GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem.
URL:https://github.com/farazsth98/exploit-CVE-2025-39946
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem.
URL:https://github.com/farazsth98/exploit-CVE-2025-39946
标签:#CVE-2025
GitHub
GitHub - farazsth98/exploit-CVE-2025-39946: Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem.
Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem. - farazsth98/exploit-CVE-2025-39946
GitHub监控消息提醒!!!
更新了:RCE
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/Creksz/web-vuln-scanner
标签:#RCE
更新了:RCE
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/Creksz/web-vuln-scanner
标签:#RCE
GitHub
GitHub - Creksz/web-vuln-scanner: A lightweight and extensible web vulnerability scanner for reconnaissance and web application…
A lightweight and extensible web vulnerability scanner for reconnaissance and web application security testing. Detects and reports common vulnerability classes (e.g., SQLi, XSS, CSRF, RCE, misconf...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: This repository contains a proof-of-concept exploit script for CVE-2025-1338
URL:https://github.com/jxcaxtc/CVE-2025-1338
标签:#CVE-2025
更新了:CVE-2025
描述: This repository contains a proof-of-concept exploit script for CVE-2025-1338
URL:https://github.com/jxcaxtc/CVE-2025-1338
标签:#CVE-2025
GitHub
GitHub - jxcaxtc/CVE-2025-1338: This repository contains a proof-of-concept exploit script for CVE-2025-1338
This repository contains a proof-of-concept exploit script for CVE-2025-1338 - jxcaxtc/CVE-2025-1338
GitHub监控消息提醒!!!
更新了:信息收集
描述:基于micronaut框架完成的一个硬件资源信息收集。可通过GraalVM工具打包成本地可执行文件。
URL:https://github.com/xminj/monitor-agent
标签:#信息收集
更新了:信息收集
描述:基于micronaut框架完成的一个硬件资源信息收集。可通过GraalVM工具打包成本地可执行文件。
URL:https://github.com/xminj/monitor-agent
标签:#信息收集
GitHub
GitHub - xminj/monitor-agent: 基于micronaut框架完成的一个硬件资源信息收集。可通过GraalVM工具打包成本地可执行文件。
基于micronaut框架完成的一个硬件资源信息收集。可通过GraalVM工具打包成本地可执行文件。 - xminj/monitor-agent
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:WP-CVE-2025-6934 | Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation
URL:https://github.com/Jenderal92/WP-CVE-2025-6934
标签:#CVE-2025
更新了:CVE-2025
描述:WP-CVE-2025-6934 | Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation
URL:https://github.com/Jenderal92/WP-CVE-2025-6934
标签:#CVE-2025
GitHub
GitHub - Jenderal92/WP-CVE-2025-6934: WP-CVE-2025-6934 | Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation
WP-CVE-2025-6934 | Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation - Jenderal92/WP-CVE-2025-6934
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Apache (CVE-2025-24813) GOExploiter Checker & Exploiter very Fast
URL:https://github.com/drcrypterdotru/Apache-GOExploiter
标签:#CVE-2025
更新了:CVE-2025
描述:Apache (CVE-2025-24813) GOExploiter Checker & Exploiter very Fast
URL:https://github.com/drcrypterdotru/Apache-GOExploiter
标签:#CVE-2025
GitHub
GitHub - drcrypterdotru/Apache-GOExploiter: Apache (CVE-2025-24813) GOExploiter Checker & Exploiter very Fast
Apache (CVE-2025-24813) GOExploiter Checker & Exploiter very Fast - GitHub - drcrypterdotru/Apache-GOExploiter: Apache (CVE-2025-24813) GOExploiter Checker & Exploiter very Fast
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-61882
URL:https://github.com/rxerium/CVE-2025-61882
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-61882
URL:https://github.com/rxerium/CVE-2025-61882
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-61882-CVE-2025-61884: Detection for CVE-2025-61882 & CVE-2025-61884
Detection for CVE-2025-61882 & CVE-2025-61884. Contribute to rxerium/CVE-2025-61882-CVE-2025-61884 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.
URL:https://github.com/GithubKillsMyOpsec/CVE-2025-59489-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.
URL:https://github.com/GithubKillsMyOpsec/CVE-2025-59489-POC
标签:#CVE-2025
GitHub
GitHub - GithubKillsMyOpsec/CVE-2025-59489-POC: Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.
Proof Of Concept For CVE-2025-59489. Affects unity games running on Android. - GitHub - GithubKillsMyOpsec/CVE-2025-59489-POC: Proof Of Concept For CVE-2025-59489. Affects unity games running on A...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-9074 - Unauthenticated Docker API exposure allowing arbitrary container creation and host filesystem access.
URL:https://github.com/OilSeller2001/PoC-for-CVE-2025-9074
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-9074 - Unauthenticated Docker API exposure allowing arbitrary container creation and host filesystem access.
URL:https://github.com/OilSeller2001/PoC-for-CVE-2025-9074
标签:#CVE-2025
GitHub
GitHub - OilSeller2001/PoC-for-CVE-2025-9074: Proof-of-Concept exploit for CVE-2025-9074 - Unauthenticated Docker API exposure…
Proof-of-Concept exploit for CVE-2025-9074 - Unauthenticated Docker API exposure allowing arbitrary container creation and host filesystem access. - OilSeller2001/PoC-for-CVE-2025-9074
GitHub监控消息提醒!!!
更新了:Red Team
描述:A C++ command-line tool for pentesters and Red Teamers to quickly scaffold and manage directory structures for engagements, labs, and tools.
URL:https://github.com/dcollaoa/rt_manager
标签:#Red Team
更新了:Red Team
描述:A C++ command-line tool for pentesters and Red Teamers to quickly scaffold and manage directory structures for engagements, labs, and tools.
URL:https://github.com/dcollaoa/rt_manager
标签:#Red Team
GitHub监控消息提醒!!!
更新了:钓鱼
描述:Russian Fishing 4 Auto Script 俄罗斯钓鱼4自动化脚本
URL:https://github.com/fyodorrss/RussianFishing4-Script
标签:#钓鱼
更新了:钓鱼
描述:Russian Fishing 4 Auto Script 俄罗斯钓鱼4自动化脚本
URL:https://github.com/fyodorrss/RussianFishing4-Script
标签:#钓鱼
GitHub
GitHub - fyodorrss/RussianFishing4-Script: Russian Fishing 4 Fully Automated Fishing Script
Russian Fishing 4 Fully Automated Fishing Script. Contribute to fyodorrss/RussianFishing4-Script development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:An Obsidian plugin that quickly generates HTB penetration testing note templates,一款能够快速生成HTB渗透测试笔记模版的Obsidian 插件,有助于对您的知识库进行管理查询
URL:https://github.com/Ryanu9/Obsidian-Machine-Tracker
标签:#渗透测试
更新了:渗透测试
描述:An Obsidian plugin that quickly generates HTB penetration testing note templates,一款能够快速生成HTB渗透测试笔记模版的Obsidian 插件,有助于对您的知识库进行管理查询
URL:https://github.com/Ryanu9/Obsidian-Machine-Tracker
标签:#渗透测试
GitHub
Ryanu9/Obsidian-Machine-Tracker
An Obsidian plugin that quickly generates HTB penetration testing note templates,一款能够快速生成HTB渗透测试笔记模版的Obsidian 插件,有助于对您的知识库进行管理查询 - Ryanu9/Obsidian-Machine-Tracker
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-61882 (do not use without any written permission).
URL:https://github.com/Sachinart/CVE-2025-61882
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-61882 (do not use without any written permission).
URL:https://github.com/Sachinart/CVE-2025-61882
标签:#CVE-2025
GitHub
GitHub - Sachinart/CVE-2025-61882: Exploit for CVE-2025-61882 (do not use without any written permission).
Exploit for CVE-2025-61882 (do not use without any written permission). - GitHub - Sachinart/CVE-2025-61882: Exploit for CVE-2025-61882 (do not use without any written permission).
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17)
URL:https://github.com/r3dBust3r/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17)
URL:https://github.com/r3dBust3r/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - r3dBust3r/CVE-2025-32463: This repository contains an exploit script for CVE-2025-32463, a local privilege escalation…
This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17) - r3dBust3r/CVE-2025-32463
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49844 – Redis Lua Parser Use-After-Free
URL:https://github.com/dwisiswant0/CVE-2025-49844
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49844 – Redis Lua Parser Use-After-Free
URL:https://github.com/dwisiswant0/CVE-2025-49844
标签:#CVE-2025
GitHub
GitHub - dwisiswant0/CVE-2025-49844: CVE-2025-49844 – Redis Lua Parser Use-After-Free
CVE-2025-49844 – Redis Lua Parser Use-After-Free. Contribute to dwisiswant0/CVE-2025-49844 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-46817 – Redis Lua unpack Integer Overflow (Potential RCE)
URL:https://github.com/dwisiswant0/CVE-2025-46817
标签:#RCE
更新了:RCE
描述:CVE-2025-46817 – Redis Lua unpack Integer Overflow (Potential RCE)
URL:https://github.com/dwisiswant0/CVE-2025-46817
标签:#RCE
GitHub
GitHub - dwisiswant0/CVE-2025-46817: CVE-2025-46817 – Redis Lua unpack Integer Overflow (Potential RCE)
CVE-2025-46817 – Redis Lua unpack Integer Overflow (Potential RCE) - dwisiswant0/CVE-2025-46817
GitHub监控消息提醒!!!
更新了:信息收集
描述:集成多种攻防技术与检测手段,帮助安全测试人员高效执行信息收集、漏洞挖掘、利用验证, 提升渗透测试的自动化与体系化水平,为安全团队快速发现潜在风险与攻击面提供有力支持。
URL:https://github.com/hack007x/MoonVeil
标签:#信息收集
更新了:信息收集
描述:集成多种攻防技术与检测手段,帮助安全测试人员高效执行信息收集、漏洞挖掘、利用验证, 提升渗透测试的自动化与体系化水平,为安全团队快速发现潜在风险与攻击面提供有力支持。
URL:https://github.com/hack007x/MoonVeil
标签:#信息收集
GitHub
GitHub - hack007x/MoonVeil: 集成多种攻防技术与检测手段,帮助安全测试人员高效执行信息收集、漏洞挖掘、利用验证, 提升渗透测试的自动化与体系化水平,为安全团队快速发现潜在风险与攻击面提供有力支持。
集成多种攻防技术与检测手段,帮助安全测试人员高效执行信息收集、漏洞挖掘、利用验证, 提升渗透测试的自动化与体系化水平,为安全团队快速发现潜在风险与攻击面提供有力支持。 - hack007x/MoonVeil
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32462 & CVE-2025-32463
URL:https://github.com/harsh1verma/CVE-Analysis
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32462 & CVE-2025-32463
URL:https://github.com/harsh1verma/CVE-Analysis
标签:#CVE-2025
GitHub
harsh1verma/CVE-Analysis
CVE-2025-32462 & CVE-2025-32463. Contribute to harsh1verma/CVE-Analysis development by creating an account on GitHub.