GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch RISE Ultimate Project Manager & CRM (v3.9.4) in the File Manager functionality.
URL:https://github.com/aqwainfosec/CVE-2025-56807
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch RISE Ultimate Project Manager & CRM (v3.9.4) in the File Manager functionality.
URL:https://github.com/aqwainfosec/CVE-2025-56807
标签:#CVE-2025
GitHub
GitHub - aqwainfosec/CVE-2025-56807: CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch…
CVE-2025-56807: A Stored Cross Site Scripting (XSS) vulnerability was discovered in FairSketch RISE Ultimate Project Manager & CRM (v3.9.4) in the File Manager functionality. - aqwainfosec/...
GitHub监控消息提醒!!!
更新了:信息收集
描述:小红书AI Agent - 基于Claude Code的智能小红书操作助手,支持信息收集、内容发布、数据分析等功能
URL:https://github.com/ChicaChan/xhs-agent
标签:#信息收集
更新了:信息收集
描述:小红书AI Agent - 基于Claude Code的智能小红书操作助手,支持信息收集、内容发布、数据分析等功能
URL:https://github.com/ChicaChan/xhs-agent
标签:#信息收集
GitHub
GitHub - ChicaChan/xhs-agent: 小红书AI Agent - 基于Claude Code的智能小红书操作助手,支持信息收集、内容发布、数据分析等功能
小红书AI Agent - 基于Claude Code的智能小红书操作助手,支持信息收集、内容发布、数据分析等功能 - ChicaChan/xhs-agent
GitHub监控消息提醒!!!
更新了:RCE
描述:Simplify the SXPG_CALL_SYSTEM usage for enumeration on a targeted SAP system. Create a SAP RCE PoC.
URL:https://github.com/n3rada/sapsxpg
标签:#RCE
更新了:RCE
描述:Simplify the SXPG_CALL_SYSTEM usage for enumeration on a targeted SAP system. Create a SAP RCE PoC.
URL:https://github.com/n3rada/sapsxpg
标签:#RCE
GitHub
GitHub - n3rada/sapsxpg: Simplify the SXPG_CALL_SYSTEM function module (FM) usage for enumeration on a targeted SAP system. Create…
Simplify the SXPG_CALL_SYSTEM function module (FM) usage for enumeration on a targeted SAP system. Create a SAP RCE PoC. - n3rada/sapsxpg
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/fa1consec/cve_2025_61622_poc
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/fa1consec/cve_2025_61622_poc
标签:#CVE-2025
GitHub
GitHub - fa1consec/cve_2025_61622_poc: This PoC demonstrates the Remote Code Execution (RCE) vulnerability in Apache Pyfory (versions…
This PoC demonstrates the Remote Code Execution (RCE) vulnerability in Apache Pyfory (versions 0.12.0-0.12.2 and legacy PyFury 0.1.0-0.10.3) due to insecure pickle fallback deserialization (CVE-2...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59489 POC For android games
URL:https://github.com/RealtekDotSys/Meteor
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59489 POC For android games
URL:https://github.com/RealtekDotSys/Meteor
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/NVIDIA/product-security
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/NVIDIA/product-security
标签:#CVE-2025
GitHub
GitHub - NVIDIA/product-security: Starting October 1, 2025, NVIDIA PSIRT will publish an initial set of security bulletins on GitHub…
Starting October 1, 2025, NVIDIA PSIRT will publish an initial set of security bulletins on GitHub in Markdown, CSAF, and CVE formats. Coverage will expand over time, while all bulletins remain ava...
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-60787 Poc - RCE - MotionEye <= 0.43.1b4
URL:https://github.com/prabhatverma47/CVE-2025-60787
标签:#RCE
更新了:RCE
描述:CVE-2025-60787 Poc - RCE - MotionEye <= 0.43.1b4
URL:https://github.com/prabhatverma47/CVE-2025-60787
标签:#RCE
GitHub
GitHub - prabhatverma47/CVE-2025-60787: CVE-2025-60787 Poc - RCE - MotionEye <= 0.43.1b4
CVE-2025-60787 Poc - RCE - MotionEye <= 0.43.1b4. Contribute to prabhatverma47/CVE-2025-60787 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:sql injection PoC for CVE-2025-7558. authored by i-Corner
URL:https://github.com/rundas-r00t/CVE-2025-7558-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:sql injection PoC for CVE-2025-7558. authored by i-Corner
URL:https://github.com/rundas-r00t/CVE-2025-7558-PoC
标签:#CVE-2025
GitHub
GitHub - rundas-r00t/CVE-2025-7558-PoC: sql injection PoC for CVE-2025-7558. authored by i-Corner
sql injection PoC for CVE-2025-7558. authored by i-Corner - rundas-r00t/CVE-2025-7558-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Simple script to attempt a Bypass on a server possibly vulnerable to CVE-2025-29927 (Next.js Middleware)
URL:https://github.com/diogolourencodev/middleforce
标签:#CVE-2025
更新了:CVE-2025
描述:Simple script to attempt a Bypass on a server possibly vulnerable to CVE-2025-29927 (Next.js Middleware)
URL:https://github.com/diogolourencodev/middleforce
标签:#CVE-2025
GitHub
GitHub - diogolourencodev/middleforce: Simple script to attempt a Bypass on a server possibly vulnerable to CVE-2025-29927 (Next.js…
Simple script to attempt a Bypass on a server possibly vulnerable to CVE-2025-29927 (Next.js Middleware) - diogolourencodev/middleforce
GitHub监控消息提醒!!!
更新了:RCE
描述:Classic Web shell upload techniques & Web RCE techniques
URL:https://github.com/JFR-C/Webshell-Upload-and-Web-RCE-Techniques
标签:#RCE
更新了:RCE
描述:Classic Web shell upload techniques & Web RCE techniques
URL:https://github.com/JFR-C/Webshell-Upload-and-Web-RCE-Techniques
标签:#RCE
GitHub
GitHub - JFR-C/Webshell-Upload-and-Web-RCE-Techniques: Classic Web shell upload techniques & Web RCE techniques
Classic Web shell upload techniques & Web RCE techniques - JFR-C/Webshell-Upload-and-Web-RCE-Techniques
GitHub监控消息提醒!!!
更新了:RCE
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/ivy2320/CTF-event
标签:#RCE
更新了:RCE
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/ivy2320/CTF-event
标签:#RCE
GitHub
GitHub - ivy2320/CTF-event: # MyCTF-Event This repo contains CTF challenges. Structure: - ctf/rce/ -> RCE challenge folders…
# MyCTF-Event This repo contains CTF challenges. Structure: - ctf/rce/ -> RCE challenge folders (no flags) - ctf/osint/ -> OSINT challenge folders - OSINT challenge folders(...
GitHub监控消息提醒!!!
更新了:bypass av
描述:免杀木马样本
URL:https://github.com/batuhan-arda/Direct-Syscall-APC-Injection-PoC-Malware
标签:#bypass av
更新了:bypass av
描述:免杀木马样本
URL:https://github.com/batuhan-arda/Direct-Syscall-APC-Injection-PoC-Malware
标签:#bypass av
GitHub
GitHub - batuhan-arda/Direct-Syscall-APC-Injection-PoC-Malware: Injects shellcode into cmd.exe to execute arbitrary code. Creates…
Injects shellcode into cmd.exe to execute arbitrary code. Creates a suspended process, allocates memory using direct syscalls, writes disguised payload, changes permissions to executable, then trig...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem.
URL:https://github.com/farazsth98/exploit-CVE-2025-39946
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem.
URL:https://github.com/farazsth98/exploit-CVE-2025-39946
标签:#CVE-2025
GitHub
GitHub - farazsth98/exploit-CVE-2025-39946: Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem.
Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem. - farazsth98/exploit-CVE-2025-39946
GitHub监控消息提醒!!!
更新了:RCE
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/Creksz/web-vuln-scanner
标签:#RCE
更新了:RCE
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/Creksz/web-vuln-scanner
标签:#RCE
GitHub
GitHub - Creksz/web-vuln-scanner: A lightweight and extensible web vulnerability scanner for reconnaissance and web application…
A lightweight and extensible web vulnerability scanner for reconnaissance and web application security testing. Detects and reports common vulnerability classes (e.g., SQLi, XSS, CSRF, RCE, misconf...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: This repository contains a proof-of-concept exploit script for CVE-2025-1338
URL:https://github.com/jxcaxtc/CVE-2025-1338
标签:#CVE-2025
更新了:CVE-2025
描述: This repository contains a proof-of-concept exploit script for CVE-2025-1338
URL:https://github.com/jxcaxtc/CVE-2025-1338
标签:#CVE-2025
GitHub
GitHub - jxcaxtc/CVE-2025-1338: This repository contains a proof-of-concept exploit script for CVE-2025-1338
This repository contains a proof-of-concept exploit script for CVE-2025-1338 - jxcaxtc/CVE-2025-1338
GitHub监控消息提醒!!!
更新了:信息收集
描述:基于micronaut框架完成的一个硬件资源信息收集。可通过GraalVM工具打包成本地可执行文件。
URL:https://github.com/xminj/monitor-agent
标签:#信息收集
更新了:信息收集
描述:基于micronaut框架完成的一个硬件资源信息收集。可通过GraalVM工具打包成本地可执行文件。
URL:https://github.com/xminj/monitor-agent
标签:#信息收集
GitHub
GitHub - xminj/monitor-agent: 基于micronaut框架完成的一个硬件资源信息收集。可通过GraalVM工具打包成本地可执行文件。
基于micronaut框架完成的一个硬件资源信息收集。可通过GraalVM工具打包成本地可执行文件。 - xminj/monitor-agent
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:WP-CVE-2025-6934 | Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation
URL:https://github.com/Jenderal92/WP-CVE-2025-6934
标签:#CVE-2025
更新了:CVE-2025
描述:WP-CVE-2025-6934 | Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation
URL:https://github.com/Jenderal92/WP-CVE-2025-6934
标签:#CVE-2025
GitHub
GitHub - Jenderal92/WP-CVE-2025-6934: WP-CVE-2025-6934 | Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation
WP-CVE-2025-6934 | Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation - Jenderal92/WP-CVE-2025-6934