GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.
URL:https://github.com/Dany60-98/CVE-2025-30208-EXP
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.
URL:https://github.com/Dany60-98/CVE-2025-30208-EXP
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC and technical details of CVE-2025-24204
URL:https://github.com/FFRI/CVE-2025-24204
标签:#CVE-2025
更新了:CVE-2025
描述:PoC and technical details of CVE-2025-24204
URL:https://github.com/FFRI/CVE-2025-24204
标签:#CVE-2025
GitHub
GitHub - FFRI/CVE-2025-24204: PoC and technical details of CVE-2025-24204
PoC and technical details of CVE-2025-24204. Contribute to FFRI/CVE-2025-24204 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC and technical details of CVE-2025-24204
URL:https://github.com/FFRI/CVE-2025-24204
标签:#CVE-2025
更新了:CVE-2025
描述:PoC and technical details of CVE-2025-24204
URL:https://github.com/FFRI/CVE-2025-24204
标签:#CVE-2025
GitHub
GitHub - FFRI/CVE-2025-24204: PoC and technical details of CVE-2025-24204
PoC and technical details of CVE-2025-24204. Contribute to FFRI/CVE-2025-24204 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-48384 Scanner
URL:https://github.com/EdwardYeIntrix/CVE-2025-48384-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-48384 Scanner
URL:https://github.com/EdwardYeIntrix/CVE-2025-48384-Scanner
标签:#CVE-2025
GitHub
GitHub - EdwardYeIntrix/CVE-2025-48384-Scanner: CVE-2025-48384 Scanner
CVE-2025-48384 Scanner. Contribute to EdwardYeIntrix/CVE-2025-48384-Scanner development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:一个可一键部署的人员信息收集系统,包括前端、后端API、管理系统和Docker容器化。
URL:https://github.com/ryan385453ryan/personnel-info-system
标签:#信息收集
更新了:信息收集
描述:一个可一键部署的人员信息收集系统,包括前端、后端API、管理系统和Docker容器化。
URL:https://github.com/ryan385453ryan/personnel-info-system
标签:#信息收集
GitHub
ryan385453ryan/personnel-info-system
一个可一键部署的人员信息收集系统,包括前端、后端API、管理系统和Docker容器化。. Contribute to ryan385453ryan/personnel-info-system development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞验证
描述:Web批量请求器是一款基于PyWebview编写的轻量工具,可对目标地址进行快速批量的存活探测,允许自定义HTTP请求,支持HTTP/SOCKS5代理,适用于批量漏洞验证场景。
URL:https://github.com/aaaMoZhen666/web-batch-request
标签:#漏洞验证
更新了:漏洞验证
描述:Web批量请求器是一款基于PyWebview编写的轻量工具,可对目标地址进行快速批量的存活探测,允许自定义HTTP请求,支持HTTP/SOCKS5代理,适用于批量漏洞验证场景。
URL:https://github.com/aaaMoZhen666/web-batch-request
标签:#漏洞验证
GitHub
GitHub - aaaMoZhen666/web-batch-request: Web批量请求器是一款基于Python编写的轻量工具,可对目标地址进行快速批量的存活探测,允许自定义HTTP请求,支持HTTP/SOCKS5代理,适用于批量漏洞验证场景。
Web批量请求器是一款基于Python编写的轻量工具,可对目标地址进行快速批量的存活探测,允许自定义HTTP请求,支持HTTP/SOCKS5代理,适用于批量漏洞验证场景。 - aaaMoZhen666/web-batch-request
GitHub监控消息提醒!!!
更新了:Red Team
描述:IT Red Team Roadmap
URL:https://github.com/JohanTheBlue/redteam-lab
标签:#Red Team
更新了:Red Team
描述:IT Red Team Roadmap
URL:https://github.com/JohanTheBlue/redteam-lab
标签:#Red Team
GitHub
JohanTheBlue/redteam-lab
IT Red Team Roadmap. Contribute to JohanTheBlue/redteam-lab development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:IT Red Team Roadmap
URL:https://github.com/JohanTheBlue/redteam-lab
标签:#Red Team
更新了:Red Team
描述:IT Red Team Roadmap
URL:https://github.com/JohanTheBlue/redteam-lab
标签:#Red Team
GitHub
JohanTheBlue/redteam-lab
IT Red Team Roadmap. Contribute to JohanTheBlue/redteam-lab development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.
URL:https://github.com/prabhatverma47/CVE-2025-58180-RCE-in-OctoPrint-via-Unsanitized-Filename
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.
URL:https://github.com/prabhatverma47/CVE-2025-58180-RCE-in-OctoPrint-via-Unsanitized-Filename
标签:#CVE-2025
GitHub
GitHub - prabhatverma47/CVE-2025-58180: In OctoPrint version <=1.11.2, an attacker with file upload access (e.g., valid API key…
In OctoPrint version <=1.11.2, an attacker with file upload access (e.g., valid API key or session) can craft a malicious filename that bypasses sanitization and is later executed by OctoPri...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.
URL:https://github.com/prabhatverma47/CVE-2025-58180-RCE-in-OctoPrint-via-Unsanitized-Filename
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.
URL:https://github.com/prabhatverma47/CVE-2025-58180-RCE-in-OctoPrint-via-Unsanitized-Filename
标签:#CVE-2025
GitHub
GitHub - prabhatverma47/CVE-2025-58180: In OctoPrint version <=1.11.2, an attacker with file upload access (e.g., valid API key…
In OctoPrint version <=1.11.2, an attacker with file upload access (e.g., valid API key or session) can craft a malicious filename that bypasses sanitization and is later executed by OctoPri...
GitHub监控消息提醒!!!
更新了:burp
描述:Automating security testing for web applications and API using AI Based burp extension
URL:https://github.com/Rudra2018/Burp-Extenstion-AI-Driven-Testing
标签:#burp
更新了:burp
描述:Automating security testing for web applications and API using AI Based burp extension
URL:https://github.com/Rudra2018/Burp-Extenstion-AI-Driven-Testing
标签:#burp
GitHub
GitHub - Rudra2018/Burp-Extenstion-AI-Driven-Testing: Automating security testing for web applications and API using AI Based burp…
Automating security testing for web applications and API using AI Based burp extension - Rudra2018/Burp-Extenstion-AI-Driven-Testing
GitHub监控消息提醒!!!
更新了:红队
描述:本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 目标:记录和沉淀相关知识、方法与实践经验,旨在从原型 Demo 推动到实际落地应用。
URL:https://github.com/study8677/post-training
标签:#红队
更新了:红队
描述:本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 目标:记录和沉淀相关知识、方法与实践经验,旨在从原型 Demo 推动到实际落地应用。
URL:https://github.com/study8677/post-training
标签:#红队
GitHub
GitHub - study8677/post-training: 本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 …
本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 目标:记录和沉淀相关知识、方法与实践经验,旨在从原型 Demo 推动到实际落地应用。 - study8677/post-training
GitHub监控消息提醒!!!
更新了:红队
描述:本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 目标:记录和沉淀相关知识、方法与实践经验,旨在从原型 Demo 推动到实际落地应用。
URL:https://github.com/study8677/post-training
标签:#红队
更新了:红队
描述:本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 目标:记录和沉淀相关知识、方法与实践经验,旨在从原型 Demo 推动到实际落地应用。
URL:https://github.com/study8677/post-training
标签:#红队
GitHub
GitHub - study8677/post-training: 本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 …
本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 目标:记录和沉淀相关知识、方法与实践经验,旨在从原型 Demo 推动到实际落地应用。 - study8677/post-training