GitHub监控消息提醒!!!
更新了:绕过
描述:小型密码管理器,保存密码后,设置每周三、周五、周六指定时间段才可以查看,可防止修改系统时间绕过检测。
URL:https://github.com/boldiy/password-locker
标签:#绕过
更新了:绕过
描述:小型密码管理器,保存密码后,设置每周三、周五、周六指定时间段才可以查看,可防止修改系统时间绕过检测。
URL:https://github.com/boldiy/password-locker
标签:#绕过
GitHub
GitHub - boldiy/password-locker: 小型密码管理器,保存密码后,设置每周三、周五、周六指定时间段才可以查看,可防止修改系统时间绕过检测。
小型密码管理器,保存密码后,设置每周三、周五、周六指定时间段才可以查看,可防止修改系统时间绕过检测。 - boldiy/password-locker
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:专为AWD攻防演练比赛设计的综合性工具箱,集成漏洞利用、流量监控、自动化攻击等功能
URL:https://github.com/huangzheng2016/0E7
标签:#漏洞利用
更新了:漏洞利用
描述:专为AWD攻防演练比赛设计的综合性工具箱,集成漏洞利用、流量监控、自动化攻击等功能
URL:https://github.com/huangzheng2016/0E7
标签:#漏洞利用
GitHub
GitHub - huangzheng2016/0E7: 专为AWD攻防演练比赛设计的综合性工具箱,集成漏洞利用、流量监控、自动化攻击等功能
专为AWD攻防演练比赛设计的综合性工具箱,集成漏洞利用、流量监控、自动化攻击等功能. Contribute to huangzheng2016/0E7 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:基于alpine+php7.3的一个RCE命令执行靶场,包含基础命令、shell 特性、常见姿势、常见waf绕过
URL:https://github.com/Apursuit/rce-labs
标签:#RCE
更新了:RCE
描述:基于alpine+php7.3的一个RCE命令执行靶场,包含基础命令、shell 特性、常见姿势、常见waf绕过
URL:https://github.com/Apursuit/rce-labs
标签:#RCE
GitHub
GitHub - Apursuit/rce-labs: 基于alpine+php7.3的一个RCE命令执行靶场,包含基础命令、shell 特性、常见姿势、常见waf绕过
基于alpine+php7.3的一个RCE命令执行靶场,包含基础命令、shell 特性、常见姿势、常见waf绕过 - Apursuit/rce-labs
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/maestro-ant/Vvveb-CMS-CVE-2025-8518
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/maestro-ant/Vvveb-CMS-CVE-2025-8518
标签:#CVE-2025
GitHub
GitHub - maestro-ant/Vvveb-CMS-CVE-2025-8518: This repository contains a Proof of Concept (PoC) demonstrating a critical vulnerability…
This repository contains a Proof of Concept (PoC) demonstrating a critical vulnerability in givanz Vvveb 1.0.5. The vulnerability allows an authenticated user with template editing privileges to wr...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models
URL:https://github.com/AC8999/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models
URL:https://github.com/AC8999/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - AC8999/CVE-2025-32463: A Python exploit for CVE-2025-32463, a critical local privilege escalation vulnerability in the…
A Python exploit for CVE-2025-32463, a critical local privilege escalation vulnerability in the Sudo binary on Linux systems. This flaw allows local users to obtain root access by exploiting the --...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:burpsuit插件,解析swagger/openapi接口文档并进行请求,模拟参数方便渗透测试人员快速发现可用接口
URL:https://github.com/mumu0215/api_checker
标签:#渗透测试
更新了:渗透测试
描述:burpsuit插件,解析swagger/openapi接口文档并进行请求,模拟参数方便渗透测试人员快速发现可用接口
URL:https://github.com/mumu0215/api_checker
标签:#渗透测试
GitHub
GitHub - mumu0215/api_checker: burpsuit插件,解析swagger/openapi接口文档并进行请求,模拟参数方便渗透测试人员快速发现可用接口 (最新使用源码编译,release有时候没空搞)
burpsuit插件,解析swagger/openapi接口文档并进行请求,模拟参数方便渗透测试人员快速发现可用接口 (最新使用源码编译,release有时候没空搞) - mumu0215/api_checker
GitHub监控消息提醒!!!
更新了:信息收集
描述:泷羽自研自动化AI渗透测试工具,接入AI模型,从信息收集到内网移动
URL:https://github.com/shinyer/Zeus
标签:#信息收集
更新了:信息收集
描述:泷羽自研自动化AI渗透测试工具,接入AI模型,从信息收集到内网移动
URL:https://github.com/shinyer/Zeus
标签:#信息收集
GitHub
shinyer/Zeus
泷羽自研自动化AI渗透测试工具,接入AI模型,从信息收集到内网移动. Contribute to shinyer/Zeus development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CPAS audit management information system has SQL injection vulnerability(CVE-2025-57529)
URL:https://github.com/songqb-xx/CVE-2025-57529
标签:#CVE-2025
更新了:CVE-2025
描述:CPAS audit management information system has SQL injection vulnerability(CVE-2025-57529)
URL:https://github.com/songqb-xx/CVE-2025-57529
标签:#CVE-2025
GitHub
GitHub - songqb-xx/CVE-2025-57529: CPAS audit management information system has SQL injection vulnerability(CVE-2025-57529)
CPAS audit management information system has SQL injection vulnerability(CVE-2025-57529) - songqb-xx/CVE-2025-57529
GitHub监控消息提醒!!!
更新了:渗透测试
描述:CM Security Tools 是一款模块化、多线程的网络安全扫描工具包,集成主机发现、端口扫描、弱口令检测和子域名枚举等功能,适用于渗透测试与安全研究。
URL:https://github.com/ChildBad/ChicomaloTools
标签:#渗透测试
更新了:渗透测试
描述:CM Security Tools 是一款模块化、多线程的网络安全扫描工具包,集成主机发现、端口扫描、弱口令检测和子域名枚举等功能,适用于渗透测试与安全研究。
URL:https://github.com/ChildBad/ChicomaloTools
标签:#渗透测试
GitHub
GitHub - ChildBad/ChicomaloTools: CM Security Tools 是一款模块化、多线程的网络安全扫描工具包,集成主机发现、端口扫描、弱口令检测和子域名枚举等功能,适用于渗透测试与安全研究。
CM Security Tools 是一款模块化、多线程的网络安全扫描工具包,集成主机发现、端口扫描、弱口令检测和子域名枚举等功能,适用于渗透测试与安全研究。 - ChildBad/ChicomaloTools
GitHub监控消息提醒!!!
更新了:RCE
描述:Backend server manager for RCE.js deployment
URL:https://github.com/intelinsideher/rce-server-manager-backend
标签:#RCE
更新了:RCE
描述:Backend server manager for RCE.js deployment
URL:https://github.com/intelinsideher/rce-server-manager-backend
标签:#RCE
GitHub
intelinsideher/rce-server-manager-backend
Backend server manager for RCE.js deployment. Contribute to intelinsideher/rce-server-manager-backend development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Backend code for the Brinda RCE Server Manager
URL:https://github.com/intelinsideher/brinda-rce-backend
标签:#RCE
更新了:RCE
描述:Backend code for the Brinda RCE Server Manager
URL:https://github.com/intelinsideher/brinda-rce-backend
标签:#RCE
GitHub
intelinsideher/brinda-rce-backend
Backend code for the Brinda RCE Server Manager. Contribute to intelinsideher/brinda-rce-backend development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-41244
URL:https://github.com/rxerium/CVE-2025-41244
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-41244
URL:https://github.com/rxerium/CVE-2025-41244
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-41244: Detection for CVE-2025-41244
Detection for CVE-2025-41244. Contribute to rxerium/CVE-2025-41244 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/haspread/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/haspread/CVE-2025-8088
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:绕过
描述:利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制
URL:https://github.com/OnlineMo/Renew_X_Auto_Pardon
标签:#绕过
更新了:绕过
描述:利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制
URL:https://github.com/OnlineMo/Renew_X_Auto_Pardon
标签:#绕过
GitHub
GitHub - OnlineMo/Renew_X_Auto_Pardon: 利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制
利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制 - OnlineMo/Renew_X_Auto_Pardon
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/MoAlali/CVE-2025-56379
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/MoAlali/CVE-2025-56379
标签:#CVE-2025
GitHub
GitHub - MoAlali/CVE-2025-56379: A stored cross-site scripting (XSS) vulnerability in the blog post feature of ERPNEXT v15.67.0…
A stored cross-site scripting (XSS) vulnerability in the blog post feature of ERPNEXT v15.67.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cont...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dash-auth-bypass
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dash-auth-bypass
标签:#CVE-2025
GitHub
GitHub - Gooseinpants/Dashy-auth-bypass: CVE-2025-57617 exploitation
CVE-2025-57617 exploitation. Contribute to Gooseinpants/Dashy-auth-bypass development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dashy-auth-bypass
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dashy-auth-bypass
标签:#CVE-2025
GitHub
GitHub - Gooseinpants/Dashy-auth-bypass: CVE-2025-57617 exploitation
CVE-2025-57617 exploitation. Contribute to Gooseinpants/Dashy-auth-bypass development by creating an account on GitHub.