GitHub监控消息提醒!!!
更新了:钓鱼
描述:🎣 钓鱼平台 - 基于uni-app的多端钓鱼服务平台,包含顾客端、管理员端和员工端。集成完整的CI/CD流水线、智能监控系统、自适应缓存优化、数据驱动分析等企业级功能。支持H5、微信小程序等多端部署。
URL:https://github.com/TAnderson2718/fishing-uniapp
标签:#钓鱼
更新了:钓鱼
描述:🎣 钓鱼平台 - 基于uni-app的多端钓鱼服务平台,包含顾客端、管理员端和员工端。集成完整的CI/CD流水线、智能监控系统、自适应缓存优化、数据驱动分析等企业级功能。支持H5、微信小程序等多端部署。
URL:https://github.com/TAnderson2718/fishing-uniapp
标签:#钓鱼
GitHub
GitHub - TAnderson2718/fishing-uniapp: 🎣 钓鱼平台 - 基于uni-app的多端钓鱼服务平台,包含顾客端、管理员端和员工端。集成完整的CI/CD流水线、智能监控系统、自适应缓存优化、数据驱动分析等企业级功能。支持H5、微信小程序等多端部署。
🎣 钓鱼平台 - 基于uni-app的多端钓鱼服务平台,包含顾客端、管理员端和员工端。集成完整的CI/CD流水线、智能监控系统、自适应缓存优化、数据驱动分析等企业级功能。支持H5、微信小程序等多端部署。 - TAnderson2718/fishing-uniapp
GitHub监控消息提醒!!!
更新了:漏洞验证
描述:Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现。已有19w+POC,已校验格式的有效性并去重(验证的是格式的有效性)
URL:https://github.com/WuhanUniversityZJF/DOBOT_Internship
标签:#漏洞验证
更新了:漏洞验证
描述:Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现。已有19w+POC,已校验格式的有效性并去重(验证的是格式的有效性)
URL:https://github.com/WuhanUniversityZJF/DOBOT_Internship
标签:#漏洞验证
GitHub
GitHub - WuhanUniversityZJF/DOBOT_Internship: 在工业机械臂视觉项目中,我完成Nvidia Jetson Orin和RDK X5的刷机配置,自制1280×720数据集(3类/103张)。针对RT-DETRv2…
在工业机械臂视觉项目中,我完成Nvidia Jetson Orin和RDK X5的刷机配置,自制1280×720数据集(3类/103张)。针对RT-DETRv2:修复归一化与阈值透传漏洞,通过Grad-CAM分析优化NMS IoU、分辨率及数据增强,mAP@0.5:0.95从0.684提升至0.739;基于ROS2实现手眼标定,抓取成功率>95%。对YOLOv11n-pose:...
GitHub监控消息提醒!!!
更新了:弱口令
描述:安全运维工具箱是一款面向安全运维场景的集成化利器,融合了资产管理、资产测绘、漏洞检测、配置核查、弱口令检测、批量化运维、漏洞跟踪、报告生成以及日志审计等核心功能模块。
URL:https://github.com/nbyiansec/sskit
标签:#弱口令
更新了:弱口令
描述:安全运维工具箱是一款面向安全运维场景的集成化利器,融合了资产管理、资产测绘、漏洞检测、配置核查、弱口令检测、批量化运维、漏洞跟踪、报告生成以及日志审计等核心功能模块。
URL:https://github.com/nbyiansec/sskit
标签:#弱口令
GitHub
GitHub - nbyiansec/sskit: 安全运维工具箱是一款面向安全运维场景的集成化利器,融合了资产管理、资产测绘、漏洞检测、配置核查、弱口令检测、批量化运维、漏洞跟踪、报告生成以及日志审计等核心功能模块。
安全运维工具箱是一款面向安全运维场景的集成化利器,融合了资产管理、资产测绘、漏洞检测、配置核查、弱口令检测、批量化运维、漏洞跟踪、报告生成以及日志审计等核心功能模块。 - nbyiansec/sskit
GitHub监控消息提醒!!!
更新了:RCE
描述:RCEPayloadGen - Advanced RCE Payload Generator - Over 2500 Remote Code Execution (RCE) payloads
URL:https://github.com/kabiri-labs/rcpayloadgen
标签:#RCE
更新了:RCE
描述:RCEPayloadGen - Advanced RCE Payload Generator - Over 2500 Remote Code Execution (RCE) payloads
URL:https://github.com/kabiri-labs/rcpayloadgen
标签:#RCE
GitHub
GitHub - kabiri-labs/rcpayloadgen: RCEPayloadGen is an advanced payload library with 100,000+ curated Remote Code Execution (RCE)…
RCEPayloadGen is an advanced payload library with 100,000+ curated Remote Code Execution (RCE) payloads. Categorized by vector, language, and exploitation technique; designed for automated testing,...
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2024-22722 RCE via SSTI Automation with Python.
URL:https://github.com/terribledactyl/Form-Tools-3.1.1-RCE
标签:#RCE
更新了:RCE
描述:CVE-2024-22722 RCE via SSTI Automation with Python.
URL:https://github.com/terribledactyl/Form-Tools-3.1.1-RCE
标签:#RCE
GitHub
GitHub - terribledactyl/Form-Tools-3.1.1-RCE: CVE-2024-22722 RCE via SSTI, automated with Python.
CVE-2024-22722 RCE via SSTI, automated with Python. - terribledactyl/Form-Tools-3.1.1-RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Firmware Libraries for RCE Platform Development
URL:https://github.com/Makavellik/POC-CVE-2021-42013-EXPLOIT
标签:#RCE
更新了:RCE
描述:Firmware Libraries for RCE Platform Development
URL:https://github.com/Makavellik/POC-CVE-2021-42013-EXPLOIT
标签:#RCE
GitHub
GitHub - Makavellik/POC-CVE-2021-42013-EXPLOIT: Una herramienta avanzada de escaneo, explotación e interacción remota diseñada…
Una herramienta avanzada de escaneo, explotación e interacción remota diseñada para detectar y aprovechar la vulnerabilidad Apache Path Traversal + RCE (CVE-2021-42013) en servidores mal configurad...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:FOGProject Authentication bypass CVE-2025-58443 Exploit
URL:https://github.com/casp3r0x0/CVE-2025-58443
标签:#CVE-2025
更新了:CVE-2025
描述:FOGProject Authentication bypass CVE-2025-58443 Exploit
URL:https://github.com/casp3r0x0/CVE-2025-58443
标签:#CVE-2025
GitHub
GitHub - casp3r0x0/CVE-2025-58443: FOGProject Authentication bypass CVE-2025-58443 Exploit
FOGProject Authentication bypass CVE-2025-58443 Exploit - casp3r0x0/CVE-2025-58443
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Decrypt FairPlay-protected iOS apps on macOS (SIP-enabled) using CVE-2025-24204. Supports macOS 15.0-15.2.
URL:https://github.com/bale170501/decrypted
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Decrypt FairPlay-protected iOS apps on macOS (SIP-enabled) using CVE-2025-24204. Supports macOS 15.0-15.2.
URL:https://github.com/bale170501/decrypted
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐
URL:https://github.com/hophtien/CVE-2025-54424
标签:#RCE
更新了:RCE
描述:CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐
URL:https://github.com/hophtien/CVE-2025-54424
标签:#RCE
GitHub
GitHub - hophtien/CVE-2025-54424: CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using…
CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐 - hophtien/CVE-2025-54424
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:WinRAR CVE-2025-8088 exploit tool
URL:https://github.com/cozythrill/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:WinRAR CVE-2025-8088 exploit tool
URL:https://github.com/cozythrill/CVE-2025-8088
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is CVE-2025-53690 Analysis Documents.
URL:https://github.com/m0d0ri205/CVE-2025-53690-Analysis
标签:#CVE-2025
更新了:CVE-2025
描述:This is CVE-2025-53690 Analysis Documents.
URL:https://github.com/m0d0ri205/CVE-2025-53690-Analysis
标签:#CVE-2025
GitHub
GitHub - m0d0ri205/CVE-2025-53690-Analysis: This is CVE-2025-53690 Analysis Documents.
This is CVE-2025-53690 Analysis Documents. Contribute to m0d0ri205/CVE-2025-53690-Analysis development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Python-based web vulnerability scanner for detecting SQLi, XSS, IDOR, CSRF, JWT, LFI, RCE, and more.
URL:https://github.com/EbramSec/ebram_web_scanner
标签:#RCE
更新了:RCE
描述:Python-based web vulnerability scanner for detecting SQLi, XSS, IDOR, CSRF, JWT, LFI, RCE, and more.
URL:https://github.com/EbramSec/ebram_web_scanner
标签:#RCE
GitHub
GitHub - EbramSec/ebram_web_scanner: Python-based web vulnerability scanner for detecting SQLi, XSS, IDOR, CSRF, JWT, LFI, RCE…
Python-based web vulnerability scanner for detecting SQLi, XSS, IDOR, CSRF, JWT, LFI, RCE, and more. - EbramSec/ebram_web_scanner
GitHub监控消息提醒!!!
更新了:RCE
描述:A proof-of-concept (PoC) remote code execution (RCE) exploit targeting vulnerable applications that deserialize untrusted Python pickle objects.
URL:https://github.com/4nuxd/pickle-rce-exploit
标签:#RCE
更新了:RCE
描述:A proof-of-concept (PoC) remote code execution (RCE) exploit targeting vulnerable applications that deserialize untrusted Python pickle objects.
URL:https://github.com/4nuxd/pickle-rce-exploit
标签:#RCE
GitHub
GitHub - 4nuxd/pickle-rce-exploit: A proof-of-concept (PoC) remote code execution (RCE) exploit targeting vulnerable applications…
A proof-of-concept (PoC) remote code execution (RCE) exploit targeting vulnerable applications that deserialize untrusted Python pickle objects. - 4nuxd/pickle-rce-exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-7771 ThrottleStop.sys privilege escalation exploit - unrestricted IOCTL access to physical memory via MmMapIoSpace
URL:https://github.com/Demoo1337/ThrottleStop
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-7771 ThrottleStop.sys privilege escalation exploit - unrestricted IOCTL access to physical memory via MmMapIoSpace
URL:https://github.com/Demoo1337/ThrottleStop
标签:#CVE-2025
GitHub
GitHub - Demoo1337/ThrottleStop: CVE-2025-7771 ThrottleStop.sys privilege escalation exploit - unrestricted IOCTL access to physical…
CVE-2025-7771 ThrottleStop.sys privilege escalation exploit - unrestricted IOCTL access to physical memory via MmMapIoSpace - Demoo1337/ThrottleStop
GitHub监控消息提醒!!!
更新了:RCE
描述:A consolidated bug bounty hunting checklist covering everything from recon to critical RCE and cloud exploits.
URL:https://github.com/vux06/BB-Methodology
标签:#RCE
更新了:RCE
描述:A consolidated bug bounty hunting checklist covering everything from recon to critical RCE and cloud exploits.
URL:https://github.com/vux06/BB-Methodology
标签:#RCE
GitHub
GitHub - vux06/BB-Methodology: A consolidated bug bounty hunting checklist covering everything from recon to critical RCE and cloud…
A consolidated bug bounty hunting checklist covering everything from recon to critical RCE and cloud exploits. - vux06/BB-Methodology
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙
URL:https://github.com/armin-hg/NewCobaltstrikeTeamServer
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙
URL:https://github.com/armin-hg/NewCobaltstrikeTeamServer
标签:#Cobalt Strike
GitHub
GitHub - armin-hg/NewCobaltstrikeTeamServer: Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and…
Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙 - armin-hg/NewCobaltstrikeTeamServer
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Decrypt FairPlay-protected iOS apps on macOS (SIP-enabled) using CVE-2025-24204. Supports macOS 15.0-15.2.
URL:https://github.com/dollarboysushil/CVE-2025-32433-Erlang-OTP-SSH-Unauthenticated-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Decrypt FairPlay-protected iOS apps on macOS (SIP-enabled) using CVE-2025-24204. Supports macOS 15.0-15.2.
URL:https://github.com/dollarboysushil/CVE-2025-32433-Erlang-OTP-SSH-Unauthenticated-RCE
标签:#CVE-2025
GitHub
GitHub - dollarboysushil/CVE-2025-32433-Erlang-OTP-SSH-Unauthenticated-RCE: PoC showing unauthenticated remote code execution in…
PoC showing unauthenticated remote code execution in Erlang/OTP SSH server. By exploiting a flaw in SSH protocol message handling, an attacker can execute arbitrary commands on the target without v...
👎1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit
URL:https://github.com/34zY/CVE-2025-52970
标签:#CVE-2025
更新了:CVE-2025
描述: CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit
URL:https://github.com/34zY/CVE-2025-52970
标签:#CVE-2025
GitHub
GitHub - 34zY/CVE-2025-52970: CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit
CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit - GitHub - 34zY/CVE-2025-52970: CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit
👎1