GitHub监控消息提醒!!!
更新了:RCE
描述:Authenticated low-privileged RCE in Coolify via unsanitized shell commands in the Git Repository field.
URL:https://github.com/Eyodav/CVE-2025-34161
标签:#RCE
更新了:RCE
描述:Authenticated low-privileged RCE in Coolify via unsanitized shell commands in the Git Repository field.
URL:https://github.com/Eyodav/CVE-2025-34161
标签:#RCE
GitHub
GitHub - Eyodav/CVE-2025-34161: Authenticated low-privileged RCE in Coolify via unsanitized shell commands in the Git Repository…
Authenticated low-privileged RCE in Coolify via unsanitized shell commands in the Git Repository field. - Eyodav/CVE-2025-34161
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:IOS audio buffer overflow CVE-2025-31200 POC
URL:https://github.com/hunters-sec/CVE-2025-31200
标签:#CVE-2025
更新了:CVE-2025
描述:IOS audio buffer overflow CVE-2025-31200 POC
URL:https://github.com/hunters-sec/CVE-2025-31200
标签:#CVE-2025
GitHub
GitHub - hunters-sec/CVE-2025-31200: IOS audio buffer overflow CVE-2025-31200 POC
IOS audio buffer overflow CVE-2025-31200 POC. Contribute to hunters-sec/CVE-2025-31200 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:必应壁纸信息收集器
URL:https://github.com/hippieZhou/BingWallpaperCollector
标签:#信息收集
更新了:信息收集
描述:必应壁纸信息收集器
URL:https://github.com/hippieZhou/BingWallpaperCollector
标签:#信息收集
GitHub
GitHub - hippieZhou/BingWallpaperCollector: 基于 C# 和 .NET 9.0 开发的多语言必应壁纸信息收集工具,支持 14 个国家/地区的本地化壁纸信息收集。
基于 C# 和 .NET 9.0 开发的多语言必应壁纸信息收集工具,支持 14 个国家/地区的本地化壁纸信息收集。 - hippieZhou/BingWallpaperCollector
GitHub监控消息提醒!!!
更新了:RCE
描述:Firmware Libraries for RCE Platform Development
URL:https://github.com/slaclab/rce-gen3-fw-lib
标签:#RCE
更新了:RCE
描述:Firmware Libraries for RCE Platform Development
URL:https://github.com/slaclab/rce-gen3-fw-lib
标签:#RCE
GitHub
GitHub - slaclab/rce-gen3-fw-lib: Firmware Libraries for RCE Platform Development
Firmware Libraries for RCE Platform Development. Contribute to slaclab/rce-gen3-fw-lib development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Built to call on CVE-2025-48384-PoC-Part2 for RCE
URL:https://github.com/butyraldehyde/CVE-2025-48384-PoC
标签:#RCE
更新了:RCE
描述:Built to call on CVE-2025-48384-PoC-Part2 for RCE
URL:https://github.com/butyraldehyde/CVE-2025-48384-PoC
标签:#RCE
GitHub
GitHub - butyraldehyde/CVE-2025-48384-PoC: Built to call on CVE-2025-48384-PoC-Part2 for RCE
Built to call on CVE-2025-48384-PoC-Part2 for RCE. Contribute to butyraldehyde/CVE-2025-48384-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:C# tool for transforming XML using XSLT. Script execution is allowed in XSLT, which can lead to RCE if untrusted XSL files are loaded.
URL:https://github.com/InfoSec-Crow/XSLT-Injection
标签:#RCE
更新了:RCE
描述:C# tool for transforming XML using XSLT. Script execution is allowed in XSLT, which can lead to RCE if untrusted XSL files are loaded.
URL:https://github.com/InfoSec-Crow/XSLT-Injection
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Analyze CVE-2025-5419 to understand its impact and mitigate risks effectively in your systems.
URL:https://github.com/pavan3478/CVE-2025-5419
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Analyze CVE-2025-5419 to understand its impact and mitigate risks effectively in your systems.
URL:https://github.com/pavan3478/CVE-2025-5419
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-48384
URL:https://github.com/jacobholtz/CVE-2025-48384-poc
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-48384
URL:https://github.com/jacobholtz/CVE-2025-48384-poc
标签:#CVE-2025
GitHub
GitHub - jacobholtz/CVE-2025-48384-poc: PoC for CVE-2025-48384
PoC for CVE-2025-48384. Contribute to jacobholtz/CVE-2025-48384-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:KALI_MCP_SERVER —— 一个基于配置的容器化安全自动化平台,通过 JSON-RPC 统一编排和调用渗透测试工具。
URL:https://github.com/taopeng-life/KALI_MCP_SERVER
标签:#渗透测试
更新了:渗透测试
描述:KALI_MCP_SERVER —— 一个基于配置的容器化安全自动化平台,通过 JSON-RPC 统一编排和调用渗透测试工具。
URL:https://github.com/taopeng-life/KALI_MCP_SERVER
标签:#渗透测试
GitHub
GitHub - taopeng-life/KALI_MCP_SERVER: KALI_MCP_SERVER —— 一个基于配置的容器化安全自动化平台,通过 JSON-RPC 统一编排和调用渗透测试工具。
KALI_MCP_SERVER —— 一个基于配置的容器化安全自动化平台,通过 JSON-RPC 统一编排和调用渗透测试工具。 - taopeng-life/KALI_MCP_SERVER
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:致远OA存在文件上传导致RCE(CVE-2025-34040)
URL:https://github.com/jisi-001/CVE-2025-34040Exp
标签:#CVE-2025
更新了:CVE-2025
描述:致远OA存在文件上传导致RCE(CVE-2025-34040)
URL:https://github.com/jisi-001/CVE-2025-34040Exp
标签:#CVE-2025
GitHub
GitHub - jisi-001/CVE-2025-34040Exp: 致远OA存在文件上传导致RCE(CVE-2025-34040)
致远OA存在文件上传导致RCE(CVE-2025-34040). Contribute to jisi-001/CVE-2025-34040Exp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Heap overflow PoC for CivetWeb CVE-2025-55763
URL:https://github.com/krispybyte/CVE-2025-55763
标签:#CVE-2025
更新了:CVE-2025
描述:Heap overflow PoC for CivetWeb CVE-2025-55763
URL:https://github.com/krispybyte/CVE-2025-55763
标签:#CVE-2025
GitHub
GitHub - krispybyte/CVE-2025-55763: Heap overflow PoC for CivetWeb CVE-2025-55763
Heap overflow PoC for CivetWeb CVE-2025-55763. Contribute to krispybyte/CVE-2025-55763 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is repository contains a script to check for current IOCs listed in the freepbx forum topic of the CVE-2025-57819
URL:https://github.com/Sucuri-Labs/CVE-2025-57819-ioc-check
标签:#CVE-2025
更新了:CVE-2025
描述:This is repository contains a script to check for current IOCs listed in the freepbx forum topic of the CVE-2025-57819
URL:https://github.com/Sucuri-Labs/CVE-2025-57819-ioc-check
标签:#CVE-2025
GitHub
GitHub - Sucuri-Labs/CVE-2025-57819-ioc-check: This is repository contains a script to check for current IOCs listed in the freepbx…
This is repository contains a script to check for current IOCs listed in the freepbx forum topic of the CVE-2025-57819 - Sucuri-Labs/CVE-2025-57819-ioc-check
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Custom IPC Client and Proof of Concept exploit for CVE-2025-0309 (Netskope Windows Client LPE)
URL:https://github.com/AC8999/CVE-2025-49113
标签:#CVE-2025
更新了:CVE-2025
描述:Custom IPC Client and Proof of Concept exploit for CVE-2025-0309 (Netskope Windows Client LPE)
URL:https://github.com/AC8999/CVE-2025-49113
标签:#CVE-2025
GitHub
GitHub - AC8999/CVE-2025-49113: Python Script for CVE-2025-49113. Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows…
Python Script for CVE-2025-49113. Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated i...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization
URL:https://github.com/LeakForge/CVE-2025-49113
标签:#CVE-2025
更新了:CVE-2025
描述:Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization
URL:https://github.com/LeakForge/CVE-2025-49113
标签:#CVE-2025
GitHub
GitHub - LeakForge/CVE-2025-49113: Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization
Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization - LeakForge/CVE-2025-49113
GitHub监控消息提醒!!!
更新了:RCE
描述:Pet Grooming Management RCE
URL:https://github.com/drew-byte/Pet-Grooming-Management-RCE
标签:#RCE
更新了:RCE
描述:Pet Grooming Management RCE
URL:https://github.com/drew-byte/Pet-Grooming-Management-RCE
标签:#RCE
GitHub
GitHub - drew-byte/Pet-Grooming-Management-RCE: Pet Grooming Management RCE
Pet Grooming Management RCE. Contribute to drew-byte/Pet-Grooming-Management-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A hacking challenge (CTF) - try to get RCE out of it!
URL:https://github.com/r3dpower/ImportTroubles
标签:#RCE
更新了:RCE
描述:A hacking challenge (CTF) - try to get RCE out of it!
URL:https://github.com/r3dpower/ImportTroubles
标签:#RCE
GitHub
GitHub - r3dpower/ImportTroubles: A hacking challenge (CTF) - try to get RCE out of it!
A hacking challenge (CTF) - try to get RCE out of it! - r3dpower/ImportTroubles
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A high-performance, memory-safe implementation of the WinRAR CVE-2025-8088 exploit tool, rewritten in Rust for better reliability and performance.
URL:https://github.com/Kastowm/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
更新了:CVE-2025
描述:A high-performance, memory-safe implementation of the WinRAR CVE-2025-8088 exploit tool, rewritten in Rust for better reliability and performance.
URL:https://github.com/Kastowm/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:内网渗透
描述:FlyWheel is an intranet penetration aid developed based on Rust FlyWheel是一个基于Rust开发的内网渗透辅助工具
URL:https://github.com/BlkSword/Fly-Wheel
标签:#内网渗透
更新了:内网渗透
描述:FlyWheel is an intranet penetration aid developed based on Rust FlyWheel是一个基于Rust开发的内网渗透辅助工具
URL:https://github.com/BlkSword/Fly-Wheel
标签:#内网渗透
GitHub
GitHub - BlkSword/Fly-Wheel: FlyWheel is an intranet penetration aid developed based on Rust FlyWheel是一个基于Rust开发的内网渗透辅助工具
FlyWheel is an intranet penetration aid developed based on Rust FlyWheel是一个基于Rust开发的内网渗透辅助工具 - BlkSword/Fly-Wheel