser Plugin | Discover Hidden Interfaces, Sensitive Information in Pages and JS, Open Multiple URLs | Notepad
URL:https://github.com/JIAChenyu525/-
标签:#漏洞挖掘
GitHub
GitHub - JIAChenyu525/-: 本项目围绕淘宝电商数据,聚焦 “用户行为洞察与销售优化” ,贯穿数据分析全流程。 通过 Python(Pandas) 清洗数据,处理缺失/异常值,构建用户行为时间序列,划分新用户、活跃及流失标签;从…
本项目围绕淘宝电商数据,聚焦 “用户行为洞察与销售优化” ,贯穿数据分析全流程。 通过 Python(Pandas) 清洗数据,处理缺失/异常值,构建用户行为时间序列,划分新用户、活跃及流失标签;从 转化漏斗(点击→购买路径)、RFM模型 分群、Apriori算法 挖掘商品关联,到分析购买季节性差异,多维度拆解规律。 借助 Tableau/Matplotlib 搭建销售仪表盘,可视化...
GitHub监控消息提醒!!!
更新了:代码审计
描述:适合Java Web入门,以及基本的Java代码审计。
URL:https://github.com/chancx1/java_sec
标签:#代码审计
更新了:代码审计
描述:适合Java Web入门,以及基本的Java代码审计。
URL:https://github.com/chancx1/java_sec
标签:#代码审计
GitHub
GitHub - chancx1/java_sec: 适合Java Web入门,以及基本的Java代码审计。
适合Java Web入门,以及基本的Java代码审计。. Contribute to chancx1/java_sec development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:MicroSoft SharePoint ToolPane Exploit CVE-2025-53770
URL:https://github.com/guinea-offensive-security/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:MicroSoft SharePoint ToolPane Exploit CVE-2025-53770
URL:https://github.com/guinea-offensive-security/CVE-2025-53770
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of concept written in Python targeting memory overflow vulnerability leading to remote code execution in CVE-2025-7775
URL:https://github.com/mezo0x4/CVE-2025-7775
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of concept written in Python targeting memory overflow vulnerability leading to remote code execution in CVE-2025-7775
URL:https://github.com/mezo0x4/CVE-2025-7775
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Authenticated low-privileged RCE in Coolify via unsanitized shell commands in the Git Repository field.
URL:https://github.com/Eyodav/CVE-2025-34161
标签:#RCE
更新了:RCE
描述:Authenticated low-privileged RCE in Coolify via unsanitized shell commands in the Git Repository field.
URL:https://github.com/Eyodav/CVE-2025-34161
标签:#RCE
GitHub
GitHub - Eyodav/CVE-2025-34161: Authenticated low-privileged RCE in Coolify via unsanitized shell commands in the Git Repository…
Authenticated low-privileged RCE in Coolify via unsanitized shell commands in the Git Repository field. - Eyodav/CVE-2025-34161
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:IOS audio buffer overflow CVE-2025-31200 POC
URL:https://github.com/hunters-sec/CVE-2025-31200
标签:#CVE-2025
更新了:CVE-2025
描述:IOS audio buffer overflow CVE-2025-31200 POC
URL:https://github.com/hunters-sec/CVE-2025-31200
标签:#CVE-2025
GitHub
GitHub - hunters-sec/CVE-2025-31200: IOS audio buffer overflow CVE-2025-31200 POC
IOS audio buffer overflow CVE-2025-31200 POC. Contribute to hunters-sec/CVE-2025-31200 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:必应壁纸信息收集器
URL:https://github.com/hippieZhou/BingWallpaperCollector
标签:#信息收集
更新了:信息收集
描述:必应壁纸信息收集器
URL:https://github.com/hippieZhou/BingWallpaperCollector
标签:#信息收集
GitHub
GitHub - hippieZhou/BingWallpaperCollector: 基于 C# 和 .NET 9.0 开发的多语言必应壁纸信息收集工具,支持 14 个国家/地区的本地化壁纸信息收集。
基于 C# 和 .NET 9.0 开发的多语言必应壁纸信息收集工具,支持 14 个国家/地区的本地化壁纸信息收集。 - hippieZhou/BingWallpaperCollector
GitHub监控消息提醒!!!
更新了:RCE
描述:Firmware Libraries for RCE Platform Development
URL:https://github.com/slaclab/rce-gen3-fw-lib
标签:#RCE
更新了:RCE
描述:Firmware Libraries for RCE Platform Development
URL:https://github.com/slaclab/rce-gen3-fw-lib
标签:#RCE
GitHub
GitHub - slaclab/rce-gen3-fw-lib: Firmware Libraries for RCE Platform Development
Firmware Libraries for RCE Platform Development. Contribute to slaclab/rce-gen3-fw-lib development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Built to call on CVE-2025-48384-PoC-Part2 for RCE
URL:https://github.com/butyraldehyde/CVE-2025-48384-PoC
标签:#RCE
更新了:RCE
描述:Built to call on CVE-2025-48384-PoC-Part2 for RCE
URL:https://github.com/butyraldehyde/CVE-2025-48384-PoC
标签:#RCE
GitHub
GitHub - butyraldehyde/CVE-2025-48384-PoC: Built to call on CVE-2025-48384-PoC-Part2 for RCE
Built to call on CVE-2025-48384-PoC-Part2 for RCE. Contribute to butyraldehyde/CVE-2025-48384-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:C# tool for transforming XML using XSLT. Script execution is allowed in XSLT, which can lead to RCE if untrusted XSL files are loaded.
URL:https://github.com/InfoSec-Crow/XSLT-Injection
标签:#RCE
更新了:RCE
描述:C# tool for transforming XML using XSLT. Script execution is allowed in XSLT, which can lead to RCE if untrusted XSL files are loaded.
URL:https://github.com/InfoSec-Crow/XSLT-Injection
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Analyze CVE-2025-5419 to understand its impact and mitigate risks effectively in your systems.
URL:https://github.com/pavan3478/CVE-2025-5419
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Analyze CVE-2025-5419 to understand its impact and mitigate risks effectively in your systems.
URL:https://github.com/pavan3478/CVE-2025-5419
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-48384
URL:https://github.com/jacobholtz/CVE-2025-48384-poc
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-48384
URL:https://github.com/jacobholtz/CVE-2025-48384-poc
标签:#CVE-2025
GitHub
GitHub - jacobholtz/CVE-2025-48384-poc: PoC for CVE-2025-48384
PoC for CVE-2025-48384. Contribute to jacobholtz/CVE-2025-48384-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:KALI_MCP_SERVER —— 一个基于配置的容器化安全自动化平台,通过 JSON-RPC 统一编排和调用渗透测试工具。
URL:https://github.com/taopeng-life/KALI_MCP_SERVER
标签:#渗透测试
更新了:渗透测试
描述:KALI_MCP_SERVER —— 一个基于配置的容器化安全自动化平台,通过 JSON-RPC 统一编排和调用渗透测试工具。
URL:https://github.com/taopeng-life/KALI_MCP_SERVER
标签:#渗透测试
GitHub
GitHub - taopeng-life/KALI_MCP_SERVER: KALI_MCP_SERVER —— 一个基于配置的容器化安全自动化平台,通过 JSON-RPC 统一编排和调用渗透测试工具。
KALI_MCP_SERVER —— 一个基于配置的容器化安全自动化平台,通过 JSON-RPC 统一编排和调用渗透测试工具。 - taopeng-life/KALI_MCP_SERVER