GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/Waletow/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
URL:https://github.com/Waletow/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
更新了:CVE-2025
描述:Example PoC for CVE-2025-24813 (Tomcat RCE)
URL:https://github.com/Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙
URL:https://github.com/Secmode/Network-Traffic-Analysis-with-TCPdump-Wireshark
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙
URL:https://github.com/Secmode/Network-Traffic-Analysis-with-TCPdump-Wireshark
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/beijingshunyi/bjxche-wanhualou-resource
标签:#绕过
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/beijingshunyi/bjxche-wanhualou-resource
标签:#绕过
GitHub
GitHub - beijingshunyi/bjxche-wanhualou-resource: 在北京修车市场深耕多年,北京修车「万花楼」始终以 “专业、透明、共赢” 为核心价值,围绕从业者、LY伙伴与用户的多元需求,搭建起覆盖 “作业协同 - 信息公示…
在北京修车市场深耕多年,北京修车「万花楼」始终以 “专业、透明、共赢” 为核心价值,围绕从业者、LY伙伴与用户的多元需求,搭建起覆盖 “作业协同 - 信息公示 - 师资规范 - 用户互动 - 监督保障” 的全链路生态体系。为让更多人高效融入这一优质圈层,本手册系统梳理「万花楼」核心资源,通过清晰的分类、可直接跳转的通道,以及详尽的功能解读,助力您快速找到所需场景,实现精准资源对接与深度行业交...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This playbook outlines detection, containment, and remediation strategies for CVE-2025-55234, a critical Windows SMB privilege escalation flaw.
URL:https://github.com/mrk336/Patch-the-Path-CVE-2025-55234-Detection-Defense
标签:#CVE-2025
更新了:CVE-2025
描述:This playbook outlines detection, containment, and remediation strategies for CVE-2025-55234, a critical Windows SMB privilege escalation flaw.
URL:https://github.com/mrk336/Patch-the-Path-CVE-2025-55234-Detection-Defense
标签:#CVE-2025
GitHub
GitHub - mrk336/Patch-the-Path-CVE-2025-55234-Detection-Defense: This playbook outlines detection, containment, and remediation…
This playbook outlines detection, containment, and remediation strategies for CVE-2025-55234, a critical Windows SMB privilege escalation flaw. - mrk336/Patch-the-Path-CVE-2025-55234-Detection-Defense
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This playbook outlines detection, containment, and remediation strategies for CVE-2025-55234, a critical Windows SMB privilege escalation flaw.
URL:https://github.com/mrk336/Patch-the-Path-CVE-2025-55234-Detection-Defense
标签:#CVE-2025
更新了:CVE-2025
描述:This playbook outlines detection, containment, and remediation strategies for CVE-2025-55234, a critical Windows SMB privilege escalation flaw.
URL:https://github.com/mrk336/Patch-the-Path-CVE-2025-55234-Detection-Defense
标签:#CVE-2025
GitHub
GitHub - mrk336/Patch-the-Path-CVE-2025-55234-Detection-Defense: This playbook outlines detection, containment, and remediation…
This playbook outlines detection, containment, and remediation strategies for CVE-2025-55234, a critical Windows SMB privilege escalation flaw. - mrk336/Patch-the-Path-CVE-2025-55234-Detection-Defense
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025–58444
URL:https://github.com/intbjw/Inspector-xss-poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025–58444
URL:https://github.com/intbjw/Inspector-xss-poc
标签:#CVE-2025
GitHub
GitHub - intbjw/Inspector-xss-poc: CVE-2025–58444
CVE-2025–58444. Contribute to intbjw/Inspector-xss-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-38501, KSMBDrain
URL:https://github.com/keymaker-arch/KSMBDrain
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-38501, KSMBDrain
URL:https://github.com/keymaker-arch/KSMBDrain
标签:#CVE-2025
GitHub
GitHub - keymaker-arch/KSMBDrain: CVE-2025-38501, KSMBDrain
CVE-2025-38501, KSMBDrain. Contribute to keymaker-arch/KSMBDrain development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:burp
描述:A burp extention for computing diffs between http responses
URL:https://github.com/nguyenthdat/diff-last-response
标签:#burp
更新了:burp
描述:A burp extention for computing diffs between http responses
URL:https://github.com/nguyenthdat/diff-last-response
标签:#burp
GitHub
GitHub - nguyenthdat/diff-last-response: A burp extention for computing diffs between http responses
A burp extention for computing diffs between http responses - nguyenthdat/diff-last-response
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-38501, KSMBDrain
URL:https://github.com/keymaker-arch/KSMBDrain
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-38501, KSMBDrain
URL:https://github.com/keymaker-arch/KSMBDrain
标签:#CVE-2025
GitHub
GitHub - keymaker-arch/KSMBDrain: CVE-2025-38501, KSMBDrain
CVE-2025-38501, KSMBDrain. Contribute to keymaker-arch/KSMBDrain development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:A hands-on portfolio showcasing my skills in IT support and cybersecurity, including Red Team and Blue Team labs, SOC setup, Azure CICD, and threat management.
URL:https://github.com/KevinVallyatharyilThomas/IT-Cybersecurity-Portfolio
标签:#Red Team
更新了:Red Team
描述:A hands-on portfolio showcasing my skills in IT support and cybersecurity, including Red Team and Blue Team labs, SOC setup, Azure CICD, and threat management.
URL:https://github.com/KevinVallyatharyilThomas/IT-Cybersecurity-Portfolio
标签:#Red Team
GitHub
GitHub - KevinVallyatharyilThomas/IT-Cybersecurity-Portfolio: A hands-on portfolio showcasing my skills in IT support and cybersecurity…
A hands-on portfolio showcasing my skills in IT support and cybersecurity, including Red Team and Blue Team labs, SOC setup, Azure CICD, and threat management. - KevinVallyatharyilThomas/IT-Cyberse...
GitHub监控消息提醒!!!
更新了:Red Team
描述:A hands-on portfolio showcasing my skills in IT support and cybersecurity, including Red Team and Blue Team labs, SOC setup, Azure CICD, and threat management.
URL:https://github.com/TWBerry/c2-client
标签:#Red Team
更新了:Red Team
描述:A hands-on portfolio showcasing my skills in IT support and cybersecurity, including Red Team and Blue Team labs, SOC setup, Azure CICD, and threat management.
URL:https://github.com/TWBerry/c2-client
标签:#Red Team
GitHub
GitHub - TWBerry/c2-client: Modular Bash-based C2 client framework for penetration testing and red team labs. Supports multiple…
Modular Bash-based C2 client framework for penetration testing and red team labs. Supports multiple execution modules, fallback helpers, and emergency upload methods to adapt to various target envi...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59376, CVE-59377
URL:https://github.com/william31212/-Pending-CVE-Requests-1896609---feiskyer-mcp-kubernetes-server
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59376, CVE-59377
URL:https://github.com/william31212/-Pending-CVE-Requests-1896609---feiskyer-mcp-kubernetes-server
标签:#CVE-2025
GitHub
GitHub - william31212/CVE-Requests-1896609: CVE-2025-59376, CVE-59377
CVE-2025-59376, CVE-59377. Contribute to william31212/CVE-Requests-1896609 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59376, CVE-59377
URL:https://github.com/william31212/CVE-Requests-1896609
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59376, CVE-59377
URL:https://github.com/william31212/CVE-Requests-1896609
标签:#CVE-2025
GitHub
GitHub - william31212/CVE-Requests-1896609: CVE-2025-59376, CVE-2025-59377
CVE-2025-59376, CVE-2025-59377. Contribute to william31212/CVE-Requests-1896609 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:[Pending]CVE-2025-59376, CVE-2025-59377
URL:https://github.com/william31212/CVE-Requests-1896609
标签:#CVE-2025
更新了:CVE-2025
描述:[Pending]CVE-2025-59376, CVE-2025-59377
URL:https://github.com/william31212/CVE-Requests-1896609
标签:#CVE-2025
GitHub
GitHub - william31212/CVE-Requests-1896609: CVE-2025-59376, CVE-2025-59377
CVE-2025-59376, CVE-2025-59377. Contribute to william31212/CVE-Requests-1896609 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088 path traversal tool
URL:https://github.com/tartalu/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088 path traversal tool
URL:https://github.com/tartalu/CVE-2025-8088
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:webshell
描述:现代化的php webshell管理工具,支持文件管理、数据库管理、命令执行
URL:https://github.com/z-xialeng/php_webshell
标签:#webshell
更新了:webshell
描述:现代化的php webshell管理工具,支持文件管理、数据库管理、命令执行
URL:https://github.com/z-xialeng/php_webshell
标签:#webshell