GitHub监控消息提醒!!!
更新了:RCE
描述:Classic Web shell upload techniques & Web RCE techniques
URL:https://github.com/JFR-C/Webshell-Upload-and-Web-RCE-Techniques
标签:#RCE
更新了:RCE
描述:Classic Web shell upload techniques & Web RCE techniques
URL:https://github.com/JFR-C/Webshell-Upload-and-Web-RCE-Techniques
标签:#RCE
GitHub
GitHub - JFR-C/Webshell-Upload-and-Web-RCE-Techniques: Classic Web shell upload techniques & Web RCE techniques
Classic Web shell upload techniques & Web RCE techniques - JFR-C/Webshell-Upload-and-Web-RCE-Techniques
GitHub监控消息提醒!!!
更新了:RCE
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/ivy2320/CTF-event
标签:#RCE
更新了:RCE
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/ivy2320/CTF-event
标签:#RCE
GitHub
GitHub - ivy2320/CTF-event: # MyCTF-Event This repo contains CTF challenges. Structure: - ctf/rce/ -> RCE challenge folders…
# MyCTF-Event This repo contains CTF challenges. Structure: - ctf/rce/ -> RCE challenge folders (no flags) - ctf/osint/ -> OSINT challenge folders - OSINT challenge folders(...
GitHub监控消息提醒!!!
更新了:bypass av
描述:免杀木马样本
URL:https://github.com/batuhan-arda/Direct-Syscall-APC-Injection-PoC-Malware
标签:#bypass av
更新了:bypass av
描述:免杀木马样本
URL:https://github.com/batuhan-arda/Direct-Syscall-APC-Injection-PoC-Malware
标签:#bypass av
GitHub
GitHub - batuhan-arda/Direct-Syscall-APC-Injection-PoC-Malware: Injects shellcode into cmd.exe to execute arbitrary code. Creates…
Injects shellcode into cmd.exe to execute arbitrary code. Creates a suspended process, allocates memory using direct syscalls, writes disguised payload, changes permissions to executable, then trig...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem.
URL:https://github.com/farazsth98/exploit-CVE-2025-39946
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem.
URL:https://github.com/farazsth98/exploit-CVE-2025-39946
标签:#CVE-2025
GitHub
GitHub - farazsth98/exploit-CVE-2025-39946: Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem.
Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem. - farazsth98/exploit-CVE-2025-39946
GitHub监控消息提醒!!!
更新了:RCE
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/Creksz/web-vuln-scanner
标签:#RCE
更新了:RCE
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/Creksz/web-vuln-scanner
标签:#RCE
GitHub
GitHub - Creksz/web-vuln-scanner: A lightweight and extensible web vulnerability scanner for reconnaissance and web application…
A lightweight and extensible web vulnerability scanner for reconnaissance and web application security testing. Detects and reports common vulnerability classes (e.g., SQLi, XSS, CSRF, RCE, misconf...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: This repository contains a proof-of-concept exploit script for CVE-2025-1338
URL:https://github.com/jxcaxtc/CVE-2025-1338
标签:#CVE-2025
更新了:CVE-2025
描述: This repository contains a proof-of-concept exploit script for CVE-2025-1338
URL:https://github.com/jxcaxtc/CVE-2025-1338
标签:#CVE-2025
GitHub
GitHub - jxcaxtc/CVE-2025-1338: This repository contains a proof-of-concept exploit script for CVE-2025-1338
This repository contains a proof-of-concept exploit script for CVE-2025-1338 - jxcaxtc/CVE-2025-1338
GitHub监控消息提醒!!!
更新了:信息收集
描述:基于micronaut框架完成的一个硬件资源信息收集。可通过GraalVM工具打包成本地可执行文件。
URL:https://github.com/xminj/monitor-agent
标签:#信息收集
更新了:信息收集
描述:基于micronaut框架完成的一个硬件资源信息收集。可通过GraalVM工具打包成本地可执行文件。
URL:https://github.com/xminj/monitor-agent
标签:#信息收集
GitHub
GitHub - xminj/monitor-agent: 基于micronaut框架完成的一个硬件资源信息收集。可通过GraalVM工具打包成本地可执行文件。
基于micronaut框架完成的一个硬件资源信息收集。可通过GraalVM工具打包成本地可执行文件。 - xminj/monitor-agent
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:WP-CVE-2025-6934 | Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation
URL:https://github.com/Jenderal92/WP-CVE-2025-6934
标签:#CVE-2025
更新了:CVE-2025
描述:WP-CVE-2025-6934 | Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation
URL:https://github.com/Jenderal92/WP-CVE-2025-6934
标签:#CVE-2025
GitHub
GitHub - Jenderal92/WP-CVE-2025-6934: WP-CVE-2025-6934 | Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation
WP-CVE-2025-6934 | Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation - Jenderal92/WP-CVE-2025-6934
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Apache (CVE-2025-24813) GOExploiter Checker & Exploiter very Fast
URL:https://github.com/drcrypterdotru/Apache-GOExploiter
标签:#CVE-2025
更新了:CVE-2025
描述:Apache (CVE-2025-24813) GOExploiter Checker & Exploiter very Fast
URL:https://github.com/drcrypterdotru/Apache-GOExploiter
标签:#CVE-2025
GitHub
GitHub - drcrypterdotru/Apache-GOExploiter: Apache (CVE-2025-24813) GOExploiter Checker & Exploiter very Fast
Apache (CVE-2025-24813) GOExploiter Checker & Exploiter very Fast - GitHub - drcrypterdotru/Apache-GOExploiter: Apache (CVE-2025-24813) GOExploiter Checker & Exploiter very Fast
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-61882
URL:https://github.com/rxerium/CVE-2025-61882
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-61882
URL:https://github.com/rxerium/CVE-2025-61882
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-61882-CVE-2025-61884: Detection for CVE-2025-61882 & CVE-2025-61884
Detection for CVE-2025-61882 & CVE-2025-61884. Contribute to rxerium/CVE-2025-61882-CVE-2025-61884 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.
URL:https://github.com/GithubKillsMyOpsec/CVE-2025-59489-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.
URL:https://github.com/GithubKillsMyOpsec/CVE-2025-59489-POC
标签:#CVE-2025
GitHub
GitHub - GithubKillsMyOpsec/CVE-2025-59489-POC: Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.
Proof Of Concept For CVE-2025-59489. Affects unity games running on Android. - GitHub - GithubKillsMyOpsec/CVE-2025-59489-POC: Proof Of Concept For CVE-2025-59489. Affects unity games running on A...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-9074 - Unauthenticated Docker API exposure allowing arbitrary container creation and host filesystem access.
URL:https://github.com/OilSeller2001/PoC-for-CVE-2025-9074
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-9074 - Unauthenticated Docker API exposure allowing arbitrary container creation and host filesystem access.
URL:https://github.com/OilSeller2001/PoC-for-CVE-2025-9074
标签:#CVE-2025
GitHub
GitHub - OilSeller2001/PoC-for-CVE-2025-9074: Proof-of-Concept exploit for CVE-2025-9074 - Unauthenticated Docker API exposure…
Proof-of-Concept exploit for CVE-2025-9074 - Unauthenticated Docker API exposure allowing arbitrary container creation and host filesystem access. - OilSeller2001/PoC-for-CVE-2025-9074
GitHub监控消息提醒!!!
更新了:Red Team
描述:A C++ command-line tool for pentesters and Red Teamers to quickly scaffold and manage directory structures for engagements, labs, and tools.
URL:https://github.com/dcollaoa/rt_manager
标签:#Red Team
更新了:Red Team
描述:A C++ command-line tool for pentesters and Red Teamers to quickly scaffold and manage directory structures for engagements, labs, and tools.
URL:https://github.com/dcollaoa/rt_manager
标签:#Red Team
GitHub监控消息提醒!!!
更新了:钓鱼
描述:Russian Fishing 4 Auto Script 俄罗斯钓鱼4自动化脚本
URL:https://github.com/fyodorrss/RussianFishing4-Script
标签:#钓鱼
更新了:钓鱼
描述:Russian Fishing 4 Auto Script 俄罗斯钓鱼4自动化脚本
URL:https://github.com/fyodorrss/RussianFishing4-Script
标签:#钓鱼
GitHub
GitHub - fyodorrss/RussianFishing4-Script: Russian Fishing 4 Fully Automated Fishing Script
Russian Fishing 4 Fully Automated Fishing Script. Contribute to fyodorrss/RussianFishing4-Script development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:An Obsidian plugin that quickly generates HTB penetration testing note templates,一款能够快速生成HTB渗透测试笔记模版的Obsidian 插件,有助于对您的知识库进行管理查询
URL:https://github.com/Ryanu9/Obsidian-Machine-Tracker
标签:#渗透测试
更新了:渗透测试
描述:An Obsidian plugin that quickly generates HTB penetration testing note templates,一款能够快速生成HTB渗透测试笔记模版的Obsidian 插件,有助于对您的知识库进行管理查询
URL:https://github.com/Ryanu9/Obsidian-Machine-Tracker
标签:#渗透测试
GitHub
Ryanu9/Obsidian-Machine-Tracker
An Obsidian plugin that quickly generates HTB penetration testing note templates,一款能够快速生成HTB渗透测试笔记模版的Obsidian 插件,有助于对您的知识库进行管理查询 - Ryanu9/Obsidian-Machine-Tracker
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-61882 (do not use without any written permission).
URL:https://github.com/Sachinart/CVE-2025-61882
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-61882 (do not use without any written permission).
URL:https://github.com/Sachinart/CVE-2025-61882
标签:#CVE-2025
GitHub
GitHub - Sachinart/CVE-2025-61882: Exploit for CVE-2025-61882 (do not use without any written permission).
Exploit for CVE-2025-61882 (do not use without any written permission). - GitHub - Sachinart/CVE-2025-61882: Exploit for CVE-2025-61882 (do not use without any written permission).
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17)
URL:https://github.com/r3dBust3r/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17)
URL:https://github.com/r3dBust3r/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - r3dBust3r/CVE-2025-32463: This repository contains an exploit script for CVE-2025-32463, a local privilege escalation…
This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17) - r3dBust3r/CVE-2025-32463
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49844 – Redis Lua Parser Use-After-Free
URL:https://github.com/dwisiswant0/CVE-2025-49844
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49844 – Redis Lua Parser Use-After-Free
URL:https://github.com/dwisiswant0/CVE-2025-49844
标签:#CVE-2025
GitHub
GitHub - dwisiswant0/CVE-2025-49844: CVE-2025-49844 – Redis Lua Parser Use-After-Free
CVE-2025-49844 – Redis Lua Parser Use-After-Free. Contribute to dwisiswant0/CVE-2025-49844 development by creating an account on GitHub.