GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Simple script to add a new, unrestricted user on devices with Family Link by abusing CVE-2025-32324 (pre September patch)
URL:https://github.com/rifting/UnrestrictedUserCreator
标签:#CVE-2025
更新了:CVE-2025
描述:Simple script to add a new, unrestricted user on devices with Family Link by abusing CVE-2025-32324 (pre September patch)
URL:https://github.com/rifting/UnrestrictedUserCreator
标签:#CVE-2025
GitHub
GitHub - rifting/UnrestrictedUserCreator: Simple script to add a new, unrestricted user on devices with Family Link by abusing…
Simple script to add a new, unrestricted user on devices with Family Link by abusing CVE-2025-32324 (pre September patch) - rifting/UnrestrictedUserCreator
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088-BUILDER
URL:https://github.com/aldisakti2/CVE-2025-8088-BUILDER-Winrar-Tool
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088-BUILDER
URL:https://github.com/aldisakti2/CVE-2025-8088-BUILDER-Winrar-Tool
标签:#CVE-2025
GitHub
GitHub - aldisakti2/CVE-2025-8088-BUILDER-Winrar-Tool: CVE-2025-8088-BUILDER
CVE-2025-8088-BUILDER. Contribute to aldisakti2/CVE-2025-8088-BUILDER-Winrar-Tool development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-60751
URL:https://github.com/zer0matt/CVE-2025-60751
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-60751
URL:https://github.com/zer0matt/CVE-2025-60751
标签:#CVE-2025
GitHub
GitHub - zer0matt/CVE-2025-60751: PoC of CVE-2025-60751
PoC of CVE-2025-60751. Contribute to zer0matt/CVE-2025-60751 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:Go 库提供了增强的基本类型(Bool、Int、Float),支持从字符串形式的 JSON/YAML 反序列化到相应的基本类型
URL:https://github.com/Geassgo/go-strval
标签:#反序列化
更新了:反序列化
描述:Go 库提供了增强的基本类型(Bool、Int、Float),支持从字符串形式的 JSON/YAML 反序列化到相应的基本类型
URL:https://github.com/Geassgo/go-strval
标签:#反序列化
GitHub
GitHub - Geassgo/go-strval: Go 库提供了增强的基本类型(Bool、Int、Float),支持从字符串形式的 JSON/YAML 反序列化到相应的基本类型
Go 库提供了增强的基本类型(Bool、Int、Float),支持从字符串形式的 JSON/YAML 反序列化到相应的基本类型 - Geassgo/go-strval
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-60752
URL:https://github.com/zer0matt/CVE-2025-60752
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-60752
URL:https://github.com/zer0matt/CVE-2025-60752
标签:#CVE-2025
GitHub
GitHub - zer0matt/CVE-2025-60752: PoC of CVE-2025-60752
PoC of CVE-2025-60752. Contribute to zer0matt/CVE-2025-60752 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-11371 PoC, credit goes to Huntress, https://www.huntress.com/blog/gladinet-centrestack-triofox-local-file-inclusion-flaw
URL:https://github.com/lap1nou/CVE-2025-11371
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-11371 PoC, credit goes to Huntress, https://www.huntress.com/blog/gladinet-centrestack-triofox-local-file-inclusion-flaw
URL:https://github.com/lap1nou/CVE-2025-11371
标签:#CVE-2025
Huntress
Active Exploitation of Gladinet CentreStack and Triofox | Huntress
Huntress has observed in-the-wild exploitation of a Local File Inclusion vulnerability in Gladinet CentreStack and Triofox products.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-8081 - Elementor Arbitrary File Read Vulnerability
URL:https://github.com/LyesH4ck/CVE-2025-8081-Elementor
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-8081 - Elementor Arbitrary File Read Vulnerability
URL:https://github.com/LyesH4ck/CVE-2025-8081-Elementor
标签:#CVE-2025
GitHub
GitHub - LyesH4ck/CVE-2025-8081-Elementor: PoC for CVE-2025-8081 - Elementor Arbitrary File Read Vulnerability
PoC for CVE-2025-8081 - Elementor Arbitrary File Read Vulnerability - LyesH4ck/CVE-2025-8081-Elementor
GitHub监控消息提醒!!!
更新了:RCE
描述:Fuel CMS got burned — pre-auth RCE, quick webshell, grabbed creds from the app, and popped root. TryHackMe Ignite walkthrough.
URL:https://github.com/C1ph3r404/Ignite
标签:#RCE
更新了:RCE
描述:Fuel CMS got burned — pre-auth RCE, quick webshell, grabbed creds from the app, and popped root. TryHackMe Ignite walkthrough.
URL:https://github.com/C1ph3r404/Ignite
标签:#RCE
GitHub
GitHub - C1ph3r404/Ignite: Fuel CMS got burned — pre-auth RCE, quick webshell, grabbed creds from the app, and popped root. TryHackMe…
Fuel CMS got burned — pre-auth RCE, quick webshell, grabbed creds from the app, and popped root. TryHackMe Ignite walkthrough. - C1ph3r404/Ignite
GitHub监控消息提醒!!!
更新了:绕过
描述:自备 Cookie · 全自动令牌续期 · Cloudscraper 反检测 · 绕过 Cloudflare 验证 · 原生流式转换 · Docker 一键部署
URL:https://github.com/lzA6/enginelabs-2api
标签:#绕过
更新了:绕过
描述:自备 Cookie · 全自动令牌续期 · Cloudscraper 反检测 · 绕过 Cloudflare 验证 · 原生流式转换 · Docker 一键部署
URL:https://github.com/lzA6/enginelabs-2api
标签:#绕过
GitHub
GitHub - lzA6/enginelabs-2api: 自备 Cookie · 全自动令牌续期 · Cloudscraper 反检测 · 绕过 Cloudflare 验证 · 原生流式转换 · Docker 一键部署
自备 Cookie · 全自动令牌续期 · Cloudscraper 反检测 · 绕过 Cloudflare 验证 · 原生流式转换 · Docker 一键部署 - lzA6/enginelabs-2api
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python
URL:https://github.com/dr4x-c0d3r/sudo-chroot
标签:#CVE-2025
更新了:CVE-2025
描述:Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python
URL:https://github.com/dr4x-c0d3r/sudo-chroot
标签:#CVE-2025
GitHub
GitHub - dr4x-c0d3r/sudo-chroot: Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python
Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python - dr4x-c0d3r/sudo-chroot
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python
URL:https://github.com/dr4xp/sudo-chroot
标签:#CVE-2025
更新了:CVE-2025
描述:Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python
URL:https://github.com/dr4xp/sudo-chroot
标签:#CVE-2025
GitHub
GitHub - dr4xp/sudo-chroot: Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python
Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python - dr4xp/sudo-chroot
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit about School Management System 7.1 (Authenticated RCE)
URL:https://github.com/H4zaz/CVE-2025-60500
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit about School Management System 7.1 (Authenticated RCE)
URL:https://github.com/H4zaz/CVE-2025-60500
标签:#CVE-2025
GitHub
GitHub - H4zaz/CVE-2025-60500: Exploit about School Management System 7.1 (Authenticated RCE)
Exploit about School Management System 7.1 (Authenticated RCE) - H4zaz/CVE-2025-60500
GitHub监控消息提醒!!!
更新了:RCE
描述:🚩 Glitch (TryHackMe) — API token → JS eval RCE → reverse shell → creds exfil → doas → root.
URL:https://github.com/C1ph3r404/Glitch
标签:#RCE
更新了:RCE
描述:🚩 Glitch (TryHackMe) — API token → JS eval RCE → reverse shell → creds exfil → doas → root.
URL:https://github.com/C1ph3r404/Glitch
标签:#RCE
GitHub
GitHub - C1ph3r404/Glitch: 🚩 Glitch (TryHackMe) — API token → JS eval RCE → reverse shell → creds exfil → doas → root.
🚩 Glitch (TryHackMe) — API token → JS eval RCE → reverse shell → creds exfil → doas → root. - C1ph3r404/Glitch
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-25198: automated Host header poisoning test for Mailcow - HTTPS listener, automatic cookie/CSRF handling, captures first reset link.
URL:https://github.com/Groppoxx/CVE-2025-25198-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-25198: automated Host header poisoning test for Mailcow - HTTPS listener, automatic cookie/CSRF handling, captures first reset link.
URL:https://github.com/Groppoxx/CVE-2025-25198-PoC
标签:#CVE-2025
GitHub
GitHub - Groppoxx/CVE-2025-25198-PoC: PoC for CVE-2025-25198: automated Host header poisoning test for Mailcow - HTTPS listener…
PoC for CVE-2025-25198: automated Host header poisoning test for Mailcow - HTTPS listener, automatic cookie/CSRF handling, captures first reset link. - Groppoxx/CVE-2025-25198-PoC
GitHub监控消息提醒!!!
更新了:免杀
描述:APK报毒免杀处理分发系统是一套用于对Android应用进行多重打包、签名随机化、代码混淆及加固处理的自动化系统。系统通过反编译与重编译APK技术,通过修改包名、签名、资源文件、Dex代码等元素,生成具有新特征的新APK,有效降低同一应用多次分发被识别为“病毒”或“恶意软件”的概率,从而减少被安全软件误报的风险。
URL:https://github.com/Ktz-ali/APKMraeds
标签:#免杀
更新了:免杀
描述:APK报毒免杀处理分发系统是一套用于对Android应用进行多重打包、签名随机化、代码混淆及加固处理的自动化系统。系统通过反编译与重编译APK技术,通过修改包名、签名、资源文件、Dex代码等元素,生成具有新特征的新APK,有效降低同一应用多次分发被识别为“病毒”或“恶意软件”的概率,从而减少被安全软件误报的风险。
URL:https://github.com/Ktz-ali/APKMraeds
标签:#免杀
GitHub
GitHub - Ktz-ali/APKMraeds: APK共存分发系统是一套用于对Android应用进行多重打包、签名随机化、代码混淆及加固处理的自动化系统。系统通过反编译与重编译APK技术,通过修改包名、签名、资源文件、Dex代码等元素,生成具有…
APK共存分发系统是一套用于对Android应用进行多重打包、签名随机化、代码混淆及加固处理的自动化系统。系统通过反编译与重编译APK技术,通过修改包名、签名、资源文件、Dex代码等元素,生成具有新特征的新APK,有效降低同一应用多次分发被识别为“病毒”或“恶意软件”的概率,从而减少被安全软件误报的风险。 - Ktz-ali/APKMraeds
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-27591
URL:https://github.com/krn966/CVE-2025-27591
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-27591
URL:https://github.com/krn966/CVE-2025-27591
标签:#CVE-2025
GitHub
GitHub - krn966/CVE-2025-27591: CVE-2025-27591
CVE-2025-27591. Contribute to krn966/CVE-2025-27591 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:专业级漏洞武器,攻防兼备利器。
URL:https://github.com/7huukdlnkjkjba/CVE-2025-55315-
标签:#CVE-2025
更新了:CVE-2025
描述:专业级漏洞武器,攻防兼备利器。
URL:https://github.com/7huukdlnkjkjba/CVE-2025-55315-
标签:#CVE-2025
GitHub
GitHub - 7huukdlnkjkjba/CVE-2025-55315-: 专业级HTTP请求走私漏洞利用与自动化渗透测试工具
专业级HTTP请求走私漏洞利用与自动化渗透测试工具. Contribute to 7huukdlnkjkjba/CVE-2025-55315- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:基于 C# 和 .NET 9.0 开发的多语言必应壁纸信息收集工具,支持 14 个国家/地区的本地化壁纸信息收集。
URL:https://github.com/hippieZhou/BingWallpaperGallery
标签:#信息收集
更新了:信息收集
描述:基于 C# 和 .NET 9.0 开发的多语言必应壁纸信息收集工具,支持 14 个国家/地区的本地化壁纸信息收集。
URL:https://github.com/hippieZhou/BingWallpaperGallery
标签:#信息收集
GitHub
GitHub - hippieZhou/BinggoWallpapers: Demonstrates modern WinUI 3 development with .NET 10, Fluent Design, based on MVVM architecture.
Demonstrates modern WinUI 3 development with .NET 10, Fluent Design, based on MVVM architecture. - hippieZhou/BinggoWallpapers