GitHub监控消息提醒!!!
更新了:Red Team
描述:Awesome Red Teaming
URL:https://github.com/cybersecurity-dev/awesome-red-teaming
标签:#Red Team
更新了:Red Team
描述:Awesome Red Teaming
URL:https://github.com/cybersecurity-dev/awesome-red-teaming
标签:#Red Team
GitHub
GitHub - cybersecurity-dev/awesome-red-teaming: Awesome Red Teaming
Awesome Red Teaming. Contribute to cybersecurity-dev/awesome-red-teaming development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Drop-box Assessment Tool - Raspberry Pi
URL:https://github.com/botesjuan/BasicDropBox
标签:#Red Team
更新了:Red Team
描述:Red Team Drop-box Assessment Tool - Raspberry Pi
URL:https://github.com/botesjuan/BasicDropBox
标签:#Red Team
GitHub
GitHub - botesjuan/BasicDropBox: Red Team Drop-box Assessment Tool - Raspberry Pi
Red Team Drop-box Assessment Tool - Raspberry Pi. Contribute to botesjuan/BasicDropBox development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088 path traversal tool
URL:https://github.com/tartalu/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088 path traversal tool
URL:https://github.com/tartalu/CVE-2025-8088
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/techcorp/CVE-2025-8088-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/techcorp/CVE-2025-8088-Exploit
标签:#CVE-2025
GitHub
GitHub - techcorp/CVE-2025-8088-Exploit: A proof-of-concept exploit for WinRAR vulnerability (CVE-2025-8088) affecting versions…
A proof-of-concept exploit for WinRAR vulnerability (CVE-2025-8088) affecting versions 7.12 and lower. This tool creates a malicious RAR archive that embeds payloads in Alternate Data Streams (ADS)...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/techcorp/CVE-2025-8088-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/techcorp/CVE-2025-8088-Exploit
标签:#CVE-2025
GitHub
GitHub - techcorp/CVE-2025-8088-Exploit: A proof-of-concept exploit for WinRAR vulnerability (CVE-2025-8088) affecting versions…
A proof-of-concept exploit for WinRAR vulnerability (CVE-2025-8088) affecting versions 7.12 and lower. This tool creates a malicious RAR archive that embeds payloads in Alternate Data Streams (ADS)...
GitHub监控消息提醒!!!
更新了:burp
描述:A burp suite extension to add shortcut for encoding & decoding Unicode.
URL:https://github.com/szxcp/Unicode-Shortcut
标签:#burp
更新了:burp
描述:A burp suite extension to add shortcut for encoding & decoding Unicode.
URL:https://github.com/szxcp/Unicode-Shortcut
标签:#burp
GitHub
GitHub - szxcp/Unicode-Shortcut: A burp suite extension to add shortcut for encoding & decoding Unicode.
A burp suite extension to add shortcut for encoding & decoding Unicode. - szxcp/Unicode-Shortcut
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/q211521/Scrapy-Hotel
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/q211521/Scrapy-Hotel
标签:#护网
GitHub
GitHub - q211521/Scrapy-Hotel: A comprehensive 3-step web scraping system for extracting hotel information from Travel Weekly.…
A comprehensive 3-step web scraping system for extracting hotel information from Travel Weekly. Features dual-language support and robust anti-bot protection. | 从旅游周刊提取酒店信息的综合性3步网络爬虫系统,支持双语和强健的反机器人...
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/q211521/Scrapy-Hotel
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/q211521/Scrapy-Hotel
标签:#护网
GitHub
GitHub - q211521/Scrapy-Hotel: A comprehensive 3-step web scraping system for extracting hotel information from Travel Weekly.…
A comprehensive 3-step web scraping system for extracting hotel information from Travel Weekly. Features dual-language support and robust anti-bot protection. | 从旅游周刊提取酒店信息的综合性3步网络爬虫系统,支持双语和强健的反机器人...
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows/Linux machines
URL:https://github.com/maverick-doan/rce-checker
标签:#RCE
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows/Linux machines
URL:https://github.com/maverick-doan/rce-checker
标签:#RCE
GitHub
GitHub - maverick-doan/rce-checker: This is a simple and benign Go script that red teamers can drop and attempt execution to test…
This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows/Linux machines - maverick-doan/rce-checker
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows/Linux machines
URL:https://github.com/maverick-doan/rce-checker
标签:#RCE
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows/Linux machines
URL:https://github.com/maverick-doan/rce-checker
标签:#RCE
GitHub
GitHub - maverick-doan/rce-checker: This is a simple and benign Go script that red teamers can drop and attempt execution to test…
This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows/Linux machines - maverick-doan/rce-checker
GitHub监控消息提醒!!!
更新了:webshell
描述:Render Math Equations inside react native using katex inside webshell for dynamic height
URL:https://github.com/ibeginnernoob/react-native-katex
标签:#webshell
更新了:webshell
描述:Render Math Equations inside react native using katex inside webshell for dynamic height
URL:https://github.com/ibeginnernoob/react-native-katex
标签:#webshell
GitHub
GitHub - iAmAdheil/react-native-katex: Render Math Latex in React Native using Katex with Webshell
Render Math Latex in React Native using Katex with Webshell - iAmAdheil/react-native-katex
👍1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting.
URL:https://github.com/xV4nd3Rx/CVE-2025-57819_FreePBX-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting.
URL:https://github.com/xV4nd3Rx/CVE-2025-57819_FreePBX-PoC
标签:#CVE-2025
GitHub
GitHub - xV4nd3Rx/CVE-2025-57819_FreePBX-PoC: Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time…
Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting. - xV4nd3Rx/CVE-2025-57819_FreePBX-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting.
URL:https://github.com/xV4nd3Rx/CVE-2025-57819_FreePBX-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting.
URL:https://github.com/xV4nd3Rx/CVE-2025-57819_FreePBX-PoC
标签:#CVE-2025
GitHub
GitHub - xV4nd3Rx/CVE-2025-57819_FreePBX-PoC: Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time…
Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting. - xV4nd3Rx/CVE-2025-57819_FreePBX-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/volticks/CVE-2025-21692-poc
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/volticks/CVE-2025-21692-poc
标签:#CVE-2025
GitHub
GitHub - volticks/CVE-2025-21692-poc: Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version…
Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75 - volticks/CVE-2025-21692-poc
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/volticks/CVE-2025-21692-poc
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/volticks/CVE-2025-21692-poc
标签:#CVE-2025
GitHub
GitHub - volticks/CVE-2025-21692-poc: Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version…
Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75 - volticks/CVE-2025-21692-poc
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for CVE-2025-48543 in C++
URL:https://github.com/gamesarchive/CVE-2025-48543
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for CVE-2025-48543 in C++
URL:https://github.com/gamesarchive/CVE-2025-48543
标签:#CVE-2025
GitHub
GitHub - gamesarchive/CVE-2025-48543: PoC exploit for CVE-2025-48543 in C++
PoC exploit for CVE-2025-48543 in C++. Contribute to gamesarchive/CVE-2025-48543 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for CVE-2025-48543 in C++
URL:https://github.com/gamesarchive/CVE-2025-48543
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for CVE-2025-48543 in C++
URL:https://github.com/gamesarchive/CVE-2025-48543
标签:#CVE-2025
GitHub
GitHub - gamesarchive/CVE-2025-48543: PoC exploit for CVE-2025-48543 in C++
PoC exploit for CVE-2025-48543 in C++. Contribute to gamesarchive/CVE-2025-48543 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/Waletow/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
标签:#RCE
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/Waletow/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/brs6412/CVE-2025-24813
标签:#CVE-2025
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/brs6412/CVE-2025-24813
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/brs6412/CVE-2025-24813
标签:#CVE-2025
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/brs6412/CVE-2025-24813
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/Waletow/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
标签:#RCE
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/Waletow/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
标签:#RCE