GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Decrypt FairPlay-protected iOS apps on macOS (SIP-enabled) using CVE-2025-24204. Supports macOS 15.0-15.2.
URL:https://github.com/bale170501/decrypted
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Decrypt FairPlay-protected iOS apps on macOS (SIP-enabled) using CVE-2025-24204. Supports macOS 15.0-15.2.
URL:https://github.com/bale170501/decrypted
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐
URL:https://github.com/hophtien/CVE-2025-54424
标签:#RCE
更新了:RCE
描述:CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐
URL:https://github.com/hophtien/CVE-2025-54424
标签:#RCE
GitHub
GitHub - hophtien/CVE-2025-54424: CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using…
CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐 - hophtien/CVE-2025-54424
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:WinRAR CVE-2025-8088 exploit tool
URL:https://github.com/cozythrill/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:WinRAR CVE-2025-8088 exploit tool
URL:https://github.com/cozythrill/CVE-2025-8088
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is CVE-2025-53690 Analysis Documents.
URL:https://github.com/m0d0ri205/CVE-2025-53690-Analysis
标签:#CVE-2025
更新了:CVE-2025
描述:This is CVE-2025-53690 Analysis Documents.
URL:https://github.com/m0d0ri205/CVE-2025-53690-Analysis
标签:#CVE-2025
GitHub
GitHub - m0d0ri205/CVE-2025-53690-Analysis: This is CVE-2025-53690 Analysis Documents.
This is CVE-2025-53690 Analysis Documents. Contribute to m0d0ri205/CVE-2025-53690-Analysis development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Python-based web vulnerability scanner for detecting SQLi, XSS, IDOR, CSRF, JWT, LFI, RCE, and more.
URL:https://github.com/EbramSec/ebram_web_scanner
标签:#RCE
更新了:RCE
描述:Python-based web vulnerability scanner for detecting SQLi, XSS, IDOR, CSRF, JWT, LFI, RCE, and more.
URL:https://github.com/EbramSec/ebram_web_scanner
标签:#RCE
GitHub
GitHub - EbramSec/ebram_web_scanner: Python-based web vulnerability scanner for detecting SQLi, XSS, IDOR, CSRF, JWT, LFI, RCE…
Python-based web vulnerability scanner for detecting SQLi, XSS, IDOR, CSRF, JWT, LFI, RCE, and more. - EbramSec/ebram_web_scanner
GitHub监控消息提醒!!!
更新了:RCE
描述:A proof-of-concept (PoC) remote code execution (RCE) exploit targeting vulnerable applications that deserialize untrusted Python pickle objects.
URL:https://github.com/4nuxd/pickle-rce-exploit
标签:#RCE
更新了:RCE
描述:A proof-of-concept (PoC) remote code execution (RCE) exploit targeting vulnerable applications that deserialize untrusted Python pickle objects.
URL:https://github.com/4nuxd/pickle-rce-exploit
标签:#RCE
GitHub
GitHub - 4nuxd/pickle-rce-exploit: A proof-of-concept (PoC) remote code execution (RCE) exploit targeting vulnerable applications…
A proof-of-concept (PoC) remote code execution (RCE) exploit targeting vulnerable applications that deserialize untrusted Python pickle objects. - 4nuxd/pickle-rce-exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-7771 ThrottleStop.sys privilege escalation exploit - unrestricted IOCTL access to physical memory via MmMapIoSpace
URL:https://github.com/Demoo1337/ThrottleStop
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-7771 ThrottleStop.sys privilege escalation exploit - unrestricted IOCTL access to physical memory via MmMapIoSpace
URL:https://github.com/Demoo1337/ThrottleStop
标签:#CVE-2025
GitHub
GitHub - Demoo1337/ThrottleStop: CVE-2025-7771 ThrottleStop.sys privilege escalation exploit - unrestricted IOCTL access to physical…
CVE-2025-7771 ThrottleStop.sys privilege escalation exploit - unrestricted IOCTL access to physical memory via MmMapIoSpace - Demoo1337/ThrottleStop
GitHub监控消息提醒!!!
更新了:RCE
描述:A consolidated bug bounty hunting checklist covering everything from recon to critical RCE and cloud exploits.
URL:https://github.com/vux06/BB-Methodology
标签:#RCE
更新了:RCE
描述:A consolidated bug bounty hunting checklist covering everything from recon to critical RCE and cloud exploits.
URL:https://github.com/vux06/BB-Methodology
标签:#RCE
GitHub
GitHub - vux06/BB-Methodology: A consolidated bug bounty hunting checklist covering everything from recon to critical RCE and cloud…
A consolidated bug bounty hunting checklist covering everything from recon to critical RCE and cloud exploits. - vux06/BB-Methodology
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙
URL:https://github.com/armin-hg/NewCobaltstrikeTeamServer
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙
URL:https://github.com/armin-hg/NewCobaltstrikeTeamServer
标签:#Cobalt Strike
GitHub
GitHub - armin-hg/NewCobaltstrikeTeamServer: Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and…
Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙 - armin-hg/NewCobaltstrikeTeamServer
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Decrypt FairPlay-protected iOS apps on macOS (SIP-enabled) using CVE-2025-24204. Supports macOS 15.0-15.2.
URL:https://github.com/dollarboysushil/CVE-2025-32433-Erlang-OTP-SSH-Unauthenticated-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Decrypt FairPlay-protected iOS apps on macOS (SIP-enabled) using CVE-2025-24204. Supports macOS 15.0-15.2.
URL:https://github.com/dollarboysushil/CVE-2025-32433-Erlang-OTP-SSH-Unauthenticated-RCE
标签:#CVE-2025
GitHub
GitHub - dollarboysushil/CVE-2025-32433-Erlang-OTP-SSH-Unauthenticated-RCE: PoC showing unauthenticated remote code execution in…
PoC showing unauthenticated remote code execution in Erlang/OTP SSH server. By exploiting a flaw in SSH protocol message handling, an attacker can execute arbitrary commands on the target without v...
👎1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit
URL:https://github.com/34zY/CVE-2025-52970
标签:#CVE-2025
更新了:CVE-2025
描述: CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit
URL:https://github.com/34zY/CVE-2025-52970
标签:#CVE-2025
GitHub
GitHub - 34zY/CVE-2025-52970: CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit
CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit - GitHub - 34zY/CVE-2025-52970: CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit
👎1
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Shark-空间聚合测绘平台,是一个功能强大的网络空间聚合测绘平台,专为安全研究人员、渗透测试工程师和网络管理员设计。通过整合多个主流网络空间搜索引擎(FOFA、Quake、Hunter、00Zone等),提供统一的查询接口和智能语法转换,为用户提供全面、精确的网络资产发现和分析能力。
URL:https://github.com/CllmsyK/Shark
标签:#渗透测试
更新了:渗透测试
描述:Shark-空间聚合测绘平台,是一个功能强大的网络空间聚合测绘平台,专为安全研究人员、渗透测试工程师和网络管理员设计。通过整合多个主流网络空间搜索引擎(FOFA、Quake、Hunter、00Zone等),提供统一的查询接口和智能语法转换,为用户提供全面、精确的网络资产发现和分析能力。
URL:https://github.com/CllmsyK/Shark
标签:#渗透测试
GitHub
GitHub - CllmsyK/Shark: Shark-空间聚合测绘平台,是一个功能强大的网络空间聚合测绘平台,专为安全研究人员、渗透测试工程师和网络管理员设计。通过整合多个主流网络空间搜索引擎(FOFA、Quake、Hunter、00Zone等)…
Shark-空间聚合测绘平台,是一个功能强大的网络空间聚合测绘平台,专为安全研究人员、渗透测试工程师和网络管理员设计。通过整合多个主流网络空间搜索引擎(FOFA、Quake、Hunter、00Zone等),提供统一的查询接口和智能语法转换,为用户提供全面、精确的网络资产发现和分析能力。 - CllmsyK/Shark
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Exploit CVE-2025-21333 in vkrnlintvsp.sys with this proof of concept, aimed at demonstrating potential threats on Windows 11 systems.
URL:https://github.com/pradip022/CVE-2025-21333-POC
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Exploit CVE-2025-21333 in vkrnlintvsp.sys with this proof of concept, aimed at demonstrating potential threats on Windows 11 systems.
URL:https://github.com/pradip022/CVE-2025-21333-POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-6934 - Exploit WordPress Opal Estate Pro
URL:https://github.com/Rosemary1337/CVE-2025-6934
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-6934 - Exploit WordPress Opal Estate Pro
URL:https://github.com/Rosemary1337/CVE-2025-6934
标签:#CVE-2025
GitHub
GitHub - Rosemary1337/CVE-2025-6934: CVE-2025-6934 - Exploit WordPress Opal Estate Pro
CVE-2025-6934 - Exploit WordPress Opal Estate Pro - GitHub - Rosemary1337/CVE-2025-6934: CVE-2025-6934 - Exploit WordPress Opal Estate Pro
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-57819
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-57819
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-57819
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-57819
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-57819: CVE-2025-57819
CVE-2025-57819. Contribute to B1ack4sh/Blackash-CVE-2025-57819 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
URL:https://github.com/Rosemary1337/CVE-2025-24799
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
URL:https://github.com/Rosemary1337/CVE-2025-24799
标签:#CVE-2025
GitHub
GitHub - Rosemary1337/CVE-2025-24799: CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection - Rosemary1337/CVE-2025-24799