GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Writeup and exploit for CVE-2025-22441: Privilege escalation from installed app to SystemUI process on Android due to pass of untrusted ApplicationInfo to LoadedApk
URL:https://github.com/michalbednarski/ResourcePoison
标签:#CVE-2025
更新了:CVE-2025
描述:Writeup and exploit for CVE-2025-22441: Privilege escalation from installed app to SystemUI process on Android due to pass of untrusted ApplicationInfo to LoadedApk
URL:https://github.com/michalbednarski/ResourcePoison
标签:#CVE-2025
GitHub
GitHub - michalbednarski/ResourcePoison: Writeup and exploit for CVE-2025-22441: Privilege escalation from installed app to SystemUI…
Writeup and exploit for CVE-2025-22441: Privilege escalation from installed app to SystemUI process on Android due to pass of untrusted ApplicationInfo to LoadedApk - michalbednarski/ResourcePoison
GitHub监控消息提醒!!!
更新了:RCE
描述:1Password Families CSV injection RCE repro—vault export lag to multi-user exec
URL:https://github.com/enzo2alive/1password-family-rce-repro
标签:#RCE
更新了:RCE
描述:1Password Families CSV injection RCE repro—vault export lag to multi-user exec
URL:https://github.com/enzo2alive/1password-family-rce-repro
标签:#RCE
GitHub
GitHub - enzo2alive/1password-family-rce-repro: 1Password Families CSV injection RCE repro—vault export lag to multi-user exec
1Password Families CSV injection RCE repro—vault export lag to multi-user exec - enzo2alive/1password-family-rce-repro
GitHub监控消息提醒!!!
更新了:RCE
描述:This script exploits a 0-day vulnerability (CVE-XXXX-XXXX) in \"Pulse Secure Connect\" devices, allowing remote code execution (RCE) with root permission.
URL:https://github.com/pedromizz/Poc-RCE-PulseSecureConnect
标签:#RCE
更新了:RCE
描述:This script exploits a 0-day vulnerability (CVE-XXXX-XXXX) in \"Pulse Secure Connect\" devices, allowing remote code execution (RCE) with root permission.
URL:https://github.com/pedromizz/Poc-RCE-PulseSecureConnect
标签:#RCE
GitHub
GitHub - pedromizz/Poc-RCE-PulseSecureConnect: This script exploits a 0-day vulnerability (CVE-XXXX-XXXX) in "Pulse Secure Connect"…
This script exploits a 0-day vulnerability (CVE-XXXX-XXXX) in "Pulse Secure Connect" devices, allowing remote code execution (RCE) with root permission. - pedromizz/Poc-RCE-PulseS...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/0xgh057r3c0n/CVE-2025-4334
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/0xgh057r3c0n/CVE-2025-4334
标签:#CVE-2025
GitHub
GitHub - 0xgh057r3c0n/CVE-2025-4334: Proof-of-concept exploit for CVE-2025-4334, a privilege escalation vulnerability in the Simple…
Proof-of-concept exploit for CVE-2025-4334, a privilege escalation vulnerability in the Simple User Registration WordPress plugin (<= 6.3), allowing unauthenticated attackers to create admin...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-10351. SQL Injection on Melis Platform Framework
URL:https://github.com/ivansmc00/CVE-2025-10351-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-10351. SQL Injection on Melis Platform Framework
URL:https://github.com/ivansmc00/CVE-2025-10351-POC
标签:#CVE-2025
GitHub
GitHub - ivansmc00/CVE-2025-10351-POC: Exploit for CVE-2025-10351. SQL Injection on Melis Platform Framework
Exploit for CVE-2025-10351. SQL Injection on Melis Platform Framework - ivansmc00/CVE-2025-10351-POC
GitHub监控消息提醒!!!
更新了:RCE
描述:Exploit for CVE-2025-10353. Unauthenticated File Upload on Melis Platform Framework that leads to RCE
URL:https://github.com/ivansmc00/CVE-2025-10353-POC
标签:#RCE
更新了:RCE
描述:Exploit for CVE-2025-10353. Unauthenticated File Upload on Melis Platform Framework that leads to RCE
URL:https://github.com/ivansmc00/CVE-2025-10353-POC
标签:#RCE
GitHub
GitHub - ivansmc00/CVE-2025-10353-POC: Exploit for CVE-2025-10353. Unauthenticated File Upload on Melis Platform Framework that…
Exploit for CVE-2025-10353. Unauthenticated File Upload on Melis Platform Framework that leads to RCE - ivansmc00/CVE-2025-10353-POC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Example Vulnerable application for CVE-2025–57833
URL:https://github.com/ianoboyle/CVE-2025-57833
标签:#CVE-2025
更新了:CVE-2025
描述:Example Vulnerable application for CVE-2025–57833
URL:https://github.com/ianoboyle/CVE-2025-57833
标签:#CVE-2025
GitHub
GitHub - ianoboyle/CVE-2025-57833: Example Vulnerable application for CVE-2025–57833
Example Vulnerable application for CVE-2025–57833. Contribute to ianoboyle/CVE-2025-57833 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:⚠️ Patch CVE-2025-10585 now to fix a critical type-confusion vulnerability in Chrome’s V8 engine, preventing active exploitation in the wild.
URL:https://github.com/samus4vic/CVE-2025-10585-The-Chrome-V8-Zero-Day
标签:#CVE-2025
更新了:CVE-2025
描述:⚠️ Patch CVE-2025-10585 now to fix a critical type-confusion vulnerability in Chrome’s V8 engine, preventing active exploitation in the wild.
URL:https://github.com/samus4vic/CVE-2025-10585-The-Chrome-V8-Zero-Day
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Enviroment and Nuclei template to test CVE-2025-32463
URL:https://github.com/ricardomaia/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:Enviroment and Nuclei template to test CVE-2025-32463
URL:https://github.com/ricardomaia/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - ricardomaia/CVE-2025-32463: Enviroment and Nuclei template to test CVE-2025-32463
Enviroment and Nuclei template to test CVE-2025-32463 - ricardomaia/CVE-2025-32463
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A powerful Redis exploitation tool that leverages CVE-2025-4984
URL:https://github.com/Yuri08loveElaina/CVE-2025-49844
标签:#CVE-2025
更新了:CVE-2025
描述:A powerful Redis exploitation tool that leverages CVE-2025-4984
URL:https://github.com/Yuri08loveElaina/CVE-2025-49844
标签:#CVE-2025
GitHub
GitHub - Yuri08loveElaina/CVE-2025-49844: A powerful Redis exploitation tool that leverages CVE-2025-4984
A powerful Redis exploitation tool that leverages CVE-2025-4984 - Yuri08loveElaina/CVE-2025-49844
GitHub监控消息提醒!!!
更新了:RCE
描述:Node.js deserialization RCE
URL:https://github.com/GVJGUKVK/Node.js-deserialization-RCE
标签:#RCE
更新了:RCE
描述:Node.js deserialization RCE
URL:https://github.com/GVJGUKVK/Node.js-deserialization-RCE
标签:#RCE
GitHub
GitHub - GVJGUKVK/Node.js-deserialization-RCE: Node.js deserialization RCE
Node.js deserialization RCE. Contribute to GVJGUKVK/Node.js-deserialization-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49844 POC
URL:https://github.com/YuanBenSir/CVE-2025-49844_POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49844 POC
URL:https://github.com/YuanBenSir/CVE-2025-49844_POC
标签:#CVE-2025
GitHub
GitHub - MiclelsonCN/CVE-2025-49844_POC: CVE-2025-49844 POC
CVE-2025-49844 POC . Contribute to MiclelsonCN/CVE-2025-49844_POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:Fenrir零日漏洞挖掘平台 - AI驱动的先进代码审计工具,集成两阶段检测算法、多AI提供商支持、MCP协议和IDE集成
URL:https://github.com/martindewey/Fenrir-ZeroDay-Platform
标签:#代码审计
更新了:代码审计
描述:Fenrir零日漏洞挖掘平台 - AI驱动的先进代码审计工具,集成两阶段检测算法、多AI提供商支持、MCP协议和IDE集成
URL:https://github.com/martindewey/Fenrir-ZeroDay-Platform
标签:#代码审计
GitHub
GitHub - martindewey/Fenrir-ZeroDay-Platform: Fenrir零日漏洞挖掘平台 - AI驱动的先进代码审计工具,集成两阶段检测算法、多AI提供商支持、MCP协议和IDE集成
Fenrir零日漏洞挖掘平台 - AI驱动的先进代码审计工具,集成两阶段检测算法、多AI提供商支持、MCP协议和IDE集成 - martindewey/Fenrir-ZeroDay-Platform
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:OSS存储桶的漏洞扫描工具,目前支持阿里云、腾讯云、华为云、aws
URL:https://github.com/bitboy-sys/OSS_scanner
标签:#漏洞扫描
更新了:漏洞扫描
描述:OSS存储桶的漏洞扫描工具,目前支持阿里云、腾讯云、华为云、aws
URL:https://github.com/bitboy-sys/OSS_scanner
标签:#漏洞扫描
GitHub
GitHub - bitboy-sys/OSS_scanner: OSS存储桶的漏洞扫描工具,目前支持阿里云、腾讯云、华为云、aws
OSS存储桶的漏洞扫描工具,目前支持阿里云、腾讯云、华为云、aws. Contribute to bitboy-sys/OSS_scanner development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-60375 — Authentication bypass / incorrect access control in PerfexCRM < 3.3.1 (admin login)
URL:https://github.com/AhamedYaseen03/CVE-2025-60375
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-60375 — Authentication bypass / incorrect access control in PerfexCRM < 3.3.1 (admin login)
URL:https://github.com/AhamedYaseen03/CVE-2025-60375
标签:#CVE-2025
GitHub
GitHub - AhamedYaseen03/CVE-2025-60375: CVE-2025-60375 — Authentication bypass / incorrect access control in PerfexCRM < 3.3.1…
CVE-2025-60375 — Authentication bypass / incorrect access control in PerfexCRM < 3.3.1 (admin login) - AhamedYaseen03/CVE-2025-60375
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55903 — Stored HTML Injection in PerfexCRM < 3.3.1 (Invoice/Client Communication)
URL:https://github.com/ajansha/CVE-2025-55903
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55903 — Stored HTML Injection in PerfexCRM < 3.3.1 (Invoice/Client Communication)
URL:https://github.com/ajansha/CVE-2025-55903
标签:#CVE-2025
GitHub
GitHub - ajansha/CVE-2025-55903: CVE-2025-55903 — Stored HTML Injection in PerfexCRM < 3.3.1 (Invoice/Client Communication)
CVE-2025-55903 — Stored HTML Injection in PerfexCRM < 3.3.1 (Invoice/Client Communication) - ajansha/CVE-2025-55903
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-60880 - Stored Cross-Site Scripting (XSS) in Bagisto Admin Panel
URL:https://github.com/Shenal01/CVE-2025-60880
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-60880 - Stored Cross-Site Scripting (XSS) in Bagisto Admin Panel
URL:https://github.com/Shenal01/CVE-2025-60880
标签:#CVE-2025
GitHub
GitHub - Shenal01/CVE-2025-60880: CVE-2025-60880 - Stored Cross-Site Scripting (XSS) in Bagisto Admin Panel
CVE-2025-60880 - Stored Cross-Site Scripting (XSS) in Bagisto Admin Panel - Shenal01/CVE-2025-60880
GitHub监控消息提醒!!!
更新了:渗透测试
描述:毕设项目-基于大模型辅助的智能化Web渗透测试工具
URL:https://github.com/D3ic1de/AI_Web_Attacker
标签:#渗透测试
更新了:渗透测试
描述:毕设项目-基于大模型辅助的智能化Web渗透测试工具
URL:https://github.com/D3ic1de/AI_Web_Attacker
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:代码审计
描述:高性能AI驱动代码审计工具 - 集成多源安全知识库,实现两阶段检测算法
URL:https://github.com/martindewey/Fenrir-CodeAuditTool
标签:#代码审计
更新了:代码审计
描述:高性能AI驱动代码审计工具 - 集成多源安全知识库,实现两阶段检测算法
URL:https://github.com/martindewey/Fenrir-CodeAuditTool
标签:#代码审计