GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17)
URL:https://github.com/r3dBust3r/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17)
URL:https://github.com/r3dBust3r/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - r3dBust3r/CVE-2025-32463: This repository contains an exploit script for CVE-2025-32463, a local privilege escalation…
This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17) - r3dBust3r/CVE-2025-32463
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49844 – Redis Lua Parser Use-After-Free
URL:https://github.com/dwisiswant0/CVE-2025-49844
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49844 – Redis Lua Parser Use-After-Free
URL:https://github.com/dwisiswant0/CVE-2025-49844
标签:#CVE-2025
GitHub
GitHub - dwisiswant0/CVE-2025-49844: CVE-2025-49844 – Redis Lua Parser Use-After-Free
CVE-2025-49844 – Redis Lua Parser Use-After-Free. Contribute to dwisiswant0/CVE-2025-49844 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-46817 – Redis Lua unpack Integer Overflow (Potential RCE)
URL:https://github.com/dwisiswant0/CVE-2025-46817
标签:#RCE
更新了:RCE
描述:CVE-2025-46817 – Redis Lua unpack Integer Overflow (Potential RCE)
URL:https://github.com/dwisiswant0/CVE-2025-46817
标签:#RCE
GitHub
GitHub - dwisiswant0/CVE-2025-46817: CVE-2025-46817 – Redis Lua unpack Integer Overflow (Potential RCE)
CVE-2025-46817 – Redis Lua unpack Integer Overflow (Potential RCE) - dwisiswant0/CVE-2025-46817
GitHub监控消息提醒!!!
更新了:信息收集
描述:集成多种攻防技术与检测手段,帮助安全测试人员高效执行信息收集、漏洞挖掘、利用验证, 提升渗透测试的自动化与体系化水平,为安全团队快速发现潜在风险与攻击面提供有力支持。
URL:https://github.com/hack007x/MoonVeil
标签:#信息收集
更新了:信息收集
描述:集成多种攻防技术与检测手段,帮助安全测试人员高效执行信息收集、漏洞挖掘、利用验证, 提升渗透测试的自动化与体系化水平,为安全团队快速发现潜在风险与攻击面提供有力支持。
URL:https://github.com/hack007x/MoonVeil
标签:#信息收集
GitHub
GitHub - hack007x/MoonVeil: 集成多种攻防技术与检测手段,帮助安全测试人员高效执行信息收集、漏洞挖掘、利用验证, 提升渗透测试的自动化与体系化水平,为安全团队快速发现潜在风险与攻击面提供有力支持。
集成多种攻防技术与检测手段,帮助安全测试人员高效执行信息收集、漏洞挖掘、利用验证, 提升渗透测试的自动化与体系化水平,为安全团队快速发现潜在风险与攻击面提供有力支持。 - hack007x/MoonVeil
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32462 & CVE-2025-32463
URL:https://github.com/harsh1verma/CVE-Analysis
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32462 & CVE-2025-32463
URL:https://github.com/harsh1verma/CVE-Analysis
标签:#CVE-2025
GitHub
harsh1verma/CVE-Analysis
CVE-2025-32462 & CVE-2025-32463. Contribute to harsh1verma/CVE-Analysis development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-61882
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-61882
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-61882
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-61882
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-61882: CVE-2025-61882
CVE-2025-61882. Contribute to B1ack4sh/Blackash-CVE-2025-61882 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE PAYLOAD FOR CTF INTIGRITI
URL:https://github.com/iamsavi0r/rcectf
标签:#RCE
更新了:RCE
描述:RCE PAYLOAD FOR CTF INTIGRITI
URL:https://github.com/iamsavi0r/rcectf
标签:#RCE
GitHub
GitHub - iamsavi0r/rcectf: RCE PAYLOAD FOR CTF INTIGRITI
RCE PAYLOAD FOR CTF INTIGRITI. Contribute to iamsavi0r/rcectf development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Reproduction and fix of the CVE-2025-29927 vulnerability.
URL:https://github.com/Bongni/CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:Reproduction and fix of the CVE-2025-29927 vulnerability.
URL:https://github.com/Bongni/CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - Bongni/CVE-2025-29927: Reproduction and fix of the CVE-2025-29927 vulnerability.
Reproduction and fix of the CVE-2025-29927 vulnerability. - Bongni/CVE-2025-29927
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Minimal Redis honeypot detecting RediShell (CVE-2025-49844) exploits.
URL:https://github.com/srozb/reditrap
标签:#CVE-2025
更新了:CVE-2025
描述:Minimal Redis honeypot detecting RediShell (CVE-2025-49844) exploits.
URL:https://github.com/srozb/reditrap
标签:#CVE-2025
GitHub
GitHub - srozb/reditrap: Minimal Redis honeypot detecting RediShell (CVE-2025-49844) exploits.
Minimal Redis honeypot detecting RediShell (CVE-2025-49844) exploits. - srozb/reditrap
GitHub监控消息提醒!!!
更新了:渗透测试
描述:ARL 资产侦察灯塔系统(可运行,添加指纹,提高并发,升级工具及系统,无限制修改版) | ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
URL:https://github.com/kur4ge/ARL-lite
标签:#渗透测试
更新了:渗透测试
描述:ARL 资产侦察灯塔系统(可运行,添加指纹,提高并发,升级工具及系统,无限制修改版) | ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
URL:https://github.com/kur4ge/ARL-lite
标签:#渗透测试
GitHub
GitHub - kur4ge/ARL-lite: ARL 资产侦察灯塔系统(可运行,添加指纹,提高并发,升级工具及系统,无限制修改版) | ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联…
ARL 资产侦察灯塔系统(可运行,添加指纹,提高并发,升级工具及系统,无限制修改版) | ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。 - kur4ge/ARL-lite
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-10351. SQL Injection on Melis Platform Framework
URL:https://github.com/ivansmc00/CVE-2025-10351
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-10351. SQL Injection on Melis Platform Framework
URL:https://github.com/ivansmc00/CVE-2025-10351
标签:#CVE-2025
GitHub
GitHub - ivansmc00/CVE-2025-10351: Exploit for CVE-2025-10351. SQL Injection on Melis Platform Framework
Exploit for CVE-2025-10351. SQL Injection on Melis Platform Framework - ivansmc00/CVE-2025-10351
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-10352. Admin account creation on Melis Platform Framework
URL:https://github.com/ivansmc00/CVE-2025-10352
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-10352. Admin account creation on Melis Platform Framework
URL:https://github.com/ivansmc00/CVE-2025-10352
标签:#CVE-2025
GitHub
GitHub - ivansmc00/CVE-2025-10352-POC: Exploit for CVE-2025-10352. Admin account creation on Melis Platform Framework
Exploit for CVE-2025-10352. Admin account creation on Melis Platform Framework - GitHub - ivansmc00/CVE-2025-10352-POC: Exploit for CVE-2025-10352. Admin account creation on Melis Platform Framework
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-10351. Unauthenticated File Uploa on Melis Platform Framework that leads to RCE
URL:https://github.com/ivansmc00/CVE-2025-10353
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-10351. Unauthenticated File Uploa on Melis Platform Framework that leads to RCE
URL:https://github.com/ivansmc00/CVE-2025-10353
标签:#CVE-2025
GitHub
GitHub - ivansmc00/CVE-2025-10353-POC: Exploit for CVE-2025-10353. Unauthenticated File Upload on Melis Platform Framework that…
Exploit for CVE-2025-10353. Unauthenticated File Upload on Melis Platform Framework that leads to RCE - ivansmc00/CVE-2025-10353-POC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Writeup and exploit for CVE-2025-22441: Privilege escalation from installed app to SystemUI process on Android due to pass of untrusted ApplicationInfo to LoadedApk
URL:https://github.com/michalbednarski/ResourcePoison
标签:#CVE-2025
更新了:CVE-2025
描述:Writeup and exploit for CVE-2025-22441: Privilege escalation from installed app to SystemUI process on Android due to pass of untrusted ApplicationInfo to LoadedApk
URL:https://github.com/michalbednarski/ResourcePoison
标签:#CVE-2025
GitHub
GitHub - michalbednarski/ResourcePoison: Writeup and exploit for CVE-2025-22441: Privilege escalation from installed app to SystemUI…
Writeup and exploit for CVE-2025-22441: Privilege escalation from installed app to SystemUI process on Android due to pass of untrusted ApplicationInfo to LoadedApk - michalbednarski/ResourcePoison
GitHub监控消息提醒!!!
更新了:RCE
描述:1Password Families CSV injection RCE repro—vault export lag to multi-user exec
URL:https://github.com/enzo2alive/1password-family-rce-repro
标签:#RCE
更新了:RCE
描述:1Password Families CSV injection RCE repro—vault export lag to multi-user exec
URL:https://github.com/enzo2alive/1password-family-rce-repro
标签:#RCE
GitHub
GitHub - enzo2alive/1password-family-rce-repro: 1Password Families CSV injection RCE repro—vault export lag to multi-user exec
1Password Families CSV injection RCE repro—vault export lag to multi-user exec - enzo2alive/1password-family-rce-repro
GitHub监控消息提醒!!!
更新了:RCE
描述:This script exploits a 0-day vulnerability (CVE-XXXX-XXXX) in \"Pulse Secure Connect\" devices, allowing remote code execution (RCE) with root permission.
URL:https://github.com/pedromizz/Poc-RCE-PulseSecureConnect
标签:#RCE
更新了:RCE
描述:This script exploits a 0-day vulnerability (CVE-XXXX-XXXX) in \"Pulse Secure Connect\" devices, allowing remote code execution (RCE) with root permission.
URL:https://github.com/pedromizz/Poc-RCE-PulseSecureConnect
标签:#RCE
GitHub
GitHub - pedromizz/Poc-RCE-PulseSecureConnect: This script exploits a 0-day vulnerability (CVE-XXXX-XXXX) in "Pulse Secure Connect"…
This script exploits a 0-day vulnerability (CVE-XXXX-XXXX) in "Pulse Secure Connect" devices, allowing remote code execution (RCE) with root permission. - pedromizz/Poc-RCE-PulseS...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/0xgh057r3c0n/CVE-2025-4334
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/0xgh057r3c0n/CVE-2025-4334
标签:#CVE-2025
GitHub
GitHub - 0xgh057r3c0n/CVE-2025-4334: Proof-of-concept exploit for CVE-2025-4334, a privilege escalation vulnerability in the Simple…
Proof-of-concept exploit for CVE-2025-4334, a privilege escalation vulnerability in the Simple User Registration WordPress plugin (<= 6.3), allowing unauthenticated attackers to create admin...