GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-24893 RCE exploit for XWiki with reverse shell capability
URL:https://github.com/Bishben/xwiki-15.10.8-reverse-shell-cve-2025-24893
标签:#RCE
更新了:RCE
描述:CVE-2025-24893 RCE exploit for XWiki with reverse shell capability
URL:https://github.com/Bishben/xwiki-15.10.8-reverse-shell-cve-2025-24893
标签:#RCE
GitHub
GitHub - Bishben/xwiki-15.10.8-reverse-shell-cve-2025-24893: CVE-2025-24893 RCE exploit for XWiki with reverse shell capability
CVE-2025-24893 RCE exploit for XWiki with reverse shell capability - Bishben/xwiki-15.10.8-reverse-shell-cve-2025-24893
GitHub监控消息提醒!!!
更新了:RCE
描述:XSS, SQLI, LFI, RCE Practice Labs in php
URL:https://github.com/rix4uni/KrazePlanetLabs
标签:#RCE
更新了:RCE
描述:XSS, SQLI, LFI, RCE Practice Labs in php
URL:https://github.com/rix4uni/KrazePlanetLabs
标签:#RCE
GitHub
GitHub - rix4uni/KrazePlanetLabs: XSS, SQLI, LFI, RCE Practice Labs in php
XSS, SQLI, LFI, RCE Practice Labs in php. Contribute to rix4uni/KrazePlanetLabs development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:XSS, SQLI, LFI, RCE Practice Labs in php
URL:https://github.com/rix4uni/KrazePlanetLabs
标签:#RCE
更新了:RCE
描述:XSS, SQLI, LFI, RCE Practice Labs in php
URL:https://github.com/rix4uni/KrazePlanetLabs
标签:#RCE
GitHub
GitHub - rix4uni/KrazePlanetLabs: XSS, SQLI, LFI, RCE Practice Labs in php
XSS, SQLI, LFI, RCE Practice Labs in php. Contribute to rix4uni/KrazePlanetLabs development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE exploit for Calix Gigacenters ONT routers
URL:https://github.com/revers3everything/rce-calix-gigacenter
标签:#RCE
更新了:RCE
描述:RCE exploit for Calix Gigacenters ONT routers
URL:https://github.com/revers3everything/rce-calix-gigacenter
标签:#RCE
GitHub
GitHub - revers3everything/rce-calix-gigacenter: RCE exploit for Calix Gigacenters ONT routers
RCE exploit for Calix Gigacenters ONT routers. Contribute to revers3everything/rce-calix-gigacenter development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE exploit for Calix Gigacenters ONT routers
URL:https://github.com/revers3everything/rce-calix-gigacenter
标签:#RCE
更新了:RCE
描述:RCE exploit for Calix Gigacenters ONT routers
URL:https://github.com/revers3everything/rce-calix-gigacenter
标签:#RCE
GitHub
GitHub - revers3everything/rce-calix-gigacenter: RCE exploit for Calix Gigacenters ONT routers
RCE exploit for Calix Gigacenters ONT routers. Contribute to revers3everything/rce-calix-gigacenter development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀
URL:https://github.com/Whitecat18/Rust-for-Malware-Development
标签:#Red Team
更新了:Red Team
描述:Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀
URL:https://github.com/Whitecat18/Rust-for-Malware-Development
标签:#Red Team
GitHub
GitHub - Whitecat18/Rust-for-Malware-Development: Rust for malware Development is a repository for advanced Red Team techniques…
Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀 - Whitecat18/Rust-for-Malware-Development
GitHub监控消息提醒!!!
更新了:Red Team
描述:Out-Of-Tree Llama Stack Eval Provider for Red Teaming LLM Systems with Garak
URL:https://github.com/trustyai-explainability/llama-stack-provider-trustyai-garak
标签:#Red Team
更新了:Red Team
描述:Out-Of-Tree Llama Stack Eval Provider for Red Teaming LLM Systems with Garak
URL:https://github.com/trustyai-explainability/llama-stack-provider-trustyai-garak
标签:#Red Team
GitHub
GitHub - trustyai-explainability/llama-stack-provider-trustyai-garak: Out-Of-Tree Llama Stack Eval Provider for Red Teaming LLM…
Out-Of-Tree Llama Stack Eval Provider for Red Teaming LLM Systems with Garak - trustyai-explainability/llama-stack-provider-trustyai-garak
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/qdwqwdqwdqwd/KOLE
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/qdwqwdqwdqwd/KOLE
标签:#护网
GitHub
GitHub - qdwqwdqwdqwd/KOLE: KOLE - 基于区块链的KOL劣迹曝光平台 | Blockchain-based platform for exposing KOL misconduct. Built on Solana & IPFS…
KOLE - 基于区块链的KOL劣迹曝光平台 | Blockchain-based platform for exposing KOL misconduct. Built on Solana & IPFS with DAO governance and KOLE token incentives. 去中心化监督生态系统 - qdwqwdqwdqwd/KOLE
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/qdwqwdqwdqwd/KOLE
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/qdwqwdqwdqwd/KOLE
标签:#护网
GitHub
GitHub - qdwqwdqwdqwd/KOLE: KOLE - 基于区块链的KOL劣迹曝光平台 | Blockchain-based platform for exposing KOL misconduct. Built on Solana & IPFS…
KOLE - 基于区块链的KOL劣迹曝光平台 | Blockchain-based platform for exposing KOL misconduct. Built on Solana & IPFS with DAO governance and KOLE token incentives. 去中心化监督生态系统 - qdwqwdqwdqwd/KOLE
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team utility that alerts you to potential Blue Team, IDS, and IPS detection activity
URL:https://github.com/Acucarinho/Doppel
标签:#Red Team
更新了:Red Team
描述:Red Team utility that alerts you to potential Blue Team, IDS, and IPS detection activity
URL:https://github.com/Acucarinho/Doppel
标签:#Red Team
GitHub
GitHub - Acucarinho/Doppel: Red Team utility that alerts you to potential Blue Team, IDS, and IPS detection activity
Red Team utility that alerts you to potential Blue Team, IDS, and IPS detection activity - Acucarinho/Doppel
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:Spring Boot Actuator未授权访问漏洞检测工具
URL:https://github.com/renbon-wu/SBAunauth
标签:#漏洞检测
更新了:漏洞检测
描述:Spring Boot Actuator未授权访问漏洞检测工具
URL:https://github.com/renbon-wu/SBAunauth
标签:#漏洞检测
GitHub
GitHub - renbon-wu/SBAunauth: Spring Boot Actuator未授权访问漏洞检测工具
Spring Boot Actuator未授权访问漏洞检测工具. Contribute to renbon-wu/SBAunauth development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:XSS, SQLI, LFI, RCE Practice Labs in php
URL:https://github.com/KrazePlanet/KrazePlanetLabs
标签:#RCE
更新了:RCE
描述:XSS, SQLI, LFI, RCE Practice Labs in php
URL:https://github.com/KrazePlanet/KrazePlanetLabs
标签:#RCE
GitHub
GitHub - KrazePlanet/KrazePlanetLabs: XSS, SQLI, LFI, RCE Practice Labs in php
XSS, SQLI, LFI, RCE Practice Labs in php. Contribute to KrazePlanet/KrazePlanetLabs development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:XSS, SQLI, LFI, RCE Practice Labs in php
URL:https://github.com/KrazePlanet/KrazePlanetLabs
标签:#RCE
更新了:RCE
描述:XSS, SQLI, LFI, RCE Practice Labs in php
URL:https://github.com/KrazePlanet/KrazePlanetLabs
标签:#RCE
GitHub
GitHub - KrazePlanet/KrazePlanetLabs: XSS, SQLI, LFI, RCE Practice Labs in php
XSS, SQLI, LFI, RCE Practice Labs in php. Contribute to KrazePlanet/KrazePlanetLabs development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:A personal tool for webshell-based file management and vulnerability testing in local environments.
URL:https://github.com/gexer00/gexer-webshell
标签:#webshell
更新了:webshell
描述:A personal tool for webshell-based file management and vulnerability testing in local environments.
URL:https://github.com/gexer00/gexer-webshell
标签:#webshell
GitHub
GitHub - gexer00/gexer-webshell: A personal tool for webshell-based file management and vulnerability testing in local environments.
A personal tool for webshell-based file management and vulnerability testing in local environments. - gexer00/gexer-webshell
GitHub监控消息提醒!!!
更新了:Red Team
描述:ReconRoyale challenges, bug bounty experiments, and penetration testing notes | Red Team, subdomain, and cloud asset discovery
URL:https://github.com/fawadqureshi007/recon-assets
标签:#Red Team
更新了:Red Team
描述:ReconRoyale challenges, bug bounty experiments, and penetration testing notes | Red Team, subdomain, and cloud asset discovery
URL:https://github.com/fawadqureshi007/recon-assets
标签:#Red Team
GitHub
GitHub - fawadqureshi007/recon-assets: ReconRoyale challenges, bug bounty experiments, and penetration testing notes | Red Team…
ReconRoyale challenges, bug bounty experiments, and penetration testing notes | Red Team, subdomain, and cloud asset discovery - fawadqureshi007/recon-assets
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/sureshkumarsat/CVE-2025-31258-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/sureshkumarsat/CVE-2025-31258-PoC
标签:#CVE-2025
GitHub
GitHub - sureshkumarsat/CVE-2025-31258-PoC: 🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using …
🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice. - sureshkumarsat/CVE-2025-31258-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/sureshkumarsat/CVE-2025-31258-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/sureshkumarsat/CVE-2025-31258-PoC
标签:#CVE-2025
GitHub
GitHub - sureshkumarsat/CVE-2025-31258-PoC: 🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using …
🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice. - sureshkumarsat/CVE-2025-31258-PoC