GitHub监控消息提醒!!!
更新了:Red Team
描述:\"The Deva-OS Chronicle: A Red Team Journey Through the Mahabharata\"
URL:https://github.com/darkvyuh/Red-Team-Mahabharata
标签:#Red Team
更新了:Red Team
描述:\"The Deva-OS Chronicle: A Red Team Journey Through the Mahabharata\"
URL:https://github.com/darkvyuh/Red-Team-Mahabharata
标签:#Red Team
GitHub
GitHub - darkvyuh/Red-Team-Mahabharata: "The Deva-OS Chronicle: A Red Team Journey Through the Mahabharata"
"The Deva-OS Chronicle: A Red Team Journey Through the Mahabharata" - darkvyuh/Red-Team-Mahabharata
GitHub监控消息提醒!!!
更新了:钓鱼
描述:大揭秘:老王加速器怎么样?老王VPN是钓鱼软件吗?老王VPN用不了了吗?本篇文章将为你深入解析老王加速器的实际情况,从基本介绍到安全性分析,帮助你更全面地了解这个备受关注的翻墙软件。我们还推荐了两款老王VPN的最佳替代品,大家可以根据自身需求选择使用。
URL:https://github.com/chinavpns/wangvpn
标签:#钓鱼
更新了:钓鱼
描述:大揭秘:老王加速器怎么样?老王VPN是钓鱼软件吗?老王VPN用不了了吗?本篇文章将为你深入解析老王加速器的实际情况,从基本介绍到安全性分析,帮助你更全面地了解这个备受关注的翻墙软件。我们还推荐了两款老王VPN的最佳替代品,大家可以根据自身需求选择使用。
URL:https://github.com/chinavpns/wangvpn
标签:#钓鱼
GitHub
GitHub - chinavpns/wangvpn: 大揭秘:老王加速器怎么样?老王VPN是钓鱼软件吗?老王VPN用不了了吗?本篇文章将为你深入解析老王加速器的实际情况,从基本介绍到安全性分析,帮助你更全面地了解这个备受关注的翻墙软件。我们还推荐了两…
大揭秘:老王加速器怎么样?老王VPN是钓鱼软件吗?老王VPN用不了了吗?本篇文章将为你深入解析老王加速器的实际情况,从基本介绍到安全性分析,帮助你更全面地了解这个备受关注的翻墙软件。我们还推荐了两款老王VPN的最佳替代品,大家可以根据自身需求选择使用。 - chinavpns/wangvpn
GitHub监控消息提醒!!!
更新了:绕过
描述:一个基于Java和Jsoup的高效爬虫工具,专门用于自动化收集BOSS直聘网站的职位招聘信息。该项目通过模拟浏览器行为绕过反爬机制,支持多关键词搜索、多城市切换和自动翻页功能,能够提取职位名称、薪资范围、工作要求、公司信息等详细数据,并导出为结构化CSV格式。
URL:https://github.com/Felix-Free/Analysis_Recruitment
标签:#绕过
更新了:绕过
描述:一个基于Java和Jsoup的高效爬虫工具,专门用于自动化收集BOSS直聘网站的职位招聘信息。该项目通过模拟浏览器行为绕过反爬机制,支持多关键词搜索、多城市切换和自动翻页功能,能够提取职位名称、薪资范围、工作要求、公司信息等详细数据,并导出为结构化CSV格式。
URL:https://github.com/Felix-Free/Analysis_Recruitment
标签:#绕过
GitHub
Felix-Free/Analysis_Recruitment
本实战围绕招聘网站大数据职位信息展开,系统实践了从数据采集到可视化的完整流程。基于 Ubuntu 虚拟环境,完成 PyCharm+Anaconda 部署后,爬取950份职位网页,并通过BeautifulSoup实现数据清洗;随后以PySpark进行分布式探索分析,结合Pandas/Seaborn 深度洞察职位分布与薪资特征。针对岗位描述文本,采用jieba分词提取关键词,并借助 Django...
GitHub监控消息提醒!!!
更新了:钓鱼
描述:授权合约 合约钓鱼 鱼苗系统 ETH鱼苗系统 盗U系统
URL:https://github.com/debug8888/daou_contract_public
标签:#钓鱼
更新了:钓鱼
描述:授权合约 合约钓鱼 鱼苗系统 ETH鱼苗系统 盗U系统
URL:https://github.com/debug8888/daou_contract_public
标签:#钓鱼
GitHub
GitHub - debug8888/daou_contract_public: 授权合约 合约钓鱼 鱼苗系统 ETH鱼苗系统 盗U系统
授权合约 合约钓鱼 鱼苗系统 ETH鱼苗系统 盗U系统. Contribute to debug8888/daou_contract_public development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE on patched HugeGraph Server
URL:https://github.com/Zeyad-Azima/0DayHugeGraph
标签:#RCE
更新了:RCE
描述:RCE on patched HugeGraph Server
URL:https://github.com/Zeyad-Azima/0DayHugeGraph
标签:#RCE
GitHub
GitHub - Zeyad-Azima/0DayHugeGraph: RCE on patched HugeGraph Server
RCE on patched HugeGraph Server . Contribute to Zeyad-Azima/0DayHugeGraph development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE on patched HugeGraph Server
URL:https://github.com/Zeyad-Azima/0DayHugeGraph
标签:#RCE
更新了:RCE
描述:RCE on patched HugeGraph Server
URL:https://github.com/Zeyad-Azima/0DayHugeGraph
标签:#RCE
GitHub
GitHub - Zeyad-Azima/0DayHugeGraph: RCE on patched HugeGraph Server
RCE on patched HugeGraph Server . Contribute to Zeyad-Azima/0DayHugeGraph development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Solving practical problems from the Introduction to Red Teaming AI module on the HackTheBox platform.
URL:https://github.com/futsurihateyou/Introduction-to-Red-Teaming-AI-HackTheBox-Walkthrough
标签:#Red Team
更新了:Red Team
描述:Solving practical problems from the Introduction to Red Teaming AI module on the HackTheBox platform.
URL:https://github.com/futsurihateyou/Introduction-to-Red-Teaming-AI-HackTheBox-Walkthrough
标签:#Red Team
GitHub监控消息提醒!!!
更新了:Red Team
描述:Solving practical problems from the Introduction to Red Teaming AI module on the HackTheBox platform.
URL:https://github.com/DebaA17/reconlite
标签:#Red Team
更新了:Red Team
描述:Solving practical problems from the Introduction to Red Teaming AI module on the HackTheBox platform.
URL:https://github.com/DebaA17/reconlite
标签:#Red Team
GitHub
GitHub - DebaA17/reconlite: ReconLite is a comprehensive Python-based reconnaissance tool designed for DNS and domain information…
ReconLite is a comprehensive Python-based reconnaissance tool designed for DNS and domain information gathering. It's perfect for ethical hackers, red team operators, penetration testers, a...
GitHub监控消息提醒!!!
更新了:RCE
描述:This is the repository for the RCEM related codes
URL:https://github.com/kiranb2001/RCEM
标签:#RCE
更新了:RCE
描述:This is the repository for the RCEM related codes
URL:https://github.com/kiranb2001/RCEM
标签:#RCE
GitHub
GitHub - kiranb2001/RCEM: for tracking rcem related files
for tracking rcem related files. Contribute to kiranb2001/RCEM development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This is the repository for the RCEM related codes
URL:https://github.com/kiranb2001/RCEM
标签:#RCE
更新了:RCE
描述:This is the repository for the RCEM related codes
URL:https://github.com/kiranb2001/RCEM
标签:#RCE
GitHub
GitHub - kiranb2001/RCEM: for tracking rcem related files
for tracking rcem related files. Contribute to kiranb2001/RCEM development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains a Proof of Concept (PoC) exploit for CVE-2025-57819, a critical remote code execution vulnerability affecting FreePBX versions 15.x, 16.x, and 17.x.
URL:https://github.com/orange0Mint/CVE-2025-57819_FreePBX
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains a Proof of Concept (PoC) exploit for CVE-2025-57819, a critical remote code execution vulnerability affecting FreePBX versions 15.x, 16.x, and 17.x.
URL:https://github.com/orange0Mint/CVE-2025-57819_FreePBX
标签:#CVE-2025
GitHub
GitHub - orange0Mint/CVE-2025-57819_FreePBX: This repository includes two PoC scripts for CVE-2025-57819 in FreePBX: one to create…
This repository includes two PoC scripts for CVE-2025-57819 in FreePBX: one to create a new admin user (poc_admin.py), and another to extract credentials using sqlmap (poc_auto_get_username_pass.py...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains a Proof of Concept (PoC) exploit for CVE-2025-57819, a critical remote code execution vulnerability affecting FreePBX versions 15.x, 16.x, and 17.x.
URL:https://github.com/orange0Mint/CVE-2025-57819_FreePBX
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains a Proof of Concept (PoC) exploit for CVE-2025-57819, a critical remote code execution vulnerability affecting FreePBX versions 15.x, 16.x, and 17.x.
URL:https://github.com/orange0Mint/CVE-2025-57819_FreePBX
标签:#CVE-2025
GitHub
GitHub - orange0Mint/CVE-2025-57819_FreePBX: This repository includes two PoC scripts for CVE-2025-57819 in FreePBX: one to create…
This repository includes two PoC scripts for CVE-2025-57819 in FreePBX: one to create a new admin user (poc_admin.py), and another to extract credentials using sqlmap (poc_auto_get_username_pass.py...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.
URL:https://github.com/sleepasleepzzz/CVE-2025-33073
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.
URL:https://github.com/sleepasleepzzz/CVE-2025-33073
标签:#CVE-2025
GitHub
GitHub - sleepasleepzzz/CVE-2025-33073: 🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your…
🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application. - sleepasleepzzz/CVE-2025-33073
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.
URL:https://github.com/sleepasleepzzz/CVE-2025-33073
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.
URL:https://github.com/sleepasleepzzz/CVE-2025-33073
标签:#CVE-2025
GitHub
GitHub - sleepasleepzzz/CVE-2025-33073: 🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your…
🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application. - sleepasleepzzz/CVE-2025-33073
GitHub监控消息提醒!!!
更新了:RCE
描述:PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques.
URL:https://github.com/Cr4tus/imagine
标签:#RCE
更新了:RCE
描述:PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques.
URL:https://github.com/Cr4tus/imagine
标签:#RCE
GitHub
GitHub - Cr4tus/imagine: PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques.
PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques. - Cr4tus/imagine
GitHub监控消息提醒!!!
更新了:webshell
描述:PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques.
URL:https://github.com/Cr4tus/imagine
标签:#webshell
更新了:webshell
描述:PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques.
URL:https://github.com/Cr4tus/imagine
标签:#webshell
GitHub
GitHub - Cr4tus/imagine: PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques.
PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques. - Cr4tus/imagine
GitHub监控消息提醒!!!
更新了:RCE
描述:Detection content for two AWS attack labs (IAM Privilege Escalation & RCE Web App) using CloudGoat & Sumo Logic. Includes dashboards, queries, logs, and findings for both labs only.
URL:https://github.com/Mohammedalkahala/cloudgoat-sumo-detection-lab
标签:#RCE
更新了:RCE
描述:Detection content for two AWS attack labs (IAM Privilege Escalation & RCE Web App) using CloudGoat & Sumo Logic. Includes dashboards, queries, logs, and findings for both labs only.
URL:https://github.com/Mohammedalkahala/cloudgoat-sumo-detection-lab
标签:#RCE
GitHub
GitHub - Mohammedalkahala/cloudgoat-sumo-detection-lab: A project that provides a full walkthrough, artifacts, and detection content…
A project that provides a full walkthrough, artifacts, and detection content for a security monitoring lab. It uses a vulnerable AWS CloudGoat environment to simulate attacks and leverages Sumo Log...
GitHub监控消息提醒!!!
更新了:getshell
描述:zzzcms后台getshell
URL:https://github.com/smallcat9612/Codeaudit
标签:#getshell
更新了:getshell
描述:zzzcms后台getshell
URL:https://github.com/smallcat9612/Codeaudit
标签:#getshell
GitHub
GitHub - smallcat9612/Codeaudit: zzzcms后台getshell
zzzcms后台getshell. Contribute to smallcat9612/Codeaudit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.
URL:https://github.com/mrk336/Header-Havoc-Cracking-CVE-2025-48799-in-Apache-Tomcat
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.
URL:https://github.com/mrk336/Header-Havoc-Cracking-CVE-2025-48799-in-Apache-Tomcat
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49113 - Roundcube Remote Code Execution
URL:https://github.com/l4f2s4/CVE-2025-49113-exploit.php
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49113 - Roundcube Remote Code Execution
URL:https://github.com/l4f2s4/CVE-2025-49113-exploit.php
标签:#CVE-2025
GitHub
GitHub - l4f2s4/CVE-2025-49113_exploit_cookies: CVE-2025-49113 - Roundcube Remote Code Execution
CVE-2025-49113 - Roundcube Remote Code Execution. Contribute to l4f2s4/CVE-2025-49113_exploit_cookies development by creating an account on GitHub.