GitHub监控消息提醒!!!
更新了:RCE
描述:Backend server manager for RCE.js deployment
URL:https://github.com/intelinsideher/rce-server-manager-backend
标签:#RCE
更新了:RCE
描述:Backend server manager for RCE.js deployment
URL:https://github.com/intelinsideher/rce-server-manager-backend
标签:#RCE
GitHub
intelinsideher/rce-server-manager-backend
Backend server manager for RCE.js deployment. Contribute to intelinsideher/rce-server-manager-backend development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Backend code for the Brinda RCE Server Manager
URL:https://github.com/intelinsideher/brinda-rce-backend
标签:#RCE
更新了:RCE
描述:Backend code for the Brinda RCE Server Manager
URL:https://github.com/intelinsideher/brinda-rce-backend
标签:#RCE
GitHub
intelinsideher/brinda-rce-backend
Backend code for the Brinda RCE Server Manager. Contribute to intelinsideher/brinda-rce-backend development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-41244
URL:https://github.com/rxerium/CVE-2025-41244
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-41244
URL:https://github.com/rxerium/CVE-2025-41244
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-41244: Detection for CVE-2025-41244
Detection for CVE-2025-41244. Contribute to rxerium/CVE-2025-41244 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/haspread/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/haspread/CVE-2025-8088
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:绕过
描述:利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制
URL:https://github.com/OnlineMo/Renew_X_Auto_Pardon
标签:#绕过
更新了:绕过
描述:利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制
URL:https://github.com/OnlineMo/Renew_X_Auto_Pardon
标签:#绕过
GitHub
GitHub - OnlineMo/Renew_X_Auto_Pardon: 利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制
利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制 - OnlineMo/Renew_X_Auto_Pardon
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/MoAlali/CVE-2025-56379
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088 based path traversal tool
URL:https://github.com/MoAlali/CVE-2025-56379
标签:#CVE-2025
GitHub
GitHub - MoAlali/CVE-2025-56379: A stored cross-site scripting (XSS) vulnerability in the blog post feature of ERPNEXT v15.67.0…
A stored cross-site scripting (XSS) vulnerability in the blog post feature of ERPNEXT v15.67.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cont...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dash-auth-bypass
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dash-auth-bypass
标签:#CVE-2025
GitHub
GitHub - Gooseinpants/Dashy-auth-bypass: CVE-2025-57617 exploitation
CVE-2025-57617 exploitation. Contribute to Gooseinpants/Dashy-auth-bypass development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dashy-auth-bypass
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-57617 exploitation
URL:https://github.com/Gooseinpants/Dashy-auth-bypass
标签:#CVE-2025
GitHub
GitHub - Gooseinpants/Dashy-auth-bypass: CVE-2025-57617 exploitation
CVE-2025-57617 exploitation. Contribute to Gooseinpants/Dashy-auth-bypass development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24893 exploit
URL:https://github.com/ibrahmsql/CVE-2025-24893
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24893 exploit
URL:https://github.com/ibrahmsql/CVE-2025-24893
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐
URL:https://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐
URL:https://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201
标签:#CVE-2025
GitHub
GitHub - JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201: CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s…
CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage/SMS. Exploitation bypassed Blastdoor, enabled kernel escalati...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch RISE Ultimate Project Manager & CRM (v3.9.4) in the File Manager functionality.
URL:https://github.com/aqwainfosec/CVE-2025-56807
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch RISE Ultimate Project Manager & CRM (v3.9.4) in the File Manager functionality.
URL:https://github.com/aqwainfosec/CVE-2025-56807
标签:#CVE-2025
GitHub
GitHub - aqwainfosec/CVE-2025-56807: CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch…
CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch RISE Ultimate Project Manager & CRM (v3.9.4) in the File Manager functionality. - aqwainfosec/...
GitHub监控消息提醒!!!
更新了:信息收集
描述:小红书AI Agent - 基于Claude Code的智能小红书操作助手,支持信息收集、内容发布、数据分析等功能
URL:https://github.com/ChicaChan/xhs-agent
标签:#信息收集
更新了:信息收集
描述:小红书AI Agent - 基于Claude Code的智能小红书操作助手,支持信息收集、内容发布、数据分析等功能
URL:https://github.com/ChicaChan/xhs-agent
标签:#信息收集
GitHub
GitHub - ChicaChan/xhs-agent: 小红书AI Agent - 基于Claude Code的智能小红书操作助手,支持信息收集、内容发布、数据分析等功能
小红书AI Agent - 基于Claude Code的智能小红书操作助手,支持信息收集、内容发布、数据分析等功能 - ChicaChan/xhs-agent
GitHub监控消息提醒!!!
更新了:RCE
描述:Simplify the SXPG_CALL_SYSTEM usage for enumeration on a targeted SAP system. Create a SAP RCE PoC.
URL:https://github.com/n3rada/sapsxpg
标签:#RCE
更新了:RCE
描述:Simplify the SXPG_CALL_SYSTEM usage for enumeration on a targeted SAP system. Create a SAP RCE PoC.
URL:https://github.com/n3rada/sapsxpg
标签:#RCE
GitHub
GitHub - n3rada/sapsxpg: Simplify the SXPG_CALL_SYSTEM function module (FM) usage for enumeration on a targeted SAP system. Create…
Simplify the SXPG_CALL_SYSTEM function module (FM) usage for enumeration on a targeted SAP system. Create a SAP RCE PoC. - n3rada/sapsxpg
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/fa1consec/cve_2025_61622_poc
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/fa1consec/cve_2025_61622_poc
标签:#CVE-2025
GitHub
GitHub - fa1consec/cve_2025_61622_poc: This PoC demonstrates the Remote Code Execution (RCE) vulnerability in Apache Pyfory (versions…
This PoC demonstrates the Remote Code Execution (RCE) vulnerability in Apache Pyfory (versions 0.12.0-0.12.2 and legacy PyFury 0.1.0-0.10.3) due to insecure pickle fallback deserialization (CVE-2...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59489 POC For android games
URL:https://github.com/RealtekDotSys/Meteor
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59489 POC For android games
URL:https://github.com/RealtekDotSys/Meteor
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/NVIDIA/product-security
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/NVIDIA/product-security
标签:#CVE-2025
GitHub
GitHub - NVIDIA/product-security: Starting October 1, 2025, NVIDIA PSIRT will publish an initial set of security bulletins on GitHub…
Starting October 1, 2025, NVIDIA PSIRT will publish an initial set of security bulletins on GitHub in Markdown, CSAF, and CVE formats. Coverage will expand over time, while all bulletins remain ava...