GitHub监控消息提醒!!!
更新了:CVE-2025
描述:ay 09 — CVE-2025-27520 (BentoML-style insecure deserialization) — Local Docker lab
URL:https://github.com/amalpvatayam67/day09-bentoml-deser-lab
标签:#CVE-2025
更新了:CVE-2025
描述:ay 09 — CVE-2025-27520 (BentoML-style insecure deserialization) — Local Docker lab
URL:https://github.com/amalpvatayam67/day09-bentoml-deser-lab
标签:#CVE-2025
GitHub
GitHub - amalpvatayam67/day09-bentoml-deser-lab: ay 09 — CVE-2025-27520 (BentoML-style insecure deserialization) — Local Docker…
ay 09 — CVE-2025-27520 (BentoML-style insecure deserialization) — Local Docker lab - amalpvatayam67/day09-bentoml-deser-lab
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:这个服务可以帮助AI大模型生成更准确、误报率低的Suricata规则,提高漏洞检测性能
URL:https://github.com/rockmelodies/suricata_rule_generator_mcp
标签:#漏洞检测
更新了:漏洞检测
描述:这个服务可以帮助AI大模型生成更准确、误报率低的Suricata规则,提高漏洞检测性能
URL:https://github.com/rockmelodies/suricata_rule_generator_mcp
标签:#漏洞检测
GitHub
GitHub - rockmelodies/suricata_rule_generator_mcp: 这个服务可以帮助AI大模型生成更准确、误报率低的Suricata规则,提高漏洞检测性能
这个服务可以帮助AI大模型生成更准确、误报率低的Suricata规则,提高漏洞检测性能. Contribute to rockmelodies/suricata_rule_generator_mcp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088 path traversal tool
URL:https://github.com/kay0te/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088 path traversal tool
URL:https://github.com/kay0te/CVE-2025-8088
标签:#CVE-2025
GitHub
GitHub - kay0te/CVE-2025-8088: CVE-2025-8088 path traversal tool
CVE-2025-8088 path traversal tool. Contribute to kay0te/CVE-2025-8088 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:php-in-jpg is a simple yet flexible tool that generates .jpg image files embedding PHP payloads, designed to support PHP RCE polyglot techniques.
URL:https://github.com/oguzhanozuzun301/cisco-rv-rce-poc
标签:#RCE
更新了:RCE
描述:php-in-jpg is a simple yet flexible tool that generates .jpg image files embedding PHP payloads, designed to support PHP RCE polyglot techniques.
URL:https://github.com/oguzhanozuzun301/cisco-rv-rce-poc
标签:#RCE
GitHub
GitHub - oguzhanozuzun301/cisco-rv-rce-poc: PoC and exploit scripts for CVE-2023-20048 - Remote Code Execution vulnerability affecting…
PoC and exploit scripts for CVE-2023-20048 - Remote Code Execution vulnerability affecting Cisco RV series routers. Includes a vulnerability checker (PoC) and a working exploit for gaining remote ...
GitHub监控消息提醒!!!
更新了:RCE
描述:Script profissional de análise forense de logs focado em Cybersecurity, capaz de detectar ataques (SQLi, XSS, LFI, RCE), gerar relatórios executivos e preservar evidências digitais.
URL:https://github.com/Leobatman/SCRIPTS-BASH
标签:#RCE
更新了:RCE
描述:Script profissional de análise forense de logs focado em Cybersecurity, capaz de detectar ataques (SQLi, XSS, LFI, RCE), gerar relatórios executivos e preservar evidências digitais.
URL:https://github.com/Leobatman/SCRIPTS-BASH
标签:#RCE
GitHub
GitHub - Leobatman/SCRIPTS-BASH: Script profissional de análise forense de logs focado em Cybersecurity, capaz de detectar ataques…
Script profissional de análise forense de logs focado em Cybersecurity, capaz de detectar ataques (SQLi, XSS, LFI, RCE), gerar relatórios executivos e preservar evidências digitais. - Leobatman/SCR...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ Demonstrate CVE-2025-48799, a Windows Update service vulnerability that allows elevation of privilege via arbitrary folder deletion on multi-drive systems.
URL:https://github.com/ukisshinaah/CVE-2025-48799
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ Demonstrate CVE-2025-48799, a Windows Update service vulnerability that allows elevation of privilege via arbitrary folder deletion on multi-drive systems.
URL:https://github.com/ukisshinaah/CVE-2025-48799
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Exploit CVE-2025-25257 in FortiWeb with a working full exploit and a proof of concept for file read/write.
URL:https://github.com/kityzed2003/CVE-2025-25257
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Exploit CVE-2025-25257 in FortiWeb with a working full exploit and a proof of concept for file read/write.
URL:https://github.com/kityzed2003/CVE-2025-25257
标签:#CVE-2025
GitHub
GitHub - kityzed2003/CVE-2025-25257: 🛠️ Exploit CVE-2025-25257 in FortiWeb with a working full exploit and a proof of concept for…
🛠️ Exploit CVE-2025-25257 in FortiWeb with a working full exploit and a proof of concept for file read/write. - kityzed2003/CVE-2025-25257
GitHub监控消息提醒!!!
更新了:RCE
描述:🛠️ Explore the CVE-2025-5777 memory leak vulnerability in Citrix NetScaler, illustrating the risks of uninitialized memory in parsing malformed POST data.
URL:https://github.com/Lakiya673/CVE-2025-5777
标签:#RCE
更新了:RCE
描述:🛠️ Explore the CVE-2025-5777 memory leak vulnerability in Citrix NetScaler, illustrating the risks of uninitialized memory in parsing malformed POST data.
URL:https://github.com/Lakiya673/CVE-2025-5777
标签:#RCE
GitHub
GitHub - Lakiya673/CVE-2025-5777: 🛠️ Explore the CVE-2025-5777 memory leak vulnerability in Citrix NetScaler, illustrating the…
🛠️ Explore the CVE-2025-5777 memory leak vulnerability in Citrix NetScaler, illustrating the risks of uninitialized memory in parsing malformed POST data. - Lakiya673/CVE-2025-5777
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29927
URL:https://github.com/sermikr0/nextjs-middleware-auth-bypass
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29927
URL:https://github.com/sermikr0/nextjs-middleware-auth-bypass
标签:#CVE-2025
GitHub
GitHub - sermikr0/nextjs-middleware-auth-bypass: CVE-2025-29927
CVE-2025-29927. Contribute to sermikr0/nextjs-middleware-auth-bypass development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:AI修复生成的CVE-2025-32432的poc
URL:https://github.com/bambooqj/CVE-2025-32432
标签:#CVE-2025
更新了:CVE-2025
描述:AI修复生成的CVE-2025-32432的poc
URL:https://github.com/bambooqj/CVE-2025-32432
标签:#CVE-2025
GitHub
GitHub - bambooqj/CVE-2025-32432: AI修复生成的CVE-2025-32432的poc
AI修复生成的CVE-2025-32432的poc. Contribute to bambooqj/CVE-2025-32432 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Scan for potential exposure to the critical SharePoint vulnerability CVE-2025-53770 with this simple and effective tool for authorized testing.
URL:https://github.com/ziisenpai/CVE-2025-53770-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Scan for potential exposure to the critical SharePoint vulnerability CVE-2025-53770 with this simple and effective tool for authorized testing.
URL:https://github.com/ziisenpai/CVE-2025-53770-Scanner
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Next.js middleware auth-bypass lab (CVE-2025-29927 simulation)
URL:https://github.com/amalpvatayam67/day10-nextjs-middleware-lab
标签:#CVE-2025
更新了:CVE-2025
描述:Next.js middleware auth-bypass lab (CVE-2025-29927 simulation)
URL:https://github.com/amalpvatayam67/day10-nextjs-middleware-lab
标签:#CVE-2025
GitHub
GitHub - amalpvatayam67/day10-nextjs-middleware-lab: Next.js middleware auth-bypass lab (CVE-2025-29927 simulation)
Next.js middleware auth-bypass lab (CVE-2025-29927 simulation) - amalpvatayam67/day10-nextjs-middleware-lab
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🐳 Reproduce and test the CVE-2025-32463 vulnerability in a Docker-based lab environment for security research and practical analysis.
URL:https://github.com/DaadaAyoze/CVE-2025-32463-lab
标签:#CVE-2025
更新了:CVE-2025
描述:🐳 Reproduce and test the CVE-2025-32463 vulnerability in a Docker-based lab environment for security research and practical analysis.
URL:https://github.com/DaadaAyoze/CVE-2025-32463-lab
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:💻 Demonstrate a ViewState deserialization exploit for CVE-2025-30406 in ASP.NET, enabling remote code execution with a Proof-of-Concept script.
URL:https://github.com/jaydenb546/CVE-2025-30406
标签:#CVE-2025
更新了:CVE-2025
描述:💻 Demonstrate a ViewState deserialization exploit for CVE-2025-30406 in ASP.NET, enabling remote code execution with a Proof-of-Concept script.
URL:https://github.com/jaydenb546/CVE-2025-30406
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:应急响应
描述:渗透测试,应急响应综合练习平台
URL:https://github.com/MchalTesla/emergency-toolkit
标签:#应急响应
更新了:应急响应
描述:渗透测试,应急响应综合练习平台
URL:https://github.com/MchalTesla/emergency-toolkit
标签:#应急响应
GitHub
GitHub - fightnvrgp/emergency-toolkit: 应急工具箱是由 MchalTesla 开发并维护的开源项目,旨在为 Linux 系统的安全应急响应提供高效、便捷的工具支持。项目立足于实际安全事件处置需求,融合了多种信息收集…
应急工具箱是由 MchalTesla 开发并维护的开源项目,旨在为 Linux 系统的安全应急响应提供高效、便捷的工具支持。项目立足于实际安全事件处置需求,融合了多种信息收集、系统检测和异常分析手段,帮助安全人员和运维工程师在面对突发安全事件时,能够快速定位问题、分析原因并采取有效措施。 本工具箱强调易用性和扩展性,无需复杂部署,即可一键执行核心应急流程。 - fightnvrgp/eme...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Exploit the CVE-2025-54424 RCE vulnerability in 1Panel, enabling unauthorized command execution through a certification bypass tool for scanning and exploitation.
URL:https://github.com/bejbitoilet5125521/CVE-2025-54424
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Exploit the CVE-2025-54424 RCE vulnerability in 1Panel, enabling unauthorized command execution through a certification bypass tool for scanning and exploitation.
URL:https://github.com/bejbitoilet5125521/CVE-2025-54424
标签:#CVE-2025
GitHub
GitHub - bejbitoilet5125521/CVE-2025-54424: 🔍 Exploit the CVE-2025-54424 RCE vulnerability in 1Panel, enabling unauthorized command…
🔍 Exploit the CVE-2025-54424 RCE vulnerability in 1Panel, enabling unauthorized command execution through a certification bypass tool for scanning and exploitation. - bejbitoilet5125521/CVE-2025-54424
GitHub监控消息提醒!!!
更新了:RCE
描述:🚨 Demonstrate CVE-2025-54253, a critical OGNL injection vulnerability in Adobe AEM Forms, for educational and research purposes.
URL:https://github.com/akujedanjedon/CVE-2025-54253-Exploit-Demo
标签:#RCE
更新了:RCE
描述:🚨 Demonstrate CVE-2025-54253, a critical OGNL injection vulnerability in Adobe AEM Forms, for educational and research purposes.
URL:https://github.com/akujedanjedon/CVE-2025-54253-Exploit-Demo
标签:#RCE
GitHub
GitHub - akujedanjedon/CVE-2025-54253-Exploit-Demo: 🚨 Demonstrate CVE-2025-54253, a critical OGNL injection vulnerability in Adobe…
🚨 Demonstrate CVE-2025-54253, a critical OGNL injection vulnerability in Adobe AEM Forms, for educational and research purposes. - akujedanjedon/CVE-2025-54253-Exploit-Demo