GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Lab project analyzing Hyper-V kernel crash behavior (CVE-2025-21333) using WinDbg and Windows internals.
URL:https://github.com/rahul0xkr/Reproducing-CVE-2025-21333-
标签:#CVE-2025
更新了:CVE-2025
描述:Lab project analyzing Hyper-V kernel crash behavior (CVE-2025-21333) using WinDbg and Windows internals.
URL:https://github.com/rahul0xkr/Reproducing-CVE-2025-21333-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Lab project analyzing Hyper-V kernel crash behavior (CVE-2025-21333) using WinDbg and Windows internals
URL:https://github.com/rahul0xkr/Reproducing-CVE-2025-21333-
标签:#CVE-2025
更新了:CVE-2025
描述:Lab project analyzing Hyper-V kernel crash behavior (CVE-2025-21333) using WinDbg and Windows internals
URL:https://github.com/rahul0xkr/Reproducing-CVE-2025-21333-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Red Team
描述:A C# based Red Team utility, to execute commands on a remote windows system using SMB/SCCM
URL:https://github.com/5w0rdfi5h/Torpedo
标签:#Red Team
更新了:Red Team
描述:A C# based Red Team utility, to execute commands on a remote windows system using SMB/SCCM
URL:https://github.com/5w0rdfi5h/Torpedo
标签:#Red Team
GitHub
GitHub - 5w0rdfi5h/Torpedo: A C# based Red Team utility, to execute commands on a remote windows system using SMB/SCCM
A C# based Red Team utility, to execute commands on a remote windows system using SMB/SCCM - 5w0rdfi5h/Torpedo
GitHub监控消息提醒!!!
更新了:burp
描述:Auto updating flake for burpsuite pro
URL:https://github.com/yechielw/burpsuite.nix
标签:#burp
更新了:burp
描述:Auto updating flake for burpsuite pro
URL:https://github.com/yechielw/burpsuite.nix
标签:#burp
GitHub
GitHub - yechielw/burpsuite.nix: Auto updating flake for burpsuite pro
Auto updating flake for burpsuite pro. Contribute to yechielw/burpsuite.nix development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:A C# based Red Team utility, to execute commands on a remote windows system using SMB/SCCM
URL:https://github.com/Loksharan-soc/Offensive-Security-Lab
标签:#Red Team
更新了:Red Team
描述:A C# based Red Team utility, to execute commands on a remote windows system using SMB/SCCM
URL:https://github.com/Loksharan-soc/Offensive-Security-Lab
标签:#Red Team
GitHub
GitHub - Loksharan-soc/Offensive-Security-Lab: Offensive Security Lab showcasing hands-on Red Team exercises, CEH lab simulations…
Offensive Security Lab showcasing hands-on Red Team exercises, CEH lab simulations, penetration testing, exploit development, and industry-standard tools for ethical hacking and cybersecurity skill...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:BeyondCart Connector <= 2.1.0 - Missing Configuration of JWT Secret to Unauthenticated Privilege Escalation 🚨 BeyondCart Connector <= 2.1.0 - JWT Privilege Escalation (CVE-2025-8570)
URL:https://github.com/chimdi2700/CVE-2025-8570
标签:#CVE-2025
更新了:CVE-2025
描述:BeyondCart Connector <= 2.1.0 - Missing Configuration of JWT Secret to Unauthenticated Privilege Escalation 🚨 BeyondCart Connector <= 2.1.0 - JWT Privilege Escalation (CVE-2025-8570)
URL:https://github.com/chimdi2700/CVE-2025-8570
标签:#CVE-2025
GitHub
chimdi2700/CVE-2025-8570
BeyondCart Connector <= 2.1.0 - Missing Configuration of JWT Secret to Unauthenticated Privilege Escalation 🚨 BeyondCart Connector <= 2.1.0 - JWT Privilege Escalation (CVE-2025-8570) ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:BeyondCart Connector <= 2.1.0 - Missing Configuration of JWT Secret to Unauthenticated Privilege Escalation 🚨 BeyondCart Connector <= 2.1.0 - JWT Privilege Escalation (CVE-2025-8570)
URL:https://github.com/chimdi2700/CVE-2025-8570
标签:#CVE-2025
更新了:CVE-2025
描述:BeyondCart Connector <= 2.1.0 - Missing Configuration of JWT Secret to Unauthenticated Privilege Escalation 🚨 BeyondCart Connector <= 2.1.0 - JWT Privilege Escalation (CVE-2025-8570)
URL:https://github.com/chimdi2700/CVE-2025-8570
标签:#CVE-2025
GitHub
chimdi2700/CVE-2025-8570
BeyondCart Connector <= 2.1.0 - Missing Configuration of JWT Secret to Unauthenticated Privilege Escalation 🚨 BeyondCart Connector <= 2.1.0 - JWT Privilege Escalation (CVE-2025-8570) ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8571
URL:https://github.com/chimdi2700/CVE-2025-8571
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8571
URL:https://github.com/chimdi2700/CVE-2025-8571
标签:#CVE-2025
GitHub
GitHub - chimdi2700/CVE-2025-8571: CVE-2025-8571
CVE-2025-8571. Contribute to chimdi2700/CVE-2025-8571 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:RCET3375 lab experiments
URL:https://github.com/Christopher-isu/RCET3375
标签:#RCE
更新了:RCE
描述:RCET3375 lab experiments
URL:https://github.com/Christopher-isu/RCET3375
标签:#RCE
GitHub
GitHub - Christopher-isu/RCET3375: RCET3375 lab experiments
RCET3375 lab experiments. Contribute to Christopher-isu/RCET3375 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:RCET3375 lab experiments
URL:https://github.com/Christopher-isu/RCET3375
标签:#RCE
更新了:RCE
描述:RCET3375 lab experiments
URL:https://github.com/Christopher-isu/RCET3375
标签:#RCE
GitHub
GitHub - Christopher-isu/RCET3375: RCET3375 lab experiments
RCET3375 lab experiments. Contribute to Christopher-isu/RCET3375 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:FreePBX versions 15, 16, and 17 contain a Remote Code Execution (RCE) vulnerability caused by insufficient sanitization of user-supplied data in endpoints.
URL:https://github.com/MuhammadWaseem29/SQL-Injection-and-RCE_CVE-2025-57819
标签:#CVE-2025
更新了:CVE-2025
描述:FreePBX versions 15, 16, and 17 contain a Remote Code Execution (RCE) vulnerability caused by insufficient sanitization of user-supplied data in endpoints.
URL:https://github.com/MuhammadWaseem29/SQL-Injection-and-RCE_CVE-2025-57819
标签:#CVE-2025
GitHub
GitHub - MuhammadWaseem29/SQL-Injection-and-RCE_CVE-2025-57819: FreePBX versions 15, 16, and 17 contain a Remote Code Execution…
FreePBX versions 15, 16, and 17 contain a Remote Code Execution (RCE) vulnerability caused by insufficient sanitization of user-supplied data in endpoints. - MuhammadWaseem29/SQL-Injection-and-RCE_...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:FreePBX versions 15, 16, and 17 contain a Remote Code Execution (RCE) vulnerability caused by insufficient sanitization of user-supplied data in endpoints.
URL:https://github.com/MuhammadWaseem29/SQL-Injection-and-RCE_CVE-2025-57819
标签:#CVE-2025
更新了:CVE-2025
描述:FreePBX versions 15, 16, and 17 contain a Remote Code Execution (RCE) vulnerability caused by insufficient sanitization of user-supplied data in endpoints.
URL:https://github.com/MuhammadWaseem29/SQL-Injection-and-RCE_CVE-2025-57819
标签:#CVE-2025
GitHub
GitHub - MuhammadWaseem29/SQL-Injection-and-RCE_CVE-2025-57819: FreePBX versions 15, 16, and 17 contain a Remote Code Execution…
FreePBX versions 15, 16, and 17 contain a Remote Code Execution (RCE) vulnerability caused by insufficient sanitization of user-supplied data in endpoints. - MuhammadWaseem29/SQL-Injection-and-RCE_...
GitHub监控消息提醒!!!
更新了:RCE
描述:FreePBX versions 15, 16, and 17 contain a Remote Code Execution (RCE) vulnerability caused by insufficient sanitization of user-supplied data in endpoints.
URL:https://github.com/CyberPrince-hub/cpvst
标签:#RCE
更新了:RCE
描述:FreePBX versions 15, 16, and 17 contain a Remote Code Execution (RCE) vulnerability caused by insufficient sanitization of user-supplied data in endpoints.
URL:https://github.com/CyberPrince-hub/cpvst
标签:#RCE
GitHub
GitHub - CyberPrince-hub/cpvst: 🛡️ Tool Overview CPVST (Cyber Prince Vulnerability Scanner Tool) is an advanced, automated web…
🛡️ Tool Overview CPVST (Cyber Prince Vulnerability Scanner Tool) is an advanced, automated web application security scanner designed to identify critical vulnerabilities with high accuracy. Built ...
GitHub监控消息提醒!!!
更新了:RCE
描述:FreePBX versions 15, 16, and 17 contain a Remote Code Execution (RCE) vulnerability caused by insufficient sanitization of user-supplied data in endpoints.
URL:https://github.com/CyberPrince-hub/cpvst
标签:#RCE
更新了:RCE
描述:FreePBX versions 15, 16, and 17 contain a Remote Code Execution (RCE) vulnerability caused by insufficient sanitization of user-supplied data in endpoints.
URL:https://github.com/CyberPrince-hub/cpvst
标签:#RCE
GitHub
GitHub - CyberPrince-hub/cpvst: 🛡️ Tool Overview CPVST (Cyber Prince Vulnerability Scanner Tool) is an advanced, automated web…
🛡️ Tool Overview CPVST (Cyber Prince Vulnerability Scanner Tool) is an advanced, automated web application security scanner designed to identify critical vulnerabilities with high accuracy. Built ...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Hackery & Web p0wn
URL:https://github.com/rolling-code/PowerShell-Scripts
标签:#Red Team
更新了:Red Team
描述:Red Team Hackery & Web p0wn
URL:https://github.com/rolling-code/PowerShell-Scripts
标签:#Red Team
GitHub
GitHub - rolling-code/PowerShell-Scripts: Red Team Hackery & Web p0wn
Red Team Hackery & Web p0wn. Contribute to rolling-code/PowerShell-Scripts development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:This is an extension the Automated Red Teaming Project
URL:https://github.com/Sandeepkumaramgothu/Adverse_Red_Teamingl
标签:#Red Team
更新了:Red Team
描述:This is an extension the Automated Red Teaming Project
URL:https://github.com/Sandeepkumaramgothu/Adverse_Red_Teamingl
标签:#Red Team
GitHub
GitHub - Sandeepkumaramgothu/llm-redteam-colab: This is an extension the Automated Red Teaming Project
This is an extension the Automated Red Teaming Project - Sandeepkumaramgothu/llm-redteam-colab
GitHub监控消息提醒!!!
更新了:RCE
描述:Node.js site with Tailwind CSS to demonstrate passing XSS, SQLi, and RCE from client to origin.
URL:https://github.com/aperauch/Cloudflare-WAF-Demo-Simple
标签:#RCE
更新了:RCE
描述:Node.js site with Tailwind CSS to demonstrate passing XSS, SQLi, and RCE from client to origin.
URL:https://github.com/aperauch/Cloudflare-WAF-Demo-Simple
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Node.js site with Tailwind CSS to demonstrate passing XSS, SQLi, and RCE from client to origin.
URL:https://github.com/aperauch/Cloudflare-WAF-Demo-Simple
标签:#RCE
更新了:RCE
描述:Node.js site with Tailwind CSS to demonstrate passing XSS, SQLi, and RCE from client to origin.
URL:https://github.com/aperauch/Cloudflare-WAF-Demo-Simple
标签:#RCE
GitHub监控消息提醒!!!
更新了:渗透测试
描述:xkInfoScan 是一款集成化的网络信息收集与安全扫描工具,支持 IP / 域名 / URL /信息追踪多维度目标探测,涵盖目录扫描、CMS 识别、漏洞检测、信息泄露挖掘、CDN 检测等核心功能,适用于渗透测试前期信息收集、网络资产测绘及安全风险评估场景。
URL:https://github.com/xk11z/xkinfoscan
标签:#渗透测试
更新了:渗透测试
描述:xkInfoScan 是一款集成化的网络信息收集与安全扫描工具,支持 IP / 域名 / URL /信息追踪多维度目标探测,涵盖目录扫描、CMS 识别、漏洞检测、信息泄露挖掘、CDN 检测等核心功能,适用于渗透测试前期信息收集、网络资产测绘及安全风险评估场景。
URL:https://github.com/xk11z/xkinfoscan
标签:#渗透测试
GitHub
GitHub - xk11z/xkinfoscan: xkInfoScan 是一款集成化的网络信息收集与安全扫描工具,支持 IP / 域名 / URL /信息追踪多维度目标探测,涵盖目录扫描、CMS 识别、漏洞检测、信息泄露挖掘、CDN 检测等核心功能…
xkInfoScan 是一款集成化的网络信息收集与安全扫描工具,支持 IP / 域名 / URL /信息追踪多维度目标探测,涵盖目录扫描、CMS 识别、漏洞检测、信息泄露挖掘、CDN 检测等核心功能,适用于渗透测试前期信息收集、网络资产测绘及安全风险评估场景。 - xk11z/xkinfoscan
GitHub监控消息提醒!!!
更新了:信息收集
描述:xkInfoScan 是一款集成化的网络信息收集与安全扫描工具,支持 IP / 域名 / URL /信息追踪多维度目标探测,涵盖目录扫描、CMS 识别、漏洞检测、信息泄露挖掘、CDN 检测等核心功能,适用于渗透测试前期信息收集、网络资产测绘及安全风险评估场景。
URL:https://github.com/xk11z/xkinfoscan
标签:#信息收集
更新了:信息收集
描述:xkInfoScan 是一款集成化的网络信息收集与安全扫描工具,支持 IP / 域名 / URL /信息追踪多维度目标探测,涵盖目录扫描、CMS 识别、漏洞检测、信息泄露挖掘、CDN 检测等核心功能,适用于渗透测试前期信息收集、网络资产测绘及安全风险评估场景。
URL:https://github.com/xk11z/xkinfoscan
标签:#信息收集
GitHub
GitHub - xk11z/xkinfoscan: xkInfoScan 是一款集成化的网络信息收集与安全扫描工具,支持 IP / 域名 / URL /信息追踪多维度目标探测,涵盖目录扫描、CMS 识别、漏洞检测、信息泄露挖掘、CDN 检测等核心功能…
xkInfoScan 是一款集成化的网络信息收集与安全扫描工具,支持 IP / 域名 / URL /信息追踪多维度目标探测,涵盖目录扫描、CMS 识别、漏洞检测、信息泄露挖掘、CDN 检测等核心功能,适用于渗透测试前期信息收集、网络资产测绘及安全风险评估场景。 - xk11z/xkinfoscan
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-48384-submodule
URL:https://github.com/s41r4j/CVE-2025-48384-submodule
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-48384-submodule
URL:https://github.com/s41r4j/CVE-2025-48384-submodule
标签:#CVE-2025
GitHub
GitHub - s41r4j/CVE-2025-48384-submodule: CVE-2025-48384-submodule
CVE-2025-48384-submodule. Contribute to s41r4j/CVE-2025-48384-submodule development by creating an account on GitHub.