GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A high-performance, memory-safe implementation of the WinRAR CVE-2025-8088 exploit tool, rewritten in Rust for better reliability and performance.
URL:https://github.com/Kastowm/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
更新了:CVE-2025
描述:A high-performance, memory-safe implementation of the WinRAR CVE-2025-8088 exploit tool, rewritten in Rust for better reliability and performance.
URL:https://github.com/Kastowm/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:内网渗透
描述:FlyWheel is an intranet penetration aid developed based on Rust FlyWheel是一个基于Rust开发的内网渗透辅助工具
URL:https://github.com/BlkSword/Fly-Wheel
标签:#内网渗透
更新了:内网渗透
描述:FlyWheel is an intranet penetration aid developed based on Rust FlyWheel是一个基于Rust开发的内网渗透辅助工具
URL:https://github.com/BlkSword/Fly-Wheel
标签:#内网渗透
GitHub
GitHub - BlkSword/Fly-Wheel: FlyWheel is an intranet penetration aid developed based on Rust FlyWheel是一个基于Rust开发的内网渗透辅助工具
FlyWheel is an intranet penetration aid developed based on Rust FlyWheel是一个基于Rust开发的内网渗透辅助工具 - BlkSword/Fly-Wheel
GitHub监控消息提醒!!!
更新了:代码审计
描述:基于Python 3.12 + PySide6 (Qt 6.6) 构建的多语言Windows代码审计工具
URL:https://github.com/ciligouai/ciligou
标签:#代码审计
更新了:代码审计
描述:基于Python 3.12 + PySide6 (Qt 6.6) 构建的多语言Windows代码审计工具
URL:https://github.com/ciligouai/ciligou
标签:#代码审计
GitHub
GitHub - ciligouai/ciligou: 磁力狗项目始于2020年,由一群热爱技术的开发者发起。我们注意到市场上缺乏一个真正开源、透明且用户友好的解决方案,因此决定创建一个公益开源项目来填补这个空白。 我们的使命 磁力狗的使命是为全球用…
磁力狗项目始于2020年,由一群热爱技术的开发者发起。我们注意到市场上缺乏一个真正开源、透明且用户友好的解决方案,因此决定创建一个公益开源项目来填补这个空白。 我们的使命 磁力狗的使命是为全球用户提供安全、便捷、高效的服务体验。我们相信技术应该服务于人类,而不是相反。通过开源的方式,我们希望能够: 提供透明、可审计的代码 建立活跃的开发者社区 推动技术创新和知识共享 为用户提供免费且高质...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-7771: Arbitrary physical memory and I/O port read/write via ThrottleStop driver
URL:https://github.com/U65535F/ThrottleStopPoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-7771: Arbitrary physical memory and I/O port read/write via ThrottleStop driver
URL:https://github.com/U65535F/ThrottleStopPoC
标签:#CVE-2025
GitHub
GitHub - fxrstor/ThrottleStopPoC: CVE-2025-7771: Arbitrary physical memory and I/O port read/write via ThrottleStop driver
CVE-2025-7771: Arbitrary physical memory and I/O port read/write via ThrottleStop driver - fxrstor/ThrottleStopPoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-7771: Arbitrary physical memory and I/O port read/write via ThrottleStop driver
URL:https://github.com/mrk336/From-EternalBlue-to-CVE-2025-2776-The-Evolution-of-an-SMB-Attack
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-7771: Arbitrary physical memory and I/O port read/write via ThrottleStop driver
URL:https://github.com/mrk336/From-EternalBlue-to-CVE-2025-2776-The-Evolution-of-an-SMB-Attack
标签:#CVE-2025
GitHub
GitHub - mrk336/From-EternalBlue-to-CVE-2025-2776-The-Evolution-of-an-SMB-Attack: It shook the world in 2017 and has evolved into…
It shook the world in 2017 and has evolved into today’s CVE‑2025‑2776. Microsoft still relies on SMBv1, this article will explain how attackers have tweaked the chain from a simple DLL to a full re...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:repo for CVE-2025-55349
URL:https://github.com/GoldenTicketLabs/CVE-2025-55349
标签:#CVE-2025
更新了:CVE-2025
描述:repo for CVE-2025-55349
URL:https://github.com/GoldenTicketLabs/CVE-2025-55349
标签:#CVE-2025
GitHub
GitHub - GoldenTicketLabs/CVE-2025-55349: repo for CVE-2025-55349
repo for CVE-2025-55349. Contribute to GoldenTicketLabs/CVE-2025-55349 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC de RCE en PostgreSQL — CVE-2025-8714
URL:https://github.com/orderby99/CVE-2025-8714-POC
标签:#CVE-2025
更新了:CVE-2025
描述:PoC de RCE en PostgreSQL — CVE-2025-8714
URL:https://github.com/orderby99/CVE-2025-8714-POC
标签:#CVE-2025
GitHub
GitHub - orderby99/CVE-2025-8714-POC: PoC de RCE en PostgreSQL — CVE-2025-8714
PoC de RCE en PostgreSQL — CVE-2025-8714. Contribute to orderby99/CVE-2025-8714-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-7775
URL:https://github.com/rxerium/CVE-2025-7775
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-7775
URL:https://github.com/rxerium/CVE-2025-7775
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-7775: Detection for CVE-2025-7775
Detection for CVE-2025-7775. Contribute to rxerium/CVE-2025-7775 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:repo for CVE-2025-52413
URL:https://github.com/GoldenTicketLabs/CVE-2025-52413
标签:#CVE-2025
更新了:CVE-2025
描述:repo for CVE-2025-52413
URL:https://github.com/GoldenTicketLabs/CVE-2025-52413
标签:#CVE-2025
GitHub
GitHub - GoldenTicketLabs/CVE-2025-52413: repo for CVE-2025-52413
repo for CVE-2025-52413. Contribute to GoldenTicketLabs/CVE-2025-52413 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-4427 and CVE-2025-4428
URL:https://github.com/rxerium/CVE-2025-4427-CVE-2025-4428
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-4427 and CVE-2025-4428
URL:https://github.com/rxerium/CVE-2025-4427-CVE-2025-4428
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-4427-CVE-2025-4428: Detection for CVE-2025-4427 and CVE-2025-4428
Detection for CVE-2025-4427 and CVE-2025-4428. Contribute to rxerium/CVE-2025-4427-CVE-2025-4428 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Remediation of Microsoft Teams RCE vulnerability (Plugin ID: 250276, Aug 2025) with before/after evidence.
URL:https://github.com/birukG09/veeam-rce-remediation-kit
标签:#RCE
更新了:RCE
描述:Remediation of Microsoft Teams RCE vulnerability (Plugin ID: 250276, Aug 2025) with before/after evidence.
URL:https://github.com/birukG09/veeam-rce-remediation-kit
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Pterodactyl Panel 1.11.11 - Remote Code Execution (RCE)
URL:https://github.com/exeller56/Pterodactyl-Exploit
标签:#RCE
更新了:RCE
描述:Pterodactyl Panel 1.11.11 - Remote Code Execution (RCE)
URL:https://github.com/exeller56/Pterodactyl-Exploit
标签:#RCE
GitHub
GitHub - exeller56/Pterodactyl-Exploit: Pterodactyl Panel 1.11.11 - Remote Code Execution (RCE)
Pterodactyl Panel 1.11.11 - Remote Code Execution (RCE) - exeller56/Pterodactyl-Exploit
GitHub监控消息提醒!!!
更新了:RCE
描述:这是一个增强版的 Telerik UI 远程代码执行漏洞扫描工具,支持多种测试模式和自定义配置。
URL:https://github.com/hnytgl/TelerikUI-RCE
标签:#RCE
更新了:RCE
描述:这是一个增强版的 Telerik UI 远程代码执行漏洞扫描工具,支持多种测试模式和自定义配置。
URL:https://github.com/hnytgl/TelerikUI-RCE
标签:#RCE
GitHub
GitHub - hnytgl/TelerikUI-RCE: 这是一个增强版的 Telerik UI 远程代码执行漏洞扫描工具,支持多种测试模式和自定义配置。
这是一个增强版的 Telerik UI 远程代码执行漏洞扫描工具,支持多种测试模式和自定义配置。. Contribute to hnytgl/TelerikUI-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:这是一个增强版的 Telerik UI 远程代码执行漏洞扫描工具,支持多种测试模式和自定义配置。
URL:https://github.com/kishwordulal1234/DorkBox
标签:#RCE
更新了:RCE
描述:这是一个增强版的 Telerik UI 远程代码执行漏洞扫描工具,支持多种测试模式和自定义配置。
URL:https://github.com/kishwordulal1234/DorkBox
标签:#RCE
GitHub
GitHub - kishwordulal1234/DorkBox: 🔍 Comprehensive collection of Google dorks for security research, penetration testing, and bug…
🔍 Comprehensive collection of Google dorks for security research, penetration testing, and bug bounty hunting. From SQL injection to XSS, RCE to file uploads - all vulnerability types covered with ...
👍1
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:这个仓库收集了所有在 GitHub 上能找到的 CVE 漏洞利用工具。 This repository collects all CVE exploits found on GitHub.
URL:https://github.com/NeilYuan2002/csapplabs
标签:#漏洞利用
更新了:漏洞利用
描述:这个仓库收集了所有在 GitHub 上能找到的 CVE 漏洞利用工具。 This repository collects all CVE exploits found on GitHub.
URL:https://github.com/NeilYuan2002/csapplabs
标签:#漏洞利用
GitHub
GitHub - NeilYuan2002/csapplabs: 简介如下: datalab:完成一系列的二进制相关的位操作 bomblab:利用反编译手段查看一个“炸弹”程序的汇编代码,配合GDB调试从而拆除“炸弹”程序 attacklab:利用堆栈…
简介如下: datalab:完成一系列的二进制相关的位操作 bomblab:利用反编译手段查看一个“炸弹”程序的汇编代码,配合GDB调试从而拆除“炸弹”程序 attacklab:利用堆栈溢出的漏洞,向目标代码插入特定字符,从而使目标程序跳转到自己期望的地方,技术包括注入式代码攻击和面向返回攻击 cachelab:用c语言实现一个cache的软件模拟,可传参控制缓存的大小,组数量,块数量等 s...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一款高效、强大的子域名爬取工具,结合 Google 和 Firefox 浏览器的优势,帮助安全研究者和渗透测试人员快速收集目标域名的子域名信息
URL:https://github.com/Bifishone/GoogleFirefoxDomain
标签:#渗透测试
更新了:渗透测试
描述:一款高效、强大的子域名爬取工具,结合 Google 和 Firefox 浏览器的优势,帮助安全研究者和渗透测试人员快速收集目标域名的子域名信息
URL:https://github.com/Bifishone/GoogleFirefoxDomain
标签:#渗透测试
GitHub
GitHub - Bifishone/GoogleFirefoxDomain: 一款高效、强大的子域名爬取工具,结合 Google 和 Firefox 浏览器的优势,帮助安全研究者和渗透测试人员快速收集目标域名的子域名信息
一款高效、强大的子域名爬取工具,结合 Google 和 Firefox 浏览器的优势,帮助安全研究者和渗透测试人员快速收集目标域名的子域名信息 - Bifishone/GoogleFirefoxDomain
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Letting attackers run malicious code without needing a cracked password, user interaction, or even a foothold in your network. That’s CVE-2025-27480
URL:https://github.com/mrk336/CVE-2025-27480-The-Silent-Gateway-Risk
标签:#CVE-2025
更新了:CVE-2025
描述:Letting attackers run malicious code without needing a cracked password, user interaction, or even a foothold in your network. That’s CVE-2025-27480
URL:https://github.com/mrk336/CVE-2025-27480-The-Silent-Gateway-Risk
标签:#CVE-2025
GitHub
GitHub - mrk336/CVE-2025-27480-The-Silent-Gateway-Risk: Letting attackers run malicious code without needing a cracked password…
Letting attackers run malicious code without needing a cracked password, user interaction, or even a foothold in your network. That’s CVE-2025-27480 - mrk336/CVE-2025-27480-The-Silent-Gateway-Risk
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-27591 – Local privilege escalation in the below monitoring tool. By symlinking its log file to /etc/passwd, an attacker can inject a root account and gain full system compromise.
URL:https://github.com/danil-koltsov/below-log-race-poc
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-27591 – Local privilege escalation in the below monitoring tool. By symlinking its log file to /etc/passwd, an attacker can inject a root account and gain full system compromise.
URL:https://github.com/danil-koltsov/below-log-race-poc
标签:#CVE-2025
GitHub
GitHub - danil-koltsov/below-log-race-poc: PoC for CVE-2025-27591 – Local privilege escalation in the below monitoring tool. By…
PoC for CVE-2025-27591 – Local privilege escalation in the below monitoring tool. By symlinking its log file to /etc/passwd, an attacker can inject a root account and gain full system compromise. -...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Sawtooth Lighthouse Studio存在模板注入漏洞CVE-2025-34300
URL:https://github.com/jisi-001/CVE-2025-34300POC
标签:#CVE-2025
更新了:CVE-2025
描述:Sawtooth Lighthouse Studio存在模板注入漏洞CVE-2025-34300
URL:https://github.com/jisi-001/CVE-2025-34300POC
标签:#CVE-2025
GitHub
GitHub - jisi-001/CVE-2025-34300POC: Sawtooth Lighthouse Studio存在模板注入漏洞CVE-2025-34300
Sawtooth Lighthouse Studio存在模板注入漏洞CVE-2025-34300. Contribute to jisi-001/CVE-2025-34300POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Remote code execution (RCE) through insecure deserialization
URL:https://github.com/blueisbeautiful/CVE-2025-53691
标签:#CVE-2025
更新了:CVE-2025
描述:Remote code execution (RCE) through insecure deserialization
URL:https://github.com/blueisbeautiful/CVE-2025-53691
标签:#CVE-2025
GitHub
GitHub - brokendreamsclub/CVE-2025-53691: Remote code execution (RCE) through insecure deserialization
Remote code execution (RCE) through insecure deserialization - brokendreamsclub/CVE-2025-53691