GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-8081 - Elementor Arbitrary File Read Vulnerability
URL:https://github.com/LyesH4ck/CVE-2025-8081-Elementor
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-8081 - Elementor Arbitrary File Read Vulnerability
URL:https://github.com/LyesH4ck/CVE-2025-8081-Elementor
标签:#CVE-2025
GitHub
GitHub - LyesH4ck/CVE-2025-8081-Elementor: PoC for CVE-2025-8081 - Elementor Arbitrary File Read Vulnerability
PoC for CVE-2025-8081 - Elementor Arbitrary File Read Vulnerability - LyesH4ck/CVE-2025-8081-Elementor
GitHub监控消息提醒!!!
更新了:RCE
描述:Fuel CMS got burned — pre-auth RCE, quick webshell, grabbed creds from the app, and popped root. TryHackMe Ignite walkthrough.
URL:https://github.com/C1ph3r404/Ignite
标签:#RCE
更新了:RCE
描述:Fuel CMS got burned — pre-auth RCE, quick webshell, grabbed creds from the app, and popped root. TryHackMe Ignite walkthrough.
URL:https://github.com/C1ph3r404/Ignite
标签:#RCE
GitHub
GitHub - C1ph3r404/Ignite: Fuel CMS got burned — pre-auth RCE, quick webshell, grabbed creds from the app, and popped root. TryHackMe…
Fuel CMS got burned — pre-auth RCE, quick webshell, grabbed creds from the app, and popped root. TryHackMe Ignite walkthrough. - C1ph3r404/Ignite
GitHub监控消息提醒!!!
更新了:绕过
描述:自备 Cookie · 全自动令牌续期 · Cloudscraper 反检测 · 绕过 Cloudflare 验证 · 原生流式转换 · Docker 一键部署
URL:https://github.com/lzA6/enginelabs-2api
标签:#绕过
更新了:绕过
描述:自备 Cookie · 全自动令牌续期 · Cloudscraper 反检测 · 绕过 Cloudflare 验证 · 原生流式转换 · Docker 一键部署
URL:https://github.com/lzA6/enginelabs-2api
标签:#绕过
GitHub
GitHub - lzA6/enginelabs-2api: 自备 Cookie · 全自动令牌续期 · Cloudscraper 反检测 · 绕过 Cloudflare 验证 · 原生流式转换 · Docker 一键部署
自备 Cookie · 全自动令牌续期 · Cloudscraper 反检测 · 绕过 Cloudflare 验证 · 原生流式转换 · Docker 一键部署 - lzA6/enginelabs-2api
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python
URL:https://github.com/dr4x-c0d3r/sudo-chroot
标签:#CVE-2025
更新了:CVE-2025
描述:Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python
URL:https://github.com/dr4x-c0d3r/sudo-chroot
标签:#CVE-2025
GitHub
GitHub - dr4x-c0d3r/sudo-chroot: Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python
Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python - dr4x-c0d3r/sudo-chroot
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python
URL:https://github.com/dr4xp/sudo-chroot
标签:#CVE-2025
更新了:CVE-2025
描述:Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python
URL:https://github.com/dr4xp/sudo-chroot
标签:#CVE-2025
GitHub
GitHub - dr4xp/sudo-chroot: Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python
Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python - dr4xp/sudo-chroot
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit about School Management System 7.1 (Authenticated RCE)
URL:https://github.com/H4zaz/CVE-2025-60500
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit about School Management System 7.1 (Authenticated RCE)
URL:https://github.com/H4zaz/CVE-2025-60500
标签:#CVE-2025
GitHub
GitHub - H4zaz/CVE-2025-60500: Exploit about School Management System 7.1 (Authenticated RCE)
Exploit about School Management System 7.1 (Authenticated RCE) - H4zaz/CVE-2025-60500
GitHub监控消息提醒!!!
更新了:RCE
描述:🚩 Glitch (TryHackMe) — API token → JS eval RCE → reverse shell → creds exfil → doas → root.
URL:https://github.com/C1ph3r404/Glitch
标签:#RCE
更新了:RCE
描述:🚩 Glitch (TryHackMe) — API token → JS eval RCE → reverse shell → creds exfil → doas → root.
URL:https://github.com/C1ph3r404/Glitch
标签:#RCE
GitHub
GitHub - C1ph3r404/Glitch: 🚩 Glitch (TryHackMe) — API token → JS eval RCE → reverse shell → creds exfil → doas → root.
🚩 Glitch (TryHackMe) — API token → JS eval RCE → reverse shell → creds exfil → doas → root. - C1ph3r404/Glitch
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-25198: automated Host header poisoning test for Mailcow - HTTPS listener, automatic cookie/CSRF handling, captures first reset link.
URL:https://github.com/Groppoxx/CVE-2025-25198-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-25198: automated Host header poisoning test for Mailcow - HTTPS listener, automatic cookie/CSRF handling, captures first reset link.
URL:https://github.com/Groppoxx/CVE-2025-25198-PoC
标签:#CVE-2025
GitHub
GitHub - Groppoxx/CVE-2025-25198-PoC: PoC for CVE-2025-25198: automated Host header poisoning test for Mailcow - HTTPS listener…
PoC for CVE-2025-25198: automated Host header poisoning test for Mailcow - HTTPS listener, automatic cookie/CSRF handling, captures first reset link. - Groppoxx/CVE-2025-25198-PoC
GitHub监控消息提醒!!!
更新了:免杀
描述:APK报毒免杀处理分发系统是一套用于对Android应用进行多重打包、签名随机化、代码混淆及加固处理的自动化系统。系统通过反编译与重编译APK技术,通过修改包名、签名、资源文件、Dex代码等元素,生成具有新特征的新APK,有效降低同一应用多次分发被识别为“病毒”或“恶意软件”的概率,从而减少被安全软件误报的风险。
URL:https://github.com/Ktz-ali/APKMraeds
标签:#免杀
更新了:免杀
描述:APK报毒免杀处理分发系统是一套用于对Android应用进行多重打包、签名随机化、代码混淆及加固处理的自动化系统。系统通过反编译与重编译APK技术,通过修改包名、签名、资源文件、Dex代码等元素,生成具有新特征的新APK,有效降低同一应用多次分发被识别为“病毒”或“恶意软件”的概率,从而减少被安全软件误报的风险。
URL:https://github.com/Ktz-ali/APKMraeds
标签:#免杀
GitHub
GitHub - Ktz-ali/APKMraeds: APK共存分发系统是一套用于对Android应用进行多重打包、签名随机化、代码混淆及加固处理的自动化系统。系统通过反编译与重编译APK技术,通过修改包名、签名、资源文件、Dex代码等元素,生成具有…
APK共存分发系统是一套用于对Android应用进行多重打包、签名随机化、代码混淆及加固处理的自动化系统。系统通过反编译与重编译APK技术,通过修改包名、签名、资源文件、Dex代码等元素,生成具有新特征的新APK,有效降低同一应用多次分发被识别为“病毒”或“恶意软件”的概率,从而减少被安全软件误报的风险。 - Ktz-ali/APKMraeds
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-27591
URL:https://github.com/krn966/CVE-2025-27591
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-27591
URL:https://github.com/krn966/CVE-2025-27591
标签:#CVE-2025
GitHub
GitHub - krn966/CVE-2025-27591: CVE-2025-27591
CVE-2025-27591. Contribute to krn966/CVE-2025-27591 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:专业级漏洞武器,攻防兼备利器。
URL:https://github.com/7huukdlnkjkjba/CVE-2025-55315-
标签:#CVE-2025
更新了:CVE-2025
描述:专业级漏洞武器,攻防兼备利器。
URL:https://github.com/7huukdlnkjkjba/CVE-2025-55315-
标签:#CVE-2025
GitHub
GitHub - 7huukdlnkjkjba/CVE-2025-55315-: 专业级HTTP请求走私漏洞利用与自动化渗透测试工具
专业级HTTP请求走私漏洞利用与自动化渗透测试工具. Contribute to 7huukdlnkjkjba/CVE-2025-55315- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:基于 C# 和 .NET 9.0 开发的多语言必应壁纸信息收集工具,支持 14 个国家/地区的本地化壁纸信息收集。
URL:https://github.com/hippieZhou/BingWallpaperGallery
标签:#信息收集
更新了:信息收集
描述:基于 C# 和 .NET 9.0 开发的多语言必应壁纸信息收集工具,支持 14 个国家/地区的本地化壁纸信息收集。
URL:https://github.com/hippieZhou/BingWallpaperGallery
标签:#信息收集
GitHub
GitHub - hippieZhou/BinggoWallpapers: Demonstrates modern WinUI 3 development with .NET 10, Fluent Design, based on MVVM architecture.
Demonstrates modern WinUI 3 development with .NET 10, Fluent Design, based on MVVM architecture. - hippieZhou/BinggoWallpapers
GitHub监控消息提醒!!!
更新了:代码审计
描述:jetbrains 编辑器代码审计插件
URL:https://github.com/RuoJi6/Code-Audit-Scanner
标签:#代码审计
更新了:代码审计
描述:jetbrains 编辑器代码审计插件
URL:https://github.com/RuoJi6/Code-Audit-Scanner
标签:#代码审计
GitHub
GitHub - RuoJi6/Code-Audit-Scanner: jetbrains 编辑器代码审计插件,适配:phpStorm,webStorm,rider,IntelliJ IDEA,pyCharm
jetbrains 编辑器代码审计插件,适配:phpStorm,webStorm,rider,IntelliJ IDEA,pyCharm - RuoJi6/Code-Audit-Scanner
GitHub监控消息提醒!!!
更新了:RCE
描述:Proof-of-Concept (POC) of a simple firewall in Python designed to mitigate the Spring4Shell (CVE-2022-22965) RCE attack by inspecting and blocking malicious request bodies.
URL:https://github.com/NickoPS87/Spring4Shell-Python-Firewall-POC
标签:#RCE
更新了:RCE
描述:Proof-of-Concept (POC) of a simple firewall in Python designed to mitigate the Spring4Shell (CVE-2022-22965) RCE attack by inspecting and blocking malicious request bodies.
URL:https://github.com/NickoPS87/Spring4Shell-Python-Firewall-POC
标签:#RCE
GitHub
GitHub - NickoPS87/Spring4Shell-Python-Firewall-POC: Proof-of-Concept (POC) of a simple firewall in Python designed to mitigate…
Proof-of-Concept (POC) of a simple firewall in Python designed to mitigate the Spring4Shell (CVE-2022-22965) RCE attack by inspecting and blocking malicious request bodies. - NickoPS87/Spring4Shell...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:These is a PoC for the CVE-2025-32433 vulnerability, do NOT test on systems that you dont own!!!
URL:https://github.com/Batman529/PoC-CVE-2025-32433
标签:#CVE-2025
更新了:CVE-2025
描述:These is a PoC for the CVE-2025-32433 vulnerability, do NOT test on systems that you dont own!!!
URL:https://github.com/Batman529/PoC-CVE-2025-32433
标签:#CVE-2025
GitHub
GitHub - Batman529/PoC-CVE-2025-32433: These is a PoC for the CVE-2025-32433 vulnerability, do NOT test on systems that you dont…
These is a PoC for the CVE-2025-32433 vulnerability, do NOT test on systems that you dont own!!! - Batman529/PoC-CVE-2025-32433
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-39965
URL:https://github.com/Shreyas-Penkar/CVE-2025-39965
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-39965
URL:https://github.com/Shreyas-Penkar/CVE-2025-39965
标签:#CVE-2025
GitHub
GitHub - Shreyas-Penkar/CVE-2025-39965: PoC for CVE-2025-39965
PoC for CVE-2025-39965. Contribute to Shreyas-Penkar/CVE-2025-39965 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-10230 - Samba WINS hook command injection
URL:https://github.com/dptsec/CVE-2025-10230
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-10230 - Samba WINS hook command injection
URL:https://github.com/dptsec/CVE-2025-10230
标签:#CVE-2025
GitHub
GitHub - dptsec/CVE-2025-10230: PoC for CVE-2025-10230 - Samba WINS hook command injection
PoC for CVE-2025-10230 - Samba WINS hook command injection - dptsec/CVE-2025-10230
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for CVE-2025-11579
URL:https://github.com/shinigami-777/PoC_CVE-2025-11579
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for CVE-2025-11579
URL:https://github.com/shinigami-777/PoC_CVE-2025-11579
标签:#CVE-2025
GitHub
GitHub - shinigami-777/PoC_CVE-2025-11579: Proof of Concept for CVE-2025-11579
Proof of Concept for CVE-2025-11579. Contribute to shinigami-777/PoC_CVE-2025-11579 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:\"Анализ уязвимостей RCE и LPE 2022-2025\"
URL:https://github.com/akondratova895-prog/sours
标签:#RCE
更新了:RCE
描述:\"Анализ уязвимостей RCE и LPE 2022-2025\"
URL:https://github.com/akondratova895-prog/sours
标签:#RCE
GitHub监控消息提醒!!!
更新了:渗透测试
描述:**wepoc**是一个基于 Wails v2 框架开发的 Nuclei 漏洞扫描器图形界面工具。它提供了友好的 GUI 界面来管理 Nuclei POC 模板、创建扫描任务并查看扫描结果,让安全研究人员和渗透测试人员能够更高效地使用 Nuclei 进行漏洞扫描。
URL:https://github.com/cyber0s/wepoc
标签:#渗透测试
更新了:渗透测试
描述:**wepoc**是一个基于 Wails v2 框架开发的 Nuclei 漏洞扫描器图形界面工具。它提供了友好的 GUI 界面来管理 Nuclei POC 模板、创建扫描任务并查看扫描结果,让安全研究人员和渗透测试人员能够更高效地使用 Nuclei 进行漏洞扫描。
URL:https://github.com/cyber0s/wepoc
标签:#渗透测试
GitHub
GitHub - cyber0s/wepoc: wepoc是一个基于 Nuclei 漏洞扫描器图形界面工具。提供GUI 界面来管理 Nuclei POC 模板、创建扫描任务并查看扫描结果,让安全研究人员和渗透测试人员能够更高效地使用 Nuclei 进行漏洞扫描。
wepoc是一个基于 Nuclei 漏洞扫描器图形界面工具。提供GUI 界面来管理 Nuclei POC 模板、创建扫描任务并查看扫描结果,让安全研究人员和渗透测试人员能够更高效地使用 Nuclei 进行漏洞扫描。 - cyber0s/wepoc