GitHub监控消息提醒!!!
更新了:RCE
描述:Backend server manager for RCE.js deployment
URL:https://github.com/intelinsideher/rce-server-manager-backend
标签:#RCE
更新了:RCE
描述:Backend server manager for RCE.js deployment
URL:https://github.com/intelinsideher/rce-server-manager-backend
标签:#RCE
GitHub
intelinsideher/rce-server-manager-backend
Backend server manager for RCE.js deployment. Contribute to intelinsideher/rce-server-manager-backend development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Backend code for the Brinda RCE Server Manager
URL:https://github.com/intelinsideher/brinda-rce-backend
标签:#RCE
更新了:RCE
描述:Backend code for the Brinda RCE Server Manager
URL:https://github.com/intelinsideher/brinda-rce-backend
标签:#RCE
GitHub
intelinsideher/brinda-rce-backend
Backend code for the Brinda RCE Server Manager. Contribute to intelinsideher/brinda-rce-backend development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-41244
URL:https://github.com/rxerium/CVE-2025-41244
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-41244
URL:https://github.com/rxerium/CVE-2025-41244
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-41244: Detection for CVE-2025-41244
Detection for CVE-2025-41244. Contribute to rxerium/CVE-2025-41244 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/haspread/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/haspread/CVE-2025-8088
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:绕过
描述:利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制
URL:https://github.com/OnlineMo/Renew_X_Auto_Pardon
标签:#绕过
更新了:绕过
描述:利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制
URL:https://github.com/OnlineMo/Renew_X_Auto_Pardon
标签:#绕过
GitHub
GitHub - OnlineMo/Renew_X_Auto_Pardon: 利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制
利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制 - OnlineMo/Renew_X_Auto_Pardon
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/MoAlali/CVE-2025-56379
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/MoAlali/CVE-2025-56379
标签:#CVE-2025
GitHub
GitHub - MoAlali/CVE-2025-56379: A stored cross-site scripting (XSS) vulnerability in the blog post feature of ERPNEXT v15.67.0…
A stored cross-site scripting (XSS) vulnerability in the blog post feature of ERPNEXT v15.67.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cont...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dash-auth-bypass
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dash-auth-bypass
标签:#CVE-2025
GitHub
GitHub - Gooseinpants/Dashy-auth-bypass: CVE-2025-57617 exploitation
CVE-2025-57617 exploitation. Contribute to Gooseinpants/Dashy-auth-bypass development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dashy-auth-bypass
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dashy-auth-bypass
标签:#CVE-2025
GitHub
GitHub - Gooseinpants/Dashy-auth-bypass: CVE-2025-57617 exploitation
CVE-2025-57617 exploitation. Contribute to Gooseinpants/Dashy-auth-bypass development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24893 exploit
URL:https://github.com/ibrahmsql/CVE-2025-24893
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24893 exploit
URL:https://github.com/ibrahmsql/CVE-2025-24893
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐
URL:https://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐
URL:https://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201
标签:#CVE-2025
GitHub
GitHub - JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201: CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s…
CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage/SMS. Exploitation bypassed Blastdoor, enabled kernel escalati...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch RISE Ultimate Project Manager & CRM (v3.9.4) in the File Manager functionality.
URL:https://github.com/aqwainfosec/CVE-2025-56807
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch RISE Ultimate Project Manager & CRM (v3.9.4) in the File Manager functionality.
URL:https://github.com/aqwainfosec/CVE-2025-56807
标签:#CVE-2025
GitHub
GitHub - aqwainfosec/CVE-2025-56807: CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch…
CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch RISE Ultimate Project Manager & CRM (v3.9.4) in the File Manager functionality. - aqwainfosec/...
GitHub监控消息提醒!!!
更新了:信息收集
描述:小红书AI Agent - 基于Claude Code的智能小红书操作助手,支持信息收集、内容发布、数据分析等功能
URL:https://github.com/ChicaChan/xhs-agent
标签:#信息收集
更新了:信息收集
描述:小红书AI Agent - 基于Claude Code的智能小红书操作助手,支持信息收集、内容发布、数据分析等功能
URL:https://github.com/ChicaChan/xhs-agent
标签:#信息收集
GitHub
GitHub - ChicaChan/xhs-agent: 小红书AI Agent - 基于Claude Code的智能小红书操作助手,支持信息收集、内容发布、数据分析等功能
小红书AI Agent - 基于Claude Code的智能小红书操作助手,支持信息收集、内容发布、数据分析等功能 - ChicaChan/xhs-agent
GitHub监控消息提醒!!!
更新了:RCE
描述:Simplify the SXPG_CALL_SYSTEM usage for enumeration on a targeted SAP system. Create a SAP RCE PoC.
URL:https://github.com/n3rada/sapsxpg
标签:#RCE
更新了:RCE
描述:Simplify the SXPG_CALL_SYSTEM usage for enumeration on a targeted SAP system. Create a SAP RCE PoC.
URL:https://github.com/n3rada/sapsxpg
标签:#RCE
GitHub
GitHub - n3rada/sapsxpg: Simplify the SXPG_CALL_SYSTEM function module (FM) usage for enumeration on a targeted SAP system. Create…
Simplify the SXPG_CALL_SYSTEM function module (FM) usage for enumeration on a targeted SAP system. Create a SAP RCE PoC. - n3rada/sapsxpg
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/fa1consec/cve_2025_61622_poc
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/fa1consec/cve_2025_61622_poc
标签:#CVE-2025
GitHub
GitHub - fa1consec/cve_2025_61622_poc: This PoC demonstrates the Remote Code Execution (RCE) vulnerability in Apache Pyfory (versions…
This PoC demonstrates the Remote Code Execution (RCE) vulnerability in Apache Pyfory (versions 0.12.0-0.12.2 and legacy PyFury 0.1.0-0.10.3) due to insecure pickle fallback deserialization (CVE-2...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59489 POC For android games
URL:https://github.com/RealtekDotSys/Meteor
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59489 POC For android games
URL:https://github.com/RealtekDotSys/Meteor
标签:#CVE-2025