GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/maestro-ant/Vvveb-CMS-CVE-2025-8518
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/maestro-ant/Vvveb-CMS-CVE-2025-8518
标签:#CVE-2025
GitHub
GitHub - maestro-ant/Vvveb-CMS-CVE-2025-8518: This repository contains a Proof of Concept (PoC) demonstrating a critical vulnerability…
This repository contains a Proof of Concept (PoC) demonstrating a critical vulnerability in givanz Vvveb 1.0.5. The vulnerability allows an authenticated user with template editing privileges to wr...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models
URL:https://github.com/AC8999/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models
URL:https://github.com/AC8999/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - AC8999/CVE-2025-32463: A Python exploit for CVE-2025-32463, a critical local privilege escalation vulnerability in the…
A Python exploit for CVE-2025-32463, a critical local privilege escalation vulnerability in the Sudo binary on Linux systems. This flaw allows local users to obtain root access by exploiting the --...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:burpsuit插件,解析swagger/openapi接口文档并进行请求,模拟参数方便渗透测试人员快速发现可用接口
URL:https://github.com/mumu0215/api_checker
标签:#渗透测试
更新了:渗透测试
描述:burpsuit插件,解析swagger/openapi接口文档并进行请求,模拟参数方便渗透测试人员快速发现可用接口
URL:https://github.com/mumu0215/api_checker
标签:#渗透测试
GitHub
GitHub - mumu0215/api_checker: burpsuit插件,解析swagger/openapi接口文档并进行请求,模拟参数方便渗透测试人员快速发现可用接口 (最新使用源码编译,release有时候没空搞)
burpsuit插件,解析swagger/openapi接口文档并进行请求,模拟参数方便渗透测试人员快速发现可用接口 (最新使用源码编译,release有时候没空搞) - mumu0215/api_checker
GitHub监控消息提醒!!!
更新了:信息收集
描述:泷羽自研自动化AI渗透测试工具,接入AI模型,从信息收集到内网移动
URL:https://github.com/shinyer/Zeus
标签:#信息收集
更新了:信息收集
描述:泷羽自研自动化AI渗透测试工具,接入AI模型,从信息收集到内网移动
URL:https://github.com/shinyer/Zeus
标签:#信息收集
GitHub
shinyer/Zeus
泷羽自研自动化AI渗透测试工具,接入AI模型,从信息收集到内网移动. Contribute to shinyer/Zeus development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CPAS audit management information system has SQL injection vulnerability(CVE-2025-57529)
URL:https://github.com/songqb-xx/CVE-2025-57529
标签:#CVE-2025
更新了:CVE-2025
描述:CPAS audit management information system has SQL injection vulnerability(CVE-2025-57529)
URL:https://github.com/songqb-xx/CVE-2025-57529
标签:#CVE-2025
GitHub
GitHub - songqb-xx/CVE-2025-57529: CPAS audit management information system has SQL injection vulnerability(CVE-2025-57529)
CPAS audit management information system has SQL injection vulnerability(CVE-2025-57529) - songqb-xx/CVE-2025-57529
GitHub监控消息提醒!!!
更新了:渗透测试
描述:CM Security Tools 是一款模块化、多线程的网络安全扫描工具包,集成主机发现、端口扫描、弱口令检测和子域名枚举等功能,适用于渗透测试与安全研究。
URL:https://github.com/ChildBad/ChicomaloTools
标签:#渗透测试
更新了:渗透测试
描述:CM Security Tools 是一款模块化、多线程的网络安全扫描工具包,集成主机发现、端口扫描、弱口令检测和子域名枚举等功能,适用于渗透测试与安全研究。
URL:https://github.com/ChildBad/ChicomaloTools
标签:#渗透测试
GitHub
GitHub - ChildBad/ChicomaloTools: CM Security Tools 是一款模块化、多线程的网络安全扫描工具包,集成主机发现、端口扫描、弱口令检测和子域名枚举等功能,适用于渗透测试与安全研究。
CM Security Tools 是一款模块化、多线程的网络安全扫描工具包,集成主机发现、端口扫描、弱口令检测和子域名枚举等功能,适用于渗透测试与安全研究。 - ChildBad/ChicomaloTools
GitHub监控消息提醒!!!
更新了:RCE
描述:Backend server manager for RCE.js deployment
URL:https://github.com/intelinsideher/rce-server-manager-backend
标签:#RCE
更新了:RCE
描述:Backend server manager for RCE.js deployment
URL:https://github.com/intelinsideher/rce-server-manager-backend
标签:#RCE
GitHub
intelinsideher/rce-server-manager-backend
Backend server manager for RCE.js deployment. Contribute to intelinsideher/rce-server-manager-backend development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Backend code for the Brinda RCE Server Manager
URL:https://github.com/intelinsideher/brinda-rce-backend
标签:#RCE
更新了:RCE
描述:Backend code for the Brinda RCE Server Manager
URL:https://github.com/intelinsideher/brinda-rce-backend
标签:#RCE
GitHub
intelinsideher/brinda-rce-backend
Backend code for the Brinda RCE Server Manager. Contribute to intelinsideher/brinda-rce-backend development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-41244
URL:https://github.com/rxerium/CVE-2025-41244
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-41244
URL:https://github.com/rxerium/CVE-2025-41244
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-41244: Detection for CVE-2025-41244
Detection for CVE-2025-41244. Contribute to rxerium/CVE-2025-41244 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/haspread/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/haspread/CVE-2025-8088
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:绕过
描述:利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制
URL:https://github.com/OnlineMo/Renew_X_Auto_Pardon
标签:#绕过
更新了:绕过
描述:利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制
URL:https://github.com/OnlineMo/Renew_X_Auto_Pardon
标签:#绕过
GitHub
GitHub - OnlineMo/Renew_X_Auto_Pardon: 利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制
利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制 - OnlineMo/Renew_X_Auto_Pardon
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/MoAlali/CVE-2025-56379
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/MoAlali/CVE-2025-56379
标签:#CVE-2025
GitHub
GitHub - MoAlali/CVE-2025-56379: A stored cross-site scripting (XSS) vulnerability in the blog post feature of ERPNEXT v15.67.0…
A stored cross-site scripting (XSS) vulnerability in the blog post feature of ERPNEXT v15.67.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cont...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dash-auth-bypass
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dash-auth-bypass
标签:#CVE-2025
GitHub
GitHub - Gooseinpants/Dashy-auth-bypass: CVE-2025-57617 exploitation
CVE-2025-57617 exploitation. Contribute to Gooseinpants/Dashy-auth-bypass development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dashy-auth-bypass
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dashy-auth-bypass
标签:#CVE-2025
GitHub
GitHub - Gooseinpants/Dashy-auth-bypass: CVE-2025-57617 exploitation
CVE-2025-57617 exploitation. Contribute to Gooseinpants/Dashy-auth-bypass development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24893 exploit
URL:https://github.com/ibrahmsql/CVE-2025-24893
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24893 exploit
URL:https://github.com/ibrahmsql/CVE-2025-24893
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐
URL:https://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐
URL:https://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201
标签:#CVE-2025
GitHub
GitHub - JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201: CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s…
CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage/SMS. Exploitation bypassed Blastdoor, enabled kernel escalati...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch RISE Ultimate Project Manager & CRM (v3.9.4) in the File Manager functionality.
URL:https://github.com/aqwainfosec/CVE-2025-56807
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch RISE Ultimate Project Manager & CRM (v3.9.4) in the File Manager functionality.
URL:https://github.com/aqwainfosec/CVE-2025-56807
标签:#CVE-2025
GitHub
GitHub - aqwainfosec/CVE-2025-56807: CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch…
CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch RISE Ultimate Project Manager & CRM (v3.9.4) in the File Manager functionality. - aqwainfosec/...