GitHub监控消息提醒!!!
更新了:Red Team
描述:Solving practical problems from the Introduction to Red Teaming AI module on the HackTheBox platform.
URL:https://github.com/DebaA17/reconlite
标签:#Red Team
更新了:Red Team
描述:Solving practical problems from the Introduction to Red Teaming AI module on the HackTheBox platform.
URL:https://github.com/DebaA17/reconlite
标签:#Red Team
GitHub
GitHub - DebaA17/reconlite: ReconLite is a comprehensive Python-based reconnaissance tool designed for DNS and domain information…
ReconLite is a comprehensive Python-based reconnaissance tool designed for DNS and domain information gathering. It's perfect for ethical hackers, red team operators, penetration testers, a...
GitHub监控消息提醒!!!
更新了:RCE
描述:This is the repository for the RCEM related codes
URL:https://github.com/kiranb2001/RCEM
标签:#RCE
更新了:RCE
描述:This is the repository for the RCEM related codes
URL:https://github.com/kiranb2001/RCEM
标签:#RCE
GitHub
GitHub - kiranb2001/RCEM: for tracking rcem related files
for tracking rcem related files. Contribute to kiranb2001/RCEM development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This is the repository for the RCEM related codes
URL:https://github.com/kiranb2001/RCEM
标签:#RCE
更新了:RCE
描述:This is the repository for the RCEM related codes
URL:https://github.com/kiranb2001/RCEM
标签:#RCE
GitHub
GitHub - kiranb2001/RCEM: for tracking rcem related files
for tracking rcem related files. Contribute to kiranb2001/RCEM development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains a Proof of Concept (PoC) exploit for CVE-2025-57819, a critical remote code execution vulnerability affecting FreePBX versions 15.x, 16.x, and 17.x.
URL:https://github.com/orange0Mint/CVE-2025-57819_FreePBX
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains a Proof of Concept (PoC) exploit for CVE-2025-57819, a critical remote code execution vulnerability affecting FreePBX versions 15.x, 16.x, and 17.x.
URL:https://github.com/orange0Mint/CVE-2025-57819_FreePBX
标签:#CVE-2025
GitHub
GitHub - orange0Mint/CVE-2025-57819_FreePBX: This repository includes two PoC scripts for CVE-2025-57819 in FreePBX: one to create…
This repository includes two PoC scripts for CVE-2025-57819 in FreePBX: one to create a new admin user (poc_admin.py), and another to extract credentials using sqlmap (poc_auto_get_username_pass.py...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains a Proof of Concept (PoC) exploit for CVE-2025-57819, a critical remote code execution vulnerability affecting FreePBX versions 15.x, 16.x, and 17.x.
URL:https://github.com/orange0Mint/CVE-2025-57819_FreePBX
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains a Proof of Concept (PoC) exploit for CVE-2025-57819, a critical remote code execution vulnerability affecting FreePBX versions 15.x, 16.x, and 17.x.
URL:https://github.com/orange0Mint/CVE-2025-57819_FreePBX
标签:#CVE-2025
GitHub
GitHub - orange0Mint/CVE-2025-57819_FreePBX: This repository includes two PoC scripts for CVE-2025-57819 in FreePBX: one to create…
This repository includes two PoC scripts for CVE-2025-57819 in FreePBX: one to create a new admin user (poc_admin.py), and another to extract credentials using sqlmap (poc_auto_get_username_pass.py...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.
URL:https://github.com/sleepasleepzzz/CVE-2025-33073
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.
URL:https://github.com/sleepasleepzzz/CVE-2025-33073
标签:#CVE-2025
GitHub
GitHub - sleepasleepzzz/CVE-2025-33073: 🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your…
🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application. - sleepasleepzzz/CVE-2025-33073
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.
URL:https://github.com/sleepasleepzzz/CVE-2025-33073
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.
URL:https://github.com/sleepasleepzzz/CVE-2025-33073
标签:#CVE-2025
GitHub
GitHub - sleepasleepzzz/CVE-2025-33073: 🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your…
🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application. - sleepasleepzzz/CVE-2025-33073
GitHub监控消息提醒!!!
更新了:RCE
描述:PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques.
URL:https://github.com/Cr4tus/imagine
标签:#RCE
更新了:RCE
描述:PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques.
URL:https://github.com/Cr4tus/imagine
标签:#RCE
GitHub
GitHub - Cr4tus/imagine: PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques.
PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques. - Cr4tus/imagine
GitHub监控消息提醒!!!
更新了:webshell
描述:PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques.
URL:https://github.com/Cr4tus/imagine
标签:#webshell
更新了:webshell
描述:PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques.
URL:https://github.com/Cr4tus/imagine
标签:#webshell
GitHub
GitHub - Cr4tus/imagine: PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques.
PHP to .jpg embedding script, designed to support PHP RCE polyglot techniques. - Cr4tus/imagine
GitHub监控消息提醒!!!
更新了:RCE
描述:Detection content for two AWS attack labs (IAM Privilege Escalation & RCE Web App) using CloudGoat & Sumo Logic. Includes dashboards, queries, logs, and findings for both labs only.
URL:https://github.com/Mohammedalkahala/cloudgoat-sumo-detection-lab
标签:#RCE
更新了:RCE
描述:Detection content for two AWS attack labs (IAM Privilege Escalation & RCE Web App) using CloudGoat & Sumo Logic. Includes dashboards, queries, logs, and findings for both labs only.
URL:https://github.com/Mohammedalkahala/cloudgoat-sumo-detection-lab
标签:#RCE
GitHub
GitHub - Mohammedalkahala/cloudgoat-sumo-detection-lab: A project that provides a full walkthrough, artifacts, and detection content…
A project that provides a full walkthrough, artifacts, and detection content for a security monitoring lab. It uses a vulnerable AWS CloudGoat environment to simulate attacks and leverages Sumo Log...
GitHub监控消息提醒!!!
更新了:getshell
描述:zzzcms后台getshell
URL:https://github.com/smallcat9612/Codeaudit
标签:#getshell
更新了:getshell
描述:zzzcms后台getshell
URL:https://github.com/smallcat9612/Codeaudit
标签:#getshell
GitHub
GitHub - smallcat9612/Codeaudit: zzzcms后台getshell
zzzcms后台getshell. Contribute to smallcat9612/Codeaudit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.
URL:https://github.com/mrk336/Header-Havoc-Cracking-CVE-2025-48799-in-Apache-Tomcat
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.
URL:https://github.com/mrk336/Header-Havoc-Cracking-CVE-2025-48799-in-Apache-Tomcat
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49113 - Roundcube Remote Code Execution
URL:https://github.com/l4f2s4/CVE-2025-49113-exploit.php
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49113 - Roundcube Remote Code Execution
URL:https://github.com/l4f2s4/CVE-2025-49113-exploit.php
标签:#CVE-2025
GitHub
GitHub - l4f2s4/CVE-2025-49113_exploit_cookies: CVE-2025-49113 - Roundcube Remote Code Execution
CVE-2025-49113 - Roundcube Remote Code Execution. Contribute to l4f2s4/CVE-2025-49113_exploit_cookies development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:Artificer是一个AI驱动的公开漏洞情报监控与分析平台,寓意\"炼器师\"将原材料经过提炼、锻造、定型、打磨等工艺锻造成利剑。平台每日从互联网和开源情报源收集漏洞信息,利用大模型的强大分析能力自动生成POC和EXP,为安全从业人员、渗透测试工程师和安全研究员提供高效的漏洞情报服务。
URL:https://github.com/THATYEAR/Artificer
标签:#信息收集
更新了:信息收集
描述:Artificer是一个AI驱动的公开漏洞情报监控与分析平台,寓意\"炼器师\"将原材料经过提炼、锻造、定型、打磨等工艺锻造成利剑。平台每日从互联网和开源情报源收集漏洞信息,利用大模型的强大分析能力自动生成POC和EXP,为安全从业人员、渗透测试工程师和安全研究员提供高效的漏洞情报服务。
URL:https://github.com/THATYEAR/Artificer
标签:#信息收集
GitHub
GitHub - THATYEAR/Artificer: Artificer是一个AI驱动的公开漏洞情报监控与分析平台,寓意"炼器师"将原材料经过提炼、锻造、定型、打磨等工艺锻造成利剑。平台每日从互联网和开源情报源收集漏洞信息,利用大模型的强大分析能力…
Artificer是一个AI驱动的公开漏洞情报监控与分析平台,寓意"炼器师"将原材料经过提炼、锻造、定型、打磨等工艺锻造成利剑。平台每日从互联网和开源情报源收集漏洞信息,利用大模型的强大分析能力自动生成POC和EXP,为安全从业人员、渗透测试工程师和安全研究员提供高效的漏洞情报服务。 - THATYEAR/Artificer
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一款用于测试各种地图API Key是否有效的简单脚本,便于在渗透测试中验证各种密钥是否有效。
URL:https://github.com/dragonkeep/MapAPITest
标签:#渗透测试
更新了:渗透测试
描述:一款用于测试各种地图API Key是否有效的简单脚本,便于在渗透测试中验证各种密钥是否有效。
URL:https://github.com/dragonkeep/MapAPITest
标签:#渗透测试
GitHub
GitHub - dragonkeep/MapAPITest: 一款用于测试各种地图API Key是否有效的简单脚本,便于在渗透测试中验证各种密钥是否有效。
一款用于测试各种地图API Key是否有效的简单脚本,便于在渗透测试中验证各种密钥是否有效。. Contribute to dragonkeep/MapAPITest development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Audit Tool for CVE-2025-55241 - No Warranty Provided or Assumed. Analyze and Use at Own Risk
URL:https://github.com/Spanky-McSpank/CVE-2025-55241-Internal-Audit
标签:#CVE-2025
更新了:CVE-2025
描述:Audit Tool for CVE-2025-55241 - No Warranty Provided or Assumed. Analyze and Use at Own Risk
URL:https://github.com/Spanky-McSpank/CVE-2025-55241-Internal-Audit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:代码审计
描述:一个由大语言模型(LLM)驱动、并由可解释人工智能(XAI)增强的现代化代码审计平台,旨在为整个代码仓库和单个代码片段提供深度、智能且易于理解的审查反馈。
URL:https://github.com/lintsinghua/XCodeReviewer
标签:#代码审计
更新了:代码审计
描述:一个由大语言模型(LLM)驱动、并由可解释人工智能(XAI)增强的现代化代码审计平台,旨在为整个代码仓库和单个代码片段提供深度、智能且易于理解的审查反馈。
URL:https://github.com/lintsinghua/XCodeReviewer
标签:#代码审计
GitHub
GitHub - lintsinghua/DeepAudit: DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署…
DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署 ,一键生成报告。让安全不再昂贵,让审计不再复杂。 - lintsinghua/DeepAudit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for CVE-2025-56762
URL:https://github.com/Shaunak-Chatterjee/CVE-2025-56762
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for CVE-2025-56762
URL:https://github.com/Shaunak-Chatterjee/CVE-2025-56762
标签:#CVE-2025
GitHub
GitHub - Shaunak-Chatterjee/CVE-2025-56762: Proof of Concept for CVE-2025-56762
Proof of Concept for CVE-2025-56762. Contribute to Shaunak-Chatterjee/CVE-2025-56762 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Google patched CVE-2025-10585, a Chrome V8 zero-day under active exploitation — here’s what it is, why it matters, and how to stay safe.
URL:https://github.com/AdityaBhatt3010/CVE-2025-10585-The-Chrome-V8-Zero-Day
标签:#CVE-2025
更新了:CVE-2025
描述:Google patched CVE-2025-10585, a Chrome V8 zero-day under active exploitation — here’s what it is, why it matters, and how to stay safe.
URL:https://github.com/AdityaBhatt3010/CVE-2025-10585-The-Chrome-V8-Zero-Day
标签:#CVE-2025
GitHub
GitHub - AdityaBhatt3010/CVE-2025-10585-The-Chrome-V8-Zero-Day: Google patched CVE-2025-10585, a Chrome V8 zero-day under active…
Google patched CVE-2025-10585, a Chrome V8 zero-day under active exploitation — here’s what it is, why it matters, and how to stay safe. - AdityaBhatt3010/CVE-2025-10585-The-Chrome-V8-Zero-Day
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/Soham-id/2025hvv
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/Soham-id/2025hvv
标签:#CVE-2025
GitHub
GitHub - Soham-id/2025hvv: 🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in…
🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments. - Soham-id/2025hvv