GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models
URL:https://github.com/MKIRAHMET/CVE-2025-29927-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models
URL:https://github.com/MKIRAHMET/CVE-2025-29927-PoC
标签:#CVE-2025
GitHub
GitHub - MKIRAHMET/CVE-2025-29927-PoC: This repository contains **research and analysis** related to CVE-2025-29927. It demonstrates…
This repository contains **research and analysis** related to CVE-2025-29927. It demonstrates safe, controlled testing approaches for a path traversal/middleware misconfiguration vulnerability in...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/MKIRAHMET/CVE-2025-29927-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/MKIRAHMET/CVE-2025-29927-PoC
标签:#CVE-2025
GitHub
GitHub - MKIRAHMET/CVE-2025-29927-PoC: This repository contains **research and analysis** related to CVE-2025-29927. It demonstrates…
This repository contains **research and analysis** related to CVE-2025-29927. It demonstrates safe, controlled testing approaches for a path traversal/middleware misconfiguration vulnerability in...
GitHub监控消息提醒!!!
更新了:内存马
描述:哥斯拉插件,自定义内存马注入器,java-memshell-generator-Godzilla-custom,参考https://github.com/1ucky7/jmg-for-Godzilla,因为原插件没有自定义内存马注入的功能,所以顺手加了个,可输入base64字节码进行注入,感谢 1ucky7师傅
URL:https://github.com/h00klod0er/java-memshell-generator-Godzilla-custom
标签:#内存马
更新了:内存马
描述:哥斯拉插件,自定义内存马注入器,java-memshell-generator-Godzilla-custom,参考https://github.com/1ucky7/jmg-for-Godzilla,因为原插件没有自定义内存马注入的功能,所以顺手加了个,可输入base64字节码进行注入,感谢 1ucky7师傅
URL:https://github.com/h00klod0er/java-memshell-generator-Godzilla-custom
标签:#内存马
GitHub监控消息提醒!!!
更新了:反序列化
描述:基于vue3+element-plus+javascript-stringify的js序列化反序列化输入框组
URL:https://github.com/is-zhou/vue-serialize-input
标签:#反序列化
更新了:反序列化
描述:基于vue3+element-plus+javascript-stringify的js序列化反序列化输入框组
URL:https://github.com/is-zhou/vue-serialize-input
标签:#反序列化
GitHub
GitHub - is-zhou/vue-serialize-input: 基于vue3+element-plus+javascript-stringify的js序列化反序列化输入框组
基于vue3+element-plus+javascript-stringify的js序列化反序列化输入框组 - is-zhou/vue-serialize-input
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public writeup for CVE-2025-55996 (Viber Desktop HTML Injection)
URL:https://github.com/thawkhant/viber-desktop-html-injection
标签:#CVE-2025
更新了:CVE-2025
描述:Public writeup for CVE-2025-55996 (Viber Desktop HTML Injection)
URL:https://github.com/thawkhant/viber-desktop-html-injection
标签:#CVE-2025
GitHub
GitHub - thawkhant/viber-desktop-html-injection: Public writeup for CVE-2025-55996 (Viber Desktop HTML Injection)
Public writeup for CVE-2025-55996 (Viber Desktop HTML Injection) - thawkhant/viber-desktop-html-injection
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public writeup for CVE-2025-55996 (Viber Desktop HTML Injection)
URL:https://github.com/thawkhant/viber-desktop-html-injection
标签:#CVE-2025
更新了:CVE-2025
描述:Public writeup for CVE-2025-55996 (Viber Desktop HTML Injection)
URL:https://github.com/thawkhant/viber-desktop-html-injection
标签:#CVE-2025
GitHub
GitHub - thawkhant/viber-desktop-html-injection: Public writeup for CVE-2025-55996 (Viber Desktop HTML Injection)
Public writeup for CVE-2025-55996 (Viber Desktop HTML Injection) - thawkhant/viber-desktop-html-injection
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-3248
URL:https://github.com/min8282/CVE-2025-3248
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-3248
URL:https://github.com/min8282/CVE-2025-3248
标签:#CVE-2025
GitHub
GitHub - min8282/CVE-2025-3248: CVE-2025-3248
CVE-2025-3248. Contribute to min8282/CVE-2025-3248 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-3248
URL:https://github.com/min8282/CVE-2025-3248
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-3248
URL:https://github.com/min8282/CVE-2025-3248
标签:#CVE-2025
GitHub
GitHub - min8282/CVE-2025-3248: CVE-2025-3248
CVE-2025-3248. Contribute to min8282/CVE-2025-3248 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Grafana CVE-2025-4123-POC
URL:https://github.com/ItsNee/Grafana-CVE-2025-4123-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Grafana CVE-2025-4123-POC
URL:https://github.com/ItsNee/Grafana-CVE-2025-4123-POC
标签:#CVE-2025
GitHub
GitHub - ItsNee/Grafana-CVE-2025-4123-POC: Grafana CVE-2025-4123-POC
Grafana CVE-2025-4123-POC. Contribute to ItsNee/Grafana-CVE-2025-4123-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Grafana CVE-2025-4123-POC
URL:https://github.com/ItsNee/Grafana-CVE-2025-4123-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Grafana CVE-2025-4123-POC
URL:https://github.com/ItsNee/Grafana-CVE-2025-4123-POC
标签:#CVE-2025
GitHub
GitHub - ItsNee/Grafana-CVE-2025-4123-POC: Grafana CVE-2025-4123-POC
Grafana CVE-2025-4123-POC. Contribute to ItsNee/Grafana-CVE-2025-4123-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:GIT vulnerability | Carriage Return and RCE on cloning
URL:https://github.com/s41r4j/CVE-2025-48384
标签:#RCE
更新了:RCE
描述:GIT vulnerability | Carriage Return and RCE on cloning
URL:https://github.com/s41r4j/CVE-2025-48384
标签:#RCE
GitHub
GitHub - s41r4j/CVE-2025-48384: GIT vulnerability | Carriage Return and RCE on cloning
GIT vulnerability | Carriage Return and RCE on cloning - s41r4j/CVE-2025-48384
GitHub监控消息提醒!!!
更新了:信息收集
描述:本工具是一款基于 PyQt5 开发的 URL 信息收集工具,支持批量测试 URL 的状态码、响应包大小、页面标题等信息,并可将结果导出为 Excel 文件,适用于网站管理员、测试人员快速核查 URL 状态。
URL:https://github.com/Astronaut-AIO/url-info-collector
标签:#信息收集
更新了:信息收集
描述:本工具是一款基于 PyQt5 开发的 URL 信息收集工具,支持批量测试 URL 的状态码、响应包大小、页面标题等信息,并可将结果导出为 Excel 文件,适用于网站管理员、测试人员快速核查 URL 状态。
URL:https://github.com/Astronaut-AIO/url-info-collector
标签:#信息收集
GitHub
GitHub - Astronaut-AIO/url-info-collector: 本工具是一款基于 PyQt5 开发的 URL 信息收集工具,支持批量测试 URL 的状态码、响应包大小、页面标题等信息,并可将结果导出为 Excel 文件,适用于网站管理员、测试人员快速核查…
本工具是一款基于 PyQt5 开发的 URL 信息收集工具,支持批量测试 URL 的状态码、响应包大小、页面标题等信息,并可将结果导出为 Excel 文件,适用于网站管理员、测试人员快速核查 URL 状态。 - Astronaut-AIO/url-info-collector
GitHub监控消息提醒!!!
更新了:信息收集
描述:本工具是一款基于 PyQt5 开发的 URL 信息收集工具,支持批量测试 URL 的状态码、响应包大小、页面标题等信息,并可将结果导出为 Excel 文件,适用于网站管理员、测试人员快速核查 URL 状态。
URL:https://github.com/Astronaut-AIO/url-info-collector
标签:#信息收集
更新了:信息收集
描述:本工具是一款基于 PyQt5 开发的 URL 信息收集工具,支持批量测试 URL 的状态码、响应包大小、页面标题等信息,并可将结果导出为 Excel 文件,适用于网站管理员、测试人员快速核查 URL 状态。
URL:https://github.com/Astronaut-AIO/url-info-collector
标签:#信息收集
GitHub
GitHub - Astronaut-AIO/url-info-collector: 本工具是一款基于 PyQt5 开发的 URL 信息收集工具,支持批量测试 URL 的状态码、响应包大小、页面标题等信息,并可将结果导出为 Excel 文件,适用于网站管理员、测试人员快速核查…
本工具是一款基于 PyQt5 开发的 URL 信息收集工具,支持批量测试 URL 的状态码、响应包大小、页面标题等信息,并可将结果导出为 Excel 文件,适用于网站管理员、测试人员快速核查 URL 状态。 - Astronaut-AIO/url-info-collector
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Lab project analyzing Hyper-V kernel crash behavior (CVE-2025-21333) using WinDbg and Windows internals
URL:https://github.com/rahul0xkr/Reporducing-CVE-2025-21333-
标签:#CVE-2025
更新了:CVE-2025
描述:Lab project analyzing Hyper-V kernel crash behavior (CVE-2025-21333) using WinDbg and Windows internals
URL:https://github.com/rahul0xkr/Reporducing-CVE-2025-21333-
标签:#CVE-2025
GitHub
rahul0xkr/Reporducing-CVE-2025-21333-
Lab project analyzing Hyper-V kernel crash behavior (CVE-2025-21333) using WinDbg and Windows internals - rahul0xkr/Reporducing-CVE-2025-21333-
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Lab project analyzing Hyper-V kernel crash behavior (CVE-2025-21333) using WinDbg and Windows internals
URL:https://github.com/rahul0xkr/Reporducing-CVE-2025-21333
标签:#CVE-2025
更新了:CVE-2025
描述:Lab project analyzing Hyper-V kernel crash behavior (CVE-2025-21333) using WinDbg and Windows internals
URL:https://github.com/rahul0xkr/Reporducing-CVE-2025-21333
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Lab project analyzing Hyper-V kernel crash behavior (CVE-2025-21333) using WinDbg and Windows internals.
URL:https://github.com/rahul0xkr/Reproducing-CVE-2025-21333-
标签:#CVE-2025
更新了:CVE-2025
描述:Lab project analyzing Hyper-V kernel crash behavior (CVE-2025-21333) using WinDbg and Windows internals.
URL:https://github.com/rahul0xkr/Reproducing-CVE-2025-21333-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Lab project analyzing Hyper-V kernel crash behavior (CVE-2025-21333) using WinDbg and Windows internals
URL:https://github.com/rahul0xkr/Reproducing-CVE-2025-21333-
标签:#CVE-2025
更新了:CVE-2025
描述:Lab project analyzing Hyper-V kernel crash behavior (CVE-2025-21333) using WinDbg and Windows internals
URL:https://github.com/rahul0xkr/Reproducing-CVE-2025-21333-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Red Team
描述:A C# based Red Team utility, to execute commands on a remote windows system using SMB/SCCM
URL:https://github.com/5w0rdfi5h/Torpedo
标签:#Red Team
更新了:Red Team
描述:A C# based Red Team utility, to execute commands on a remote windows system using SMB/SCCM
URL:https://github.com/5w0rdfi5h/Torpedo
标签:#Red Team
GitHub
GitHub - 5w0rdfi5h/Torpedo: A C# based Red Team utility, to execute commands on a remote windows system using SMB/SCCM
A C# based Red Team utility, to execute commands on a remote windows system using SMB/SCCM - 5w0rdfi5h/Torpedo
GitHub监控消息提醒!!!
更新了:burp
描述:Auto updating flake for burpsuite pro
URL:https://github.com/yechielw/burpsuite.nix
标签:#burp
更新了:burp
描述:Auto updating flake for burpsuite pro
URL:https://github.com/yechielw/burpsuite.nix
标签:#burp
GitHub
GitHub - yechielw/burpsuite.nix: Auto updating flake for burpsuite pro
Auto updating flake for burpsuite pro. Contribute to yechielw/burpsuite.nix development by creating an account on GitHub.