GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Exploit CVE-2025-5419 to understand its impact and develop effective mitigation strategies for enhanced software security.
URL:https://github.com/somprasong-tukman/CVE-2025-5419
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Exploit CVE-2025-5419 to understand its impact and develop effective mitigation strategies for enhanced software security.
URL:https://github.com/somprasong-tukman/CVE-2025-5419
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Scans target to see if its vulnerable to CVE-2025-31161
URL:https://github.com/Teexo/CVE-2025-31161
标签:#CVE-2025
更新了:CVE-2025
描述:Scans target to see if its vulnerable to CVE-2025-31161
URL:https://github.com/Teexo/CVE-2025-31161
标签:#CVE-2025
GitHub
GitHub - Teexo/CVE-2025-31161: Scans target to see if its vulnerable to CVE-2025-31161
Scans target to see if its vulnerable to CVE-2025-31161 - Teexo/CVE-2025-31161
GitHub监控消息提醒!!!
更新了:RCE
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/robertskimengote/lab-cve-2025-3515
标签:#RCE
更新了:RCE
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/robertskimengote/lab-cve-2025-3515
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/umxr286/ExploitScript
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/umxr286/ExploitScript
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-10035_GoAnywhere Get RCE
URL:https://github.com/orange0Mint/CVE-2025-10035_GoAnywhere
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-10035_GoAnywhere Get RCE
URL:https://github.com/orange0Mint/CVE-2025-10035_GoAnywhere
标签:#CVE-2025
GitHub
GitHub - orange0Mint/CVE-2025-10035_GoAnywhere: CVE-2025-10035_GoAnywhere Get RCE
CVE-2025-10035_GoAnywhere Get RCE. Contribute to orange0Mint/CVE-2025-10035_GoAnywhere development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:小型密码管理器,保存密码后,设置每周三、周五、周六指定时间段才可以查看,可防止修改系统时间绕过检测。
URL:https://github.com/boldiy/password-locker
标签:#绕过
更新了:绕过
描述:小型密码管理器,保存密码后,设置每周三、周五、周六指定时间段才可以查看,可防止修改系统时间绕过检测。
URL:https://github.com/boldiy/password-locker
标签:#绕过
GitHub
GitHub - boldiy/password-locker: 小型密码管理器,保存密码后,设置每周三、周五、周六指定时间段才可以查看,可防止修改系统时间绕过检测。
小型密码管理器,保存密码后,设置每周三、周五、周六指定时间段才可以查看,可防止修改系统时间绕过检测。 - boldiy/password-locker
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:专为AWD攻防演练比赛设计的综合性工具箱,集成漏洞利用、流量监控、自动化攻击等功能
URL:https://github.com/huangzheng2016/0E7
标签:#漏洞利用
更新了:漏洞利用
描述:专为AWD攻防演练比赛设计的综合性工具箱,集成漏洞利用、流量监控、自动化攻击等功能
URL:https://github.com/huangzheng2016/0E7
标签:#漏洞利用
GitHub
GitHub - huangzheng2016/0E7: 专为AWD攻防演练比赛设计的综合性工具箱,集成漏洞利用、流量监控、自动化攻击等功能
专为AWD攻防演练比赛设计的综合性工具箱,集成漏洞利用、流量监控、自动化攻击等功能. Contribute to huangzheng2016/0E7 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:基于alpine+php7.3的一个RCE命令执行靶场,包含基础命令、shell 特性、常见姿势、常见waf绕过
URL:https://github.com/Apursuit/rce-labs
标签:#RCE
更新了:RCE
描述:基于alpine+php7.3的一个RCE命令执行靶场,包含基础命令、shell 特性、常见姿势、常见waf绕过
URL:https://github.com/Apursuit/rce-labs
标签:#RCE
GitHub
GitHub - Apursuit/rce-labs: 基于alpine+php7.3的一个RCE命令执行靶场,包含基础命令、shell 特性、常见姿势、常见waf绕过
基于alpine+php7.3的一个RCE命令执行靶场,包含基础命令、shell 特性、常见姿势、常见waf绕过 - Apursuit/rce-labs
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/maestro-ant/Vvveb-CMS-CVE-2025-8518
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/maestro-ant/Vvveb-CMS-CVE-2025-8518
标签:#CVE-2025
GitHub
GitHub - maestro-ant/Vvveb-CMS-CVE-2025-8518: This repository contains a Proof of Concept (PoC) demonstrating a critical vulnerability…
This repository contains a Proof of Concept (PoC) demonstrating a critical vulnerability in givanz Vvveb 1.0.5. The vulnerability allows an authenticated user with template editing privileges to wr...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models
URL:https://github.com/AC8999/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models
URL:https://github.com/AC8999/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - AC8999/CVE-2025-32463: A Python exploit for CVE-2025-32463, a critical local privilege escalation vulnerability in the…
A Python exploit for CVE-2025-32463, a critical local privilege escalation vulnerability in the Sudo binary on Linux systems. This flaw allows local users to obtain root access by exploiting the --...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:burpsuit插件,解析swagger/openapi接口文档并进行请求,模拟参数方便渗透测试人员快速发现可用接口
URL:https://github.com/mumu0215/api_checker
标签:#渗透测试
更新了:渗透测试
描述:burpsuit插件,解析swagger/openapi接口文档并进行请求,模拟参数方便渗透测试人员快速发现可用接口
URL:https://github.com/mumu0215/api_checker
标签:#渗透测试
GitHub
GitHub - mumu0215/api_checker: burpsuit插件,解析swagger/openapi接口文档并进行请求,模拟参数方便渗透测试人员快速发现可用接口 (最新使用源码编译,release有时候没空搞)
burpsuit插件,解析swagger/openapi接口文档并进行请求,模拟参数方便渗透测试人员快速发现可用接口 (最新使用源码编译,release有时候没空搞) - mumu0215/api_checker
GitHub监控消息提醒!!!
更新了:信息收集
描述:泷羽自研自动化AI渗透测试工具,接入AI模型,从信息收集到内网移动
URL:https://github.com/shinyer/Zeus
标签:#信息收集
更新了:信息收集
描述:泷羽自研自动化AI渗透测试工具,接入AI模型,从信息收集到内网移动
URL:https://github.com/shinyer/Zeus
标签:#信息收集
GitHub
shinyer/Zeus
泷羽自研自动化AI渗透测试工具,接入AI模型,从信息收集到内网移动. Contribute to shinyer/Zeus development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CPAS audit management information system has SQL injection vulnerability(CVE-2025-57529)
URL:https://github.com/songqb-xx/CVE-2025-57529
标签:#CVE-2025
更新了:CVE-2025
描述:CPAS audit management information system has SQL injection vulnerability(CVE-2025-57529)
URL:https://github.com/songqb-xx/CVE-2025-57529
标签:#CVE-2025
GitHub
GitHub - songqb-xx/CVE-2025-57529: CPAS audit management information system has SQL injection vulnerability(CVE-2025-57529)
CPAS audit management information system has SQL injection vulnerability(CVE-2025-57529) - songqb-xx/CVE-2025-57529
GitHub监控消息提醒!!!
更新了:渗透测试
描述:CM Security Tools 是一款模块化、多线程的网络安全扫描工具包,集成主机发现、端口扫描、弱口令检测和子域名枚举等功能,适用于渗透测试与安全研究。
URL:https://github.com/ChildBad/ChicomaloTools
标签:#渗透测试
更新了:渗透测试
描述:CM Security Tools 是一款模块化、多线程的网络安全扫描工具包,集成主机发现、端口扫描、弱口令检测和子域名枚举等功能,适用于渗透测试与安全研究。
URL:https://github.com/ChildBad/ChicomaloTools
标签:#渗透测试
GitHub
GitHub - ChildBad/ChicomaloTools: CM Security Tools 是一款模块化、多线程的网络安全扫描工具包,集成主机发现、端口扫描、弱口令检测和子域名枚举等功能,适用于渗透测试与安全研究。
CM Security Tools 是一款模块化、多线程的网络安全扫描工具包,集成主机发现、端口扫描、弱口令检测和子域名枚举等功能,适用于渗透测试与安全研究。 - ChildBad/ChicomaloTools
GitHub监控消息提醒!!!
更新了:RCE
描述:Backend server manager for RCE.js deployment
URL:https://github.com/intelinsideher/rce-server-manager-backend
标签:#RCE
更新了:RCE
描述:Backend server manager for RCE.js deployment
URL:https://github.com/intelinsideher/rce-server-manager-backend
标签:#RCE
GitHub
intelinsideher/rce-server-manager-backend
Backend server manager for RCE.js deployment. Contribute to intelinsideher/rce-server-manager-backend development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Backend code for the Brinda RCE Server Manager
URL:https://github.com/intelinsideher/brinda-rce-backend
标签:#RCE
更新了:RCE
描述:Backend code for the Brinda RCE Server Manager
URL:https://github.com/intelinsideher/brinda-rce-backend
标签:#RCE
GitHub
intelinsideher/brinda-rce-backend
Backend code for the Brinda RCE Server Manager. Contribute to intelinsideher/brinda-rce-backend development by creating an account on GitHub.