GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Real-world patching workflow for CVE-2025-32709. From hotfix install to SIEM alert validation—this repo documents every step with screenshots, commands, and detection logic.
URL:https://github.com/AdnanSiyat/How-to-Patch-CVE-2025-32709
标签:#CVE-2025
更新了:CVE-2025
描述:Real-world patching workflow for CVE-2025-32709. From hotfix install to SIEM alert validation—this repo documents every step with screenshots, commands, and detection logic.
URL:https://github.com/AdnanSiyat/How-to-Patch-CVE-2025-32709
标签:#CVE-2025
GitHub
GitHub - AdnanSiyat/How-to-Patch-CVE-2025-32709: Real-world patching workflow for CVE-2025-32709. From hotfix install to SIEM alert…
Real-world patching workflow for CVE-2025-32709. From hotfix install to SIEM alert validation—this repo documents every step with screenshots, commands, and detection logic. - AdnanSiyat/How-to-Pat...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A PDF generator for CVE-2025-54988
URL:https://github.com/mgthuramoemyint/POC-CVE-2025-54988
标签:#CVE-2025
更新了:CVE-2025
描述:A PDF generator for CVE-2025-54988
URL:https://github.com/mgthuramoemyint/POC-CVE-2025-54988
标签:#CVE-2025
GitHub
GitHub - mgthuramoemyint/POC-CVE-2025-54988: A PDF generator for CVE-2025-54988
A PDF generator for CVE-2025-54988. Contribute to mgthuramoemyint/POC-CVE-2025-54988 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A PDF generator for CVE-2025-54988
URL:https://github.com/Reeadmon/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
标签:#CVE-2025
更新了:CVE-2025
描述:A PDF generator for CVE-2025-54988
URL:https://github.com/Reeadmon/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:FreePBX CVE-2025-57819 lab (Docker) + Nuclei POC for unauth SQLi (time-based).
URL:https://github.com/ImBIOS/lab-cve-2025-57819
标签:#CVE-2025
更新了:CVE-2025
描述:FreePBX CVE-2025-57819 lab (Docker) + Nuclei POC for unauth SQLi (time-based).
URL:https://github.com/ImBIOS/lab-cve-2025-57819
标签:#CVE-2025
GitHub
GitHub - ImBIOS/lab-cve-2025-57819: FreePBX CVE-2025-57819 lab (Docker) + Nuclei POC for unauth SQLi (time-based).
FreePBX CVE-2025-57819 lab (Docker) + Nuclei POC for unauth SQLi (time-based). - ImBIOS/lab-cve-2025-57819
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:FreePBX CVE-2025-57819 lab (Docker) + Nuclei POC for unauth SQLi (time-based).
URL:https://github.com/Reeadmon/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk
标签:#CVE-2025
更新了:CVE-2025
描述:FreePBX CVE-2025-57819 lab (Docker) + Nuclei POC for unauth SQLi (time-based).
URL:https://github.com/Reeadmon/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一个基于 FastAPI 和 Vue.js 的 Web 应用程序,旨在简化和自动化渗透测试报告的生成过程。
URL:https://github.com/xcmt/ABC_report
标签:#渗透测试
更新了:渗透测试
描述:一个基于 FastAPI 和 Vue.js 的 Web 应用程序,旨在简化和自动化渗透测试报告的生成过程。
URL:https://github.com/xcmt/ABC_report
标签:#渗透测试
GitHub
GitHub - xcmt/ABC_report: 一个基于 FastAPI 和 Vue.js 的 Web 应用程序,旨在简化和自动化渗透测试报告的生成过程。
一个基于 FastAPI 和 Vue.js 的 Web 应用程序,旨在简化和自动化渗透测试报告的生成过程。 - xcmt/ABC_report
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-1055 and CVE-2025-52915 using K7RKScan.sys
URL:https://github.com/diego-tella/CVE-2025-1055-poc
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-1055 and CVE-2025-52915 using K7RKScan.sys
URL:https://github.com/diego-tella/CVE-2025-1055-poc
标签:#CVE-2025
GitHub
GitHub - diego-tella/CVE-2025-1055-poc: PoC for CVE-2025-1055 and CVE-2025-52915 using K7RKScan.sys
PoC for CVE-2025-1055 and CVE-2025-52915 using K7RKScan.sys - diego-tella/CVE-2025-1055-poc
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/Riocipta75/lab-cve-2020-0610
标签:#RCE
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/Riocipta75/lab-cve-2020-0610
标签:#RCE
GitHub
GitHub - Riocipta75/lab-cve-2020-0610: 🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability…
🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques. - Riocipta75/lab-cve-2020-0610
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:FairPlay decryptor (dump iPA) for iOS Application that running on macOS with SIP-enabled, using CVE-2025-24204. Support macOS 15.0-15.2
URL:https://github.com/34306/decrypted
标签:#CVE-2025
更新了:CVE-2025
描述:FairPlay decryptor (dump iPA) for iOS Application that running on macOS with SIP-enabled, using CVE-2025-24204. Support macOS 15.0-15.2
URL:https://github.com/34306/decrypted
标签:#CVE-2025
GitHub
GitHub - 34306/decrypted: FairPlay decryptor (dump iPA) for iOS Application that running on macOS with SIP-enabled, using CVE-2025…
FairPlay decryptor (dump iPA) for iOS Application that running on macOS with SIP-enabled, using CVE-2025-24204. Support macOS 15.0-15.2 - 34306/decrypted
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-53690
URL:https://github.com/rxerium/CVE-2025-53690
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-53690
URL:https://github.com/rxerium/CVE-2025-53690
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-53690: Detection for CVE-2025-53690
Detection for CVE-2025-53690. Contribute to rxerium/CVE-2025-53690 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 in a Dockerized WordPress lab to test unrestricted file uploads via the Contact Form 7 plugin.
URL:https://github.com/MrSoules/lab-cve-2025-3515
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 in a Dockerized WordPress lab to test unrestricted file uploads via the Contact Form 7 plugin.
URL:https://github.com/MrSoules/lab-cve-2025-3515
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Remote Code Execution (RCE) via Polyglot File Attack and Null Byte Injection on Laravel FileManager
URL:https://github.com/ph-hitachi/CVE-2025-58440
标签:#CVE-2025
更新了:CVE-2025
描述:Remote Code Execution (RCE) via Polyglot File Attack and Null Byte Injection on Laravel FileManager
URL:https://github.com/ph-hitachi/CVE-2025-58440
标签:#CVE-2025
GitHub
GitHub - ph-hitachi/CVE-2025-58440: Remote Code Execution (RCE) via Polyglot File Attack and Null Byte Injection on Laravel FileManager
Remote Code Execution (RCE) via Polyglot File Attack and Null Byte Injection on Laravel FileManager - ph-hitachi/CVE-2025-58440
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Python script to execute CVE-2025-24071
URL:https://github.com/AC8999/CVE-2025-24071
标签:#CVE-2025
更新了:CVE-2025
描述:Python script to execute CVE-2025-24071
URL:https://github.com/AC8999/CVE-2025-24071
标签:#CVE-2025
GitHub
GitHub - AC8999/CVE-2025-24071: Python script to execute CVE-2025-24071
Python script to execute CVE-2025-24071. Contribute to AC8999/CVE-2025-24071 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is a EXP For CVE-2025-57576. PHPGurukul Online Shopping Portal 2.1 is vulnerable to Cross Site > Scripting (XSS) in /admin/updateorder.php
URL:https://github.com/p0et08/DWrwq
标签:#CVE-2025
更新了:CVE-2025
描述:This is a EXP For CVE-2025-57576. PHPGurukul Online Shopping Portal 2.1 is vulnerable to Cross Site > Scripting (XSS) in /admin/updateorder.php
URL:https://github.com/p0et08/DWrwq
标签:#CVE-2025
GitHub
GitHub - p0et08/DWrwq: This is a EXP For CVE-2025-57576. PHPGurukul Online Shopping Portal 2.1 is vulnerable to Cross Site > Scripting…
This is a EXP For CVE-2025-57576. PHPGurukul Online Shopping Portal 2.1 is vulnerable to Cross Site > Scripting (XSS) in /admin/updateorder.php - p0et08/DWrwq
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for the vuln CVE-2025-23210
URL:https://github.com/s0ck37/CVE-2025-23210-POC
标签:#CVE-2025
更新了:CVE-2025
描述:POC for the vuln CVE-2025-23210
URL:https://github.com/s0ck37/CVE-2025-23210-POC
标签:#CVE-2025
GitHub
GitHub - s0ck37/CVE-2025-22131-POC: POC for the vuln CVE-2025-22131
POC for the vuln CVE-2025-22131. Contribute to s0ck37/CVE-2025-22131-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for the vuln CVE-2025-22131
URL:https://github.com/s0ck37/CVE-2025-22131-POC
标签:#CVE-2025
更新了:CVE-2025
描述:POC for the vuln CVE-2025-22131
URL:https://github.com/s0ck37/CVE-2025-22131-POC
标签:#CVE-2025
GitHub
GitHub - s0ck37/CVE-2025-22131-POC: POC for the vuln CVE-2025-22131
POC for the vuln CVE-2025-22131. Contribute to s0ck37/CVE-2025-22131-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:We've set up an environment to test CVE-2025-57833. This environment was built using AI, so it's subject to ongoing modification.
URL:https://github.com/Mkway/CVE-2025-57833
标签:#CVE-2025
更新了:CVE-2025
描述:We've set up an environment to test CVE-2025-57833. This environment was built using AI, so it's subject to ongoing modification.
URL:https://github.com/Mkway/CVE-2025-57833
标签:#CVE-2025
GitHub
GitHub - Mkway/CVE-2025-57833: We've set up an environment to test CVE-2025-57833. This environment was built using AI, so it's…
We've set up an environment to test CVE-2025-57833. This environment was built using AI, so it's subject to ongoing modification. - Mkway/CVE-2025-57833
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-2502 / CNVD-2025-16450 联想电脑管家权限提升漏洞
URL:https://github.com/IHK-ONE/CVE-2025-2502
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-2502 / CNVD-2025-16450 联想电脑管家权限提升漏洞
URL:https://github.com/IHK-ONE/CVE-2025-2502
标签:#CVE-2025
GitHub
GitHub - IHK-ONE/CVE-2025-2502: CVE-2025-2502 / CNVD-2025-16450 联想电脑管家权限提升漏洞
CVE-2025-2502 / CNVD-2025-16450 联想电脑管家权限提升漏洞. Contribute to IHK-ONE/CVE-2025-2502 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/Shashikant-codes/RCE-System-Online-Compiler-
标签:#RCE
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/Shashikant-codes/RCE-System-Online-Compiler-
标签:#RCE
GitHub
GitHub - Shashikant-codes/RCE-System-Online-Compiler-: This project is a web-based remote code execution system that lets users…
This project is a web-based remote code execution system that lets users write, compile, and run code in multiple programming languages securely from their browser. It is designed for learning, pra...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53690
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53690
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53690
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53690
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-53690: CVE-2025-53690
CVE-2025-53690. Contribute to B1ack4sh/Blackash-CVE-2025-53690 development by creating an account on GitHub.