GitHub监控消息提醒!!!
更新了:RCE
描述:A proof-of-concept (PoC) remote code execution (RCE) exploit targeting vulnerable applications that deserialize untrusted Python pickle objects.
URL:https://github.com/4nuxd/pickle-rce-exploit
标签:#RCE
更新了:RCE
描述:A proof-of-concept (PoC) remote code execution (RCE) exploit targeting vulnerable applications that deserialize untrusted Python pickle objects.
URL:https://github.com/4nuxd/pickle-rce-exploit
标签:#RCE
GitHub
GitHub - 4nuxd/pickle-rce-exploit: A proof-of-concept (PoC) remote code execution (RCE) exploit targeting vulnerable applications…
A proof-of-concept (PoC) remote code execution (RCE) exploit targeting vulnerable applications that deserialize untrusted Python pickle objects. - 4nuxd/pickle-rce-exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-7771 ThrottleStop.sys privilege escalation exploit - unrestricted IOCTL access to physical memory via MmMapIoSpace
URL:https://github.com/Demoo1337/ThrottleStop
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-7771 ThrottleStop.sys privilege escalation exploit - unrestricted IOCTL access to physical memory via MmMapIoSpace
URL:https://github.com/Demoo1337/ThrottleStop
标签:#CVE-2025
GitHub
GitHub - Demoo1337/ThrottleStop: CVE-2025-7771 ThrottleStop.sys privilege escalation exploit - unrestricted IOCTL access to physical…
CVE-2025-7771 ThrottleStop.sys privilege escalation exploit - unrestricted IOCTL access to physical memory via MmMapIoSpace - Demoo1337/ThrottleStop
GitHub监控消息提醒!!!
更新了:RCE
描述:A consolidated bug bounty hunting checklist covering everything from recon to critical RCE and cloud exploits.
URL:https://github.com/vux06/BB-Methodology
标签:#RCE
更新了:RCE
描述:A consolidated bug bounty hunting checklist covering everything from recon to critical RCE and cloud exploits.
URL:https://github.com/vux06/BB-Methodology
标签:#RCE
GitHub
GitHub - vux06/BB-Methodology: A consolidated bug bounty hunting checklist covering everything from recon to critical RCE and cloud…
A consolidated bug bounty hunting checklist covering everything from recon to critical RCE and cloud exploits. - vux06/BB-Methodology
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙
URL:https://github.com/armin-hg/NewCobaltstrikeTeamServer
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙
URL:https://github.com/armin-hg/NewCobaltstrikeTeamServer
标签:#Cobalt Strike
GitHub
GitHub - armin-hg/NewCobaltstrikeTeamServer: Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and…
Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙 - armin-hg/NewCobaltstrikeTeamServer
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Decrypt FairPlay-protected iOS apps on macOS (SIP-enabled) using CVE-2025-24204. Supports macOS 15.0-15.2.
URL:https://github.com/dollarboysushil/CVE-2025-32433-Erlang-OTP-SSH-Unauthenticated-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Decrypt FairPlay-protected iOS apps on macOS (SIP-enabled) using CVE-2025-24204. Supports macOS 15.0-15.2.
URL:https://github.com/dollarboysushil/CVE-2025-32433-Erlang-OTP-SSH-Unauthenticated-RCE
标签:#CVE-2025
GitHub
GitHub - dollarboysushil/CVE-2025-32433-Erlang-OTP-SSH-Unauthenticated-RCE: PoC showing unauthenticated remote code execution in…
PoC showing unauthenticated remote code execution in Erlang/OTP SSH server. By exploiting a flaw in SSH protocol message handling, an attacker can execute arbitrary commands on the target without v...
👎1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit
URL:https://github.com/34zY/CVE-2025-52970
标签:#CVE-2025
更新了:CVE-2025
描述: CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit
URL:https://github.com/34zY/CVE-2025-52970
标签:#CVE-2025
GitHub
GitHub - 34zY/CVE-2025-52970: CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit
CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit - GitHub - 34zY/CVE-2025-52970: CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit
👎1
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Shark-空间聚合测绘平台,是一个功能强大的网络空间聚合测绘平台,专为安全研究人员、渗透测试工程师和网络管理员设计。通过整合多个主流网络空间搜索引擎(FOFA、Quake、Hunter、00Zone等),提供统一的查询接口和智能语法转换,为用户提供全面、精确的网络资产发现和分析能力。
URL:https://github.com/CllmsyK/Shark
标签:#渗透测试
更新了:渗透测试
描述:Shark-空间聚合测绘平台,是一个功能强大的网络空间聚合测绘平台,专为安全研究人员、渗透测试工程师和网络管理员设计。通过整合多个主流网络空间搜索引擎(FOFA、Quake、Hunter、00Zone等),提供统一的查询接口和智能语法转换,为用户提供全面、精确的网络资产发现和分析能力。
URL:https://github.com/CllmsyK/Shark
标签:#渗透测试
GitHub
GitHub - CllmsyK/Shark: Shark-空间聚合测绘平台,是一个功能强大的网络空间聚合测绘平台,专为安全研究人员、渗透测试工程师和网络管理员设计。通过整合多个主流网络空间搜索引擎(FOFA、Quake、Hunter、00Zone等)…
Shark-空间聚合测绘平台,是一个功能强大的网络空间聚合测绘平台,专为安全研究人员、渗透测试工程师和网络管理员设计。通过整合多个主流网络空间搜索引擎(FOFA、Quake、Hunter、00Zone等),提供统一的查询接口和智能语法转换,为用户提供全面、精确的网络资产发现和分析能力。 - CllmsyK/Shark
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Exploit CVE-2025-21333 in vkrnlintvsp.sys with this proof of concept, aimed at demonstrating potential threats on Windows 11 systems.
URL:https://github.com/pradip022/CVE-2025-21333-POC
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Exploit CVE-2025-21333 in vkrnlintvsp.sys with this proof of concept, aimed at demonstrating potential threats on Windows 11 systems.
URL:https://github.com/pradip022/CVE-2025-21333-POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-6934 - Exploit WordPress Opal Estate Pro
URL:https://github.com/Rosemary1337/CVE-2025-6934
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-6934 - Exploit WordPress Opal Estate Pro
URL:https://github.com/Rosemary1337/CVE-2025-6934
标签:#CVE-2025
GitHub
GitHub - Rosemary1337/CVE-2025-6934: CVE-2025-6934 - Exploit WordPress Opal Estate Pro
CVE-2025-6934 - Exploit WordPress Opal Estate Pro - GitHub - Rosemary1337/CVE-2025-6934: CVE-2025-6934 - Exploit WordPress Opal Estate Pro
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-57819
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-57819
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-57819
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-57819
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-57819: CVE-2025-57819
CVE-2025-57819. Contribute to B1ack4sh/Blackash-CVE-2025-57819 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
URL:https://github.com/Rosemary1337/CVE-2025-24799
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
URL:https://github.com/Rosemary1337/CVE-2025-24799
标签:#CVE-2025
GitHub
GitHub - Rosemary1337/CVE-2025-24799: CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection - Rosemary1337/CVE-2025-24799
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
URL:https://github.com/Rosemary1337/CVE-2025-24799
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
URL:https://github.com/Rosemary1337/CVE-2025-24799
标签:#CVE-2025
GitHub
GitHub - Rosemary1337/CVE-2025-24799: CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection - Rosemary1337/CVE-2025-24799
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Decrypt FairPlay-protected iOS apps on macOS (SIP-enabled) using CVE-2025-24204. Supports macOS 15.0-15.2.
URL:https://github.com/Makavellik/POC-CVE-2025-24813-Apache-Tomcat-Remote-Code-Execution
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Decrypt FairPlay-protected iOS apps on macOS (SIP-enabled) using CVE-2025-24204. Supports macOS 15.0-15.2.
URL:https://github.com/Makavellik/POC-CVE-2025-24813-Apache-Tomcat-Remote-Code-Execution
标签:#CVE-2025
GitHub
GitHub - Makavellik/POC-CVE-2025-24813-Apache-Tomcat-Remote-Code-Execution: Este repositorio contiene un exploit automatizado desarrollado…
Este repositorio contiene un exploit automatizado desarrollado con fines educativos y de investigación en ciberseguridad, dirigido a demostrar una potencial vulnerabilidad de ejecución remota de có...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Makavellik/POC-CVE-2025-24813-Apache-Tomcat-Remote-Code-Execution
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Makavellik/POC-CVE-2025-24813-Apache-Tomcat-Remote-Code-Execution
标签:#CVE-2025
GitHub
GitHub - Makavellik/POC-CVE-2025-24813-Apache-Tomcat-Remote-Code-Execution: Este repositorio contiene un exploit automatizado desarrollado…
Este repositorio contiene un exploit automatizado desarrollado con fines educativos y de investigación en ciberseguridad, dirigido a demostrar una potencial vulnerabilidad de ejecución remota de có...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Exploit CVE-2025-21333 in vkrnlintvsp.sys with this proof of concept, aimed at demonstrating potential threats on Windows 11 systems.
URL:https://github.com/pradip022/CVE-2025-21333-POC
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Exploit CVE-2025-21333 in vkrnlintvsp.sys with this proof of concept, aimed at demonstrating potential threats on Windows 11 systems.
URL:https://github.com/pradip022/CVE-2025-21333-POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.
URL:https://github.com/Dany60-98/CVE-2025-30208-EXP
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.
URL:https://github.com/Dany60-98/CVE-2025-30208-EXP
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Vulnerability Detection and Mitigation Apache ActiveMQ | Security Architectures and Systems Administration - on - Apache ActiveMQ Deserialization Remote Code Execution (RCE) – CVE-2023-46604
URL:https://github.com/vaishnavucv/Project-Vuln-Detection-N-Mitigation_101
标签:#RCE
更新了:RCE
描述:Vulnerability Detection and Mitigation Apache ActiveMQ | Security Architectures and Systems Administration - on - Apache ActiveMQ Deserialization Remote Code Execution (RCE) – CVE-2023-46604
URL:https://github.com/vaishnavucv/Project-Vuln-Detection-N-Mitigation_101
标签:#RCE
GitHub
GitHub - vaishnavucv/Project-Vuln-Detection-N-Mitigation_101: Vulnerability Detection and Mitigation Apache ActiveMQ | Security…
Vulnerability Detection and Mitigation Apache ActiveMQ | Security Architectures and Systems Administration - on - Apache ActiveMQ Deserialization Remote Code Execution (RCE) – CVE-2023-46604 - vais...