GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-1055 and CVE-2025-52915 using K7RKScan.sys
URL:https://github.com/diego-tella/CVE-2025-1055-poc
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-1055 and CVE-2025-52915 using K7RKScan.sys
URL:https://github.com/diego-tella/CVE-2025-1055-poc
标签:#CVE-2025
GitHub
GitHub - diego-tella/CVE-2025-1055-poc: PoC for CVE-2025-1055 and CVE-2025-52915 using K7RKScan.sys
PoC for CVE-2025-1055 and CVE-2025-52915 using K7RKScan.sys - diego-tella/CVE-2025-1055-poc
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/Riocipta75/lab-cve-2020-0610
标签:#RCE
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/Riocipta75/lab-cve-2020-0610
标签:#RCE
GitHub
GitHub - Riocipta75/lab-cve-2020-0610: 🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability…
🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques. - Riocipta75/lab-cve-2020-0610
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:FairPlay decryptor (dump iPA) for iOS Application that running on macOS with SIP-enabled, using CVE-2025-24204. Support macOS 15.0-15.2
URL:https://github.com/34306/decrypted
标签:#CVE-2025
更新了:CVE-2025
描述:FairPlay decryptor (dump iPA) for iOS Application that running on macOS with SIP-enabled, using CVE-2025-24204. Support macOS 15.0-15.2
URL:https://github.com/34306/decrypted
标签:#CVE-2025
GitHub
GitHub - 34306/decrypted: FairPlay decryptor (dump iPA) for iOS Application that running on macOS with SIP-enabled, using CVE-2025…
FairPlay decryptor (dump iPA) for iOS Application that running on macOS with SIP-enabled, using CVE-2025-24204. Support macOS 15.0-15.2 - 34306/decrypted
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-53690
URL:https://github.com/rxerium/CVE-2025-53690
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-53690
URL:https://github.com/rxerium/CVE-2025-53690
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-53690: Detection for CVE-2025-53690
Detection for CVE-2025-53690. Contribute to rxerium/CVE-2025-53690 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 in a Dockerized WordPress lab to test unrestricted file uploads via the Contact Form 7 plugin.
URL:https://github.com/MrSoules/lab-cve-2025-3515
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 in a Dockerized WordPress lab to test unrestricted file uploads via the Contact Form 7 plugin.
URL:https://github.com/MrSoules/lab-cve-2025-3515
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Remote Code Execution (RCE) via Polyglot File Attack and Null Byte Injection on Laravel FileManager
URL:https://github.com/ph-hitachi/CVE-2025-58440
标签:#CVE-2025
更新了:CVE-2025
描述:Remote Code Execution (RCE) via Polyglot File Attack and Null Byte Injection on Laravel FileManager
URL:https://github.com/ph-hitachi/CVE-2025-58440
标签:#CVE-2025
GitHub
GitHub - ph-hitachi/CVE-2025-58440: Remote Code Execution (RCE) via Polyglot File Attack and Null Byte Injection on Laravel FileManager
Remote Code Execution (RCE) via Polyglot File Attack and Null Byte Injection on Laravel FileManager - ph-hitachi/CVE-2025-58440
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Python script to execute CVE-2025-24071
URL:https://github.com/AC8999/CVE-2025-24071
标签:#CVE-2025
更新了:CVE-2025
描述:Python script to execute CVE-2025-24071
URL:https://github.com/AC8999/CVE-2025-24071
标签:#CVE-2025
GitHub
GitHub - AC8999/CVE-2025-24071: Python script to execute CVE-2025-24071
Python script to execute CVE-2025-24071. Contribute to AC8999/CVE-2025-24071 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is a EXP For CVE-2025-57576. PHPGurukul Online Shopping Portal 2.1 is vulnerable to Cross Site > Scripting (XSS) in /admin/updateorder.php
URL:https://github.com/p0et08/DWrwq
标签:#CVE-2025
更新了:CVE-2025
描述:This is a EXP For CVE-2025-57576. PHPGurukul Online Shopping Portal 2.1 is vulnerable to Cross Site > Scripting (XSS) in /admin/updateorder.php
URL:https://github.com/p0et08/DWrwq
标签:#CVE-2025
GitHub
GitHub - p0et08/DWrwq: This is a EXP For CVE-2025-57576. PHPGurukul Online Shopping Portal 2.1 is vulnerable to Cross Site > Scripting…
This is a EXP For CVE-2025-57576. PHPGurukul Online Shopping Portal 2.1 is vulnerable to Cross Site > Scripting (XSS) in /admin/updateorder.php - p0et08/DWrwq
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for the vuln CVE-2025-23210
URL:https://github.com/s0ck37/CVE-2025-23210-POC
标签:#CVE-2025
更新了:CVE-2025
描述:POC for the vuln CVE-2025-23210
URL:https://github.com/s0ck37/CVE-2025-23210-POC
标签:#CVE-2025
GitHub
GitHub - s0ck37/CVE-2025-22131-POC: POC for the vuln CVE-2025-22131
POC for the vuln CVE-2025-22131. Contribute to s0ck37/CVE-2025-22131-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for the vuln CVE-2025-22131
URL:https://github.com/s0ck37/CVE-2025-22131-POC
标签:#CVE-2025
更新了:CVE-2025
描述:POC for the vuln CVE-2025-22131
URL:https://github.com/s0ck37/CVE-2025-22131-POC
标签:#CVE-2025
GitHub
GitHub - s0ck37/CVE-2025-22131-POC: POC for the vuln CVE-2025-22131
POC for the vuln CVE-2025-22131. Contribute to s0ck37/CVE-2025-22131-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:We've set up an environment to test CVE-2025-57833. This environment was built using AI, so it's subject to ongoing modification.
URL:https://github.com/Mkway/CVE-2025-57833
标签:#CVE-2025
更新了:CVE-2025
描述:We've set up an environment to test CVE-2025-57833. This environment was built using AI, so it's subject to ongoing modification.
URL:https://github.com/Mkway/CVE-2025-57833
标签:#CVE-2025
GitHub
GitHub - Mkway/CVE-2025-57833: We've set up an environment to test CVE-2025-57833. This environment was built using AI, so it's…
We've set up an environment to test CVE-2025-57833. This environment was built using AI, so it's subject to ongoing modification. - Mkway/CVE-2025-57833
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-2502 / CNVD-2025-16450 联想电脑管家权限提升漏洞
URL:https://github.com/IHK-ONE/CVE-2025-2502
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-2502 / CNVD-2025-16450 联想电脑管家权限提升漏洞
URL:https://github.com/IHK-ONE/CVE-2025-2502
标签:#CVE-2025
GitHub
GitHub - IHK-ONE/CVE-2025-2502: CVE-2025-2502 / CNVD-2025-16450 联想电脑管家权限提升漏洞
CVE-2025-2502 / CNVD-2025-16450 联想电脑管家权限提升漏洞. Contribute to IHK-ONE/CVE-2025-2502 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/Shashikant-codes/RCE-System-Online-Compiler-
标签:#RCE
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/Shashikant-codes/RCE-System-Online-Compiler-
标签:#RCE
GitHub
GitHub - Shashikant-codes/RCE-System-Online-Compiler-: This project is a web-based remote code execution system that lets users…
This project is a web-based remote code execution system that lets users write, compile, and run code in multiple programming languages securely from their browser. It is designed for learning, pra...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53690
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53690
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53690
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53690
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-53690: CVE-2025-53690
CVE-2025-53690. Contribute to B1ack4sh/Blackash-CVE-2025-53690 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:DarkPhoenix es un toolkit avanzado que combina técnicas de Red Team y Blue Team en un único framework diseñado para entornos controlados y educativos.
URL:https://github.com/Laitwha/ShellCode-Encrypt-Tool-Xor-Aes-Fud-Stable
标签:#Red Team
更新了:Red Team
描述:DarkPhoenix es un toolkit avanzado que combina técnicas de Red Team y Blue Team en un único framework diseñado para entornos controlados y educativos.
URL:https://github.com/Laitwha/ShellCode-Encrypt-Tool-Xor-Aes-Fud-Stable
标签:#Red Team
GitHub监控消息提醒!!!
更新了:钓鱼
描述:🎣 钓鱼平台 - 基于uni-app的多端钓鱼服务平台,包含顾客端、管理员端和员工端。集成完整的CI/CD流水线、智能监控系统、自适应缓存优化、数据驱动分析等企业级功能。支持H5、微信小程序等多端部署。
URL:https://github.com/TAnderson2718/fishing-uniapp
标签:#钓鱼
更新了:钓鱼
描述:🎣 钓鱼平台 - 基于uni-app的多端钓鱼服务平台,包含顾客端、管理员端和员工端。集成完整的CI/CD流水线、智能监控系统、自适应缓存优化、数据驱动分析等企业级功能。支持H5、微信小程序等多端部署。
URL:https://github.com/TAnderson2718/fishing-uniapp
标签:#钓鱼
GitHub
GitHub - TAnderson2718/fishing-uniapp: 🎣 钓鱼平台 - 基于uni-app的多端钓鱼服务平台,包含顾客端、管理员端和员工端。集成完整的CI/CD流水线、智能监控系统、自适应缓存优化、数据驱动分析等企业级功能。支持H5、微信小程序等多端部署。
🎣 钓鱼平台 - 基于uni-app的多端钓鱼服务平台,包含顾客端、管理员端和员工端。集成完整的CI/CD流水线、智能监控系统、自适应缓存优化、数据驱动分析等企业级功能。支持H5、微信小程序等多端部署。 - TAnderson2718/fishing-uniapp
GitHub监控消息提醒!!!
更新了:漏洞验证
描述:Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现。已有19w+POC,已校验格式的有效性并去重(验证的是格式的有效性)
URL:https://github.com/WuhanUniversityZJF/DOBOT_Internship
标签:#漏洞验证
更新了:漏洞验证
描述:Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现。已有19w+POC,已校验格式的有效性并去重(验证的是格式的有效性)
URL:https://github.com/WuhanUniversityZJF/DOBOT_Internship
标签:#漏洞验证
GitHub
GitHub - WuhanUniversityZJF/DOBOT_Internship: 在工业机械臂视觉项目中,我完成Nvidia Jetson Orin和RDK X5的刷机配置,自制1280×720数据集(3类/103张)。针对RT-DETRv2…
在工业机械臂视觉项目中,我完成Nvidia Jetson Orin和RDK X5的刷机配置,自制1280×720数据集(3类/103张)。针对RT-DETRv2:修复归一化与阈值透传漏洞,通过Grad-CAM分析优化NMS IoU、分辨率及数据增强,mAP@0.5:0.95从0.684提升至0.739;基于ROS2实现手眼标定,抓取成功率>95%。对YOLOv11n-pose:...
GitHub监控消息提醒!!!
更新了:弱口令
描述:安全运维工具箱是一款面向安全运维场景的集成化利器,融合了资产管理、资产测绘、漏洞检测、配置核查、弱口令检测、批量化运维、漏洞跟踪、报告生成以及日志审计等核心功能模块。
URL:https://github.com/nbyiansec/sskit
标签:#弱口令
更新了:弱口令
描述:安全运维工具箱是一款面向安全运维场景的集成化利器,融合了资产管理、资产测绘、漏洞检测、配置核查、弱口令检测、批量化运维、漏洞跟踪、报告生成以及日志审计等核心功能模块。
URL:https://github.com/nbyiansec/sskit
标签:#弱口令
GitHub
GitHub - nbyiansec/sskit: 安全运维工具箱是一款面向安全运维场景的集成化利器,融合了资产管理、资产测绘、漏洞检测、配置核查、弱口令检测、批量化运维、漏洞跟踪、报告生成以及日志审计等核心功能模块。
安全运维工具箱是一款面向安全运维场景的集成化利器,融合了资产管理、资产测绘、漏洞检测、配置核查、弱口令检测、批量化运维、漏洞跟踪、报告生成以及日志审计等核心功能模块。 - nbyiansec/sskit
GitHub监控消息提醒!!!
更新了:RCE
描述:RCEPayloadGen - Advanced RCE Payload Generator - Over 2500 Remote Code Execution (RCE) payloads
URL:https://github.com/kabiri-labs/rcpayloadgen
标签:#RCE
更新了:RCE
描述:RCEPayloadGen - Advanced RCE Payload Generator - Over 2500 Remote Code Execution (RCE) payloads
URL:https://github.com/kabiri-labs/rcpayloadgen
标签:#RCE
GitHub
GitHub - kabiri-labs/rcpayloadgen: RCEPayloadGen is an advanced payload library with 100,000+ curated Remote Code Execution (RCE)…
RCEPayloadGen is an advanced payload library with 100,000+ curated Remote Code Execution (RCE) payloads. Categorized by vector, language, and exploitation technique; designed for automated testing,...
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2024-22722 RCE via SSTI Automation with Python.
URL:https://github.com/terribledactyl/Form-Tools-3.1.1-RCE
标签:#RCE
更新了:RCE
描述:CVE-2024-22722 RCE via SSTI Automation with Python.
URL:https://github.com/terribledactyl/Form-Tools-3.1.1-RCE
标签:#RCE
GitHub
GitHub - terribledactyl/Form-Tools-3.1.1-RCE: CVE-2024-22722 RCE via SSTI, automated with Python.
CVE-2024-22722 RCE via SSTI, automated with Python. - terribledactyl/Form-Tools-3.1.1-RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Firmware Libraries for RCE Platform Development
URL:https://github.com/Makavellik/POC-CVE-2021-42013-EXPLOIT
标签:#RCE
更新了:RCE
描述:Firmware Libraries for RCE Platform Development
URL:https://github.com/Makavellik/POC-CVE-2021-42013-EXPLOIT
标签:#RCE
GitHub
GitHub - Makavellik/POC-CVE-2021-42013-EXPLOIT: Una herramienta avanzada de escaneo, explotación e interacción remota diseñada…
Una herramienta avanzada de escaneo, explotación e interacción remota diseñada para detectar y aprovechar la vulnerabilidad Apache Path Traversal + RCE (CVE-2021-42013) en servidores mal configurad...