GitHub监控消息提醒!!!
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows/Linux machines
URL:https://github.com/maverick-doan/rce-checker
标签:#RCE
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows/Linux machines
URL:https://github.com/maverick-doan/rce-checker
标签:#RCE
GitHub
GitHub - maverick-doan/rce-checker: This is a simple and benign Go script that red teamers can drop and attempt execution to test…
This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows/Linux machines - maverick-doan/rce-checker
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows/Linux machines
URL:https://github.com/maverick-doan/rce-checker
标签:#RCE
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows/Linux machines
URL:https://github.com/maverick-doan/rce-checker
标签:#RCE
GitHub
GitHub - maverick-doan/rce-checker: This is a simple and benign Go script that red teamers can drop and attempt execution to test…
This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows/Linux machines - maverick-doan/rce-checker
GitHub监控消息提醒!!!
更新了:webshell
描述:Render Math Equations inside react native using katex inside webshell for dynamic height
URL:https://github.com/ibeginnernoob/react-native-katex
标签:#webshell
更新了:webshell
描述:Render Math Equations inside react native using katex inside webshell for dynamic height
URL:https://github.com/ibeginnernoob/react-native-katex
标签:#webshell
GitHub
GitHub - iAmAdheil/react-native-katex: Render Math Latex in React Native using Katex with Webshell
Render Math Latex in React Native using Katex with Webshell - iAmAdheil/react-native-katex
👍1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting.
URL:https://github.com/xV4nd3Rx/CVE-2025-57819_FreePBX-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting.
URL:https://github.com/xV4nd3Rx/CVE-2025-57819_FreePBX-PoC
标签:#CVE-2025
GitHub
GitHub - xV4nd3Rx/CVE-2025-57819_FreePBX-PoC: Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time…
Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting. - xV4nd3Rx/CVE-2025-57819_FreePBX-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting.
URL:https://github.com/xV4nd3Rx/CVE-2025-57819_FreePBX-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting.
URL:https://github.com/xV4nd3Rx/CVE-2025-57819_FreePBX-PoC
标签:#CVE-2025
GitHub
GitHub - xV4nd3Rx/CVE-2025-57819_FreePBX-PoC: Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time…
Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting. - xV4nd3Rx/CVE-2025-57819_FreePBX-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/volticks/CVE-2025-21692-poc
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/volticks/CVE-2025-21692-poc
标签:#CVE-2025
GitHub
GitHub - volticks/CVE-2025-21692-poc: Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version…
Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75 - volticks/CVE-2025-21692-poc
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/volticks/CVE-2025-21692-poc
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/volticks/CVE-2025-21692-poc
标签:#CVE-2025
GitHub
GitHub - volticks/CVE-2025-21692-poc: Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version…
Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75 - volticks/CVE-2025-21692-poc
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for CVE-2025-48543 in C++
URL:https://github.com/gamesarchive/CVE-2025-48543
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for CVE-2025-48543 in C++
URL:https://github.com/gamesarchive/CVE-2025-48543
标签:#CVE-2025
GitHub
GitHub - gamesarchive/CVE-2025-48543: PoC exploit for CVE-2025-48543 in C++
PoC exploit for CVE-2025-48543 in C++. Contribute to gamesarchive/CVE-2025-48543 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for CVE-2025-48543 in C++
URL:https://github.com/gamesarchive/CVE-2025-48543
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for CVE-2025-48543 in C++
URL:https://github.com/gamesarchive/CVE-2025-48543
标签:#CVE-2025
GitHub
GitHub - gamesarchive/CVE-2025-48543: PoC exploit for CVE-2025-48543 in C++
PoC exploit for CVE-2025-48543 in C++. Contribute to gamesarchive/CVE-2025-48543 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/Waletow/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
标签:#RCE
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/Waletow/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/brs6412/CVE-2025-24813
标签:#CVE-2025
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/brs6412/CVE-2025-24813
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/brs6412/CVE-2025-24813
标签:#CVE-2025
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/brs6412/CVE-2025-24813
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/Waletow/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
标签:#RCE
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/Waletow/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/Waletow/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
标签:#RCE
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/Waletow/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/Waletow/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/Waletow/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/Waletow/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/Waletow/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/Waletow/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/Waletow/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙
URL:https://github.com/Secmode/Network-Traffic-Analysis-with-TCPdump-Wireshark
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙
URL:https://github.com/Secmode/Network-Traffic-Analysis-with-TCPdump-Wireshark
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/beijingshunyi/bjxche-wanhualou-resource
标签:#绕过
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/beijingshunyi/bjxche-wanhualou-resource
标签:#绕过
GitHub
GitHub - beijingshunyi/bjxche-wanhualou-resource: 在北京修车市场深耕多年,北京修车「万花楼」始终以 “专业、透明、共赢” 为核心价值,围绕从业者、LY伙伴与用户的多元需求,搭建起覆盖 “作业协同 - 信息公示…
在北京修车市场深耕多年,北京修车「万花楼」始终以 “专业、透明、共赢” 为核心价值,围绕从业者、LY伙伴与用户的多元需求,搭建起覆盖 “作业协同 - 信息公示 - 师资规范 - 用户互动 - 监督保障” 的全链路生态体系。为让更多人高效融入这一优质圈层,本手册系统梳理「万花楼」核心资源,通过清晰的分类、可直接跳转的通道,以及详尽的功能解读,助力您快速找到所需场景,实现精准资源对接与深度行业交...