GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike Beacon Object File to enumerate Windows system drivers via WMI
URL:https://github.com/0x73/CS-DriverQuery-BOF
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike Beacon Object File to enumerate Windows system drivers via WMI
URL:https://github.com/0x73/CS-DriverQuery-BOF
标签:#Cobalt Strike
GitHub
GitHub - 0x73/CS-DriverQuery-BOF: Cobalt Strike Beacon Object File to enumerate Windows system drivers via WMI
Cobalt Strike Beacon Object File to enumerate Windows system drivers via WMI - 0x73/CS-DriverQuery-BOF
GitHub监控消息提醒!!!
更新了:RCE
描述:RCEX is a lightweight C encryption library inspired by the classic RC4 stream cipher.
URL:https://github.com/BHARAT-200/RCEX
标签:#RCE
更新了:RCE
描述:RCEX is a lightweight C encryption library inspired by the classic RC4 stream cipher.
URL:https://github.com/BHARAT-200/RCEX
标签:#RCE
GitHub
BHARAT-200/RCEX
RCEX is a lightweight C encryption library inspired by the classic RC4 stream cipher. - BHARAT-200/RCEX
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Smarttfoxx/CVE-2025-60791
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Smarttfoxx/CVE-2025-60791
标签:#CVE-2025
GitHub
GitHub - Smarttfoxx/CVE-2025-60791: Easywork Enterprise 2.1.3.354 is vulnerable to Cleartext Storage of Sensitive Information in…
Easywork Enterprise 2.1.3.354 is vulnerable to Cleartext Storage of Sensitive Information in Memory. The application leaves valid device-bound license keys in process memory after a failed activati...
GitHub监控消息提醒!!!
更新了:绕过
描述:告别谷歌?Perplexity AI的Comet浏览器登陆印度——附绕过142英镑费用的秘密方法
URL:https://github.com/qmxec02/comet-india-analysis
标签:#绕过
更新了:绕过
描述:告别谷歌?Perplexity AI的Comet浏览器登陆印度——附绕过142英镑费用的秘密方法
URL:https://github.com/qmxec02/comet-india-analysis
标签:#绕过
GitHub
GitHub - qmxec02/comet-india-analysis: 告别谷歌?Perplexity AI的Comet浏览器登陆印度——附绕过142英镑费用的秘密方法
告别谷歌?Perplexity AI的Comet浏览器登陆印度——附绕过142英镑费用的秘密方法. Contribute to qmxec02/comet-india-analysis development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-62506
URL:https://github.com/yoshino-s/CVE-2025-62506
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-62506
URL:https://github.com/yoshino-s/CVE-2025-62506
标签:#CVE-2025
GitHub
GitHub - yoshino-s/CVE-2025-62506: Exploit for CVE-2025-62506
Exploit for CVE-2025-62506. Contribute to yoshino-s/CVE-2025-62506 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:收集本人自接触渗透测试用于漏洞验证的所有热门CVE、POC、CNVD攻击有效载荷+测试工具+FUZZ,一个仓库满足许多攻击测试场景,开箱即用.
URL:https://github.com/wjl110/CVE-Master
标签:#渗透测试
更新了:渗透测试
描述:收集本人自接触渗透测试用于漏洞验证的所有热门CVE、POC、CNVD攻击有效载荷+测试工具+FUZZ,一个仓库满足许多攻击测试场景,开箱即用.
URL:https://github.com/wjl110/CVE-Master
标签:#渗透测试
GitHub
GitHub - wjl110/CVE-Master: 收集本人自接触渗透测试用于漏洞验证的所有热门CVE、POC、CNVD攻击有效载荷+测试工具+FUZZ,一个仓库满足许多攻击测试场景,开箱即用.
收集本人自接触渗透测试用于漏洞验证的所有热门CVE、POC、CNVD攻击有效载荷+测试工具+FUZZ,一个仓库满足许多攻击测试场景,开箱即用. - wjl110/CVE-Master
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-61984
URL:https://github.com/flyskyfire/cve-2025-61984-poc
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-61984
URL:https://github.com/flyskyfire/cve-2025-61984-poc
标签:#CVE-2025
GitHub
GitHub - flyskyfire/cve-2025-61984-poc: PoC for CVE-2025-61984
PoC for CVE-2025-61984. Contribute to flyskyfire/cve-2025-61984-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:a technique to write JSP webshells via the groovy script console if you can't find where the application uploads files to, Check out the detailed guide here: https://vipa0z.github.io
URL:https://github.com/vipa0z/Groovy-bind-shell
标签:#RCE
更新了:RCE
描述:a technique to write JSP webshells via the groovy script console if you can't find where the application uploads files to, Check out the detailed guide here: https://vipa0z.github.io
URL:https://github.com/vipa0z/Groovy-bind-shell
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:a technique to write JSP webshells via the groovy script console if you can't find where the application uploads files to, Check out the detailed guide here: https://vipa0z.github.io
URL:https://github.com/vipa0z/jenkins-liferay--stable-bind-shell
标签:#RCE
更新了:RCE
描述:a technique to write JSP webshells via the groovy script console if you can't find where the application uploads files to, Check out the detailed guide here: https://vipa0z.github.io
URL:https://github.com/vipa0z/jenkins-liferay--stable-bind-shell
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-61882: Oracle E-Business Suite RCE Scanner and Exploit
URL:https://github.com/godnish/CVE-2025-61882
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-61882: Oracle E-Business Suite RCE Scanner and Exploit
URL:https://github.com/godnish/CVE-2025-61882
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:红蓝对抗
描述:红蓝对抗三维演练
URL:https://github.com/wangqiang-store/three-control-RedvsBlue
标签:#红蓝对抗
更新了:红蓝对抗
描述:红蓝对抗三维演练
URL:https://github.com/wangqiang-store/three-control-RedvsBlue
标签:#红蓝对抗
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Xeno RAT Server 中文汉化版 Xeno-RAT 是用 C# 开发的开源远程访问工具 (RAT),为远程系统管理提供了一套全面的功能。具有 HVNC、实时麦克风、反向代理等功能!适用于安全研究和渗透测试, 使用者必须严格遵守合规要求,禁止用于非法用途。远控|Red Team|钓鱼|提权|红队|信息收集|内供免杀版
URL:https://github.com/SecNN/Xeno-RAT-Server
标签:#渗透测试
更新了:渗透测试
描述:Xeno RAT Server 中文汉化版 Xeno-RAT 是用 C# 开发的开源远程访问工具 (RAT),为远程系统管理提供了一套全面的功能。具有 HVNC、实时麦克风、反向代理等功能!适用于安全研究和渗透测试, 使用者必须严格遵守合规要求,禁止用于非法用途。远控|Red Team|钓鱼|提权|红队|信息收集|内供免杀版
URL:https://github.com/SecNN/Xeno-RAT-Server
标签:#渗透测试
GitHub
GitHub - SecNN/Xeno-RAT-Server: Xeno RAT Server 中文汉化版 Xeno-RAT 是用 C# 开发的开源远程访问工具 (RAT),为远程系统管理提供了一套全面的功能。具有 HVNC、实时麦克风、反向代理等功能!适用于安全研究和渗透测试,…
Xeno RAT Server 中文汉化版 Xeno-RAT 是用 C# 开发的开源远程访问工具 (RAT),为远程系统管理提供了一套全面的功能。具有 HVNC、实时麦克风、反向代理等功能!适用于安全研究和渗透测试, 使用者必须严格遵守合规要求,禁止用于非法用途。远控|Red Team|钓鱼|提权|红队|信息收集|内供免杀版 - SecNN/Xeno-RAT-Server
GitHub监控消息提醒!!!
更新了:RCE
描述:Vulnerable API with prototype pollution and RCE
URL:https://github.com/fredrik-stigsson/prototype-pollution-rce-api
标签:#RCE
更新了:RCE
描述:Vulnerable API with prototype pollution and RCE
URL:https://github.com/fredrik-stigsson/prototype-pollution-rce-api
标签:#RCE
GitHub
GitHub - fredrik-stigsson/prototype-pollution-rce-api: Vulnerable API with prototype pollution and RCE
Vulnerable API with prototype pollution and RCE. Contribute to fredrik-stigsson/prototype-pollution-rce-api development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Theethat-Thamwasin/CVE-2025-56399
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Theethat-Thamwasin/CVE-2025-56399
标签:#CVE-2025
GitHub
GitHub - Theethat-Thamwasin/CVE-2025-56399: An authenticated Remote Code Execution (RCE) vulnerability in laravel-file-manager…
An authenticated Remote Code Execution (RCE) vulnerability in laravel-file-manager v3.3.1 and below allows attackers with access to the file manager interface to execute arbitrary code on the serve...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认参数与装饰器),攻击者可把恶意载荷放在参数默认值或装饰器里,借此在服务器上下文中执行任意语句(反弹 shell、下载器、横向移动等)
URL:https://github.com/bambooqj/cve-2025-3248
标签:#CVE-2025
更新了:CVE-2025
描述:Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认参数与装饰器),攻击者可把恶意载荷放在参数默认值或装饰器里,借此在服务器上下文中执行任意语句(反弹 shell、下载器、横向移动等)
URL:https://github.com/bambooqj/cve-2025-3248
标签:#CVE-2025
GitHub
GitHub - bambooqj/cve-2025-3248: Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认…
Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认参数与装饰器),攻击者可把恶意载荷放在参数默认值或装饰器里,借此在服务器上下文中执行任意语句(反弹 shell、下载器、横向移动等) - bambooqj/cve-2025-3248
GitHub监控消息提醒!!!
更新了:弱口令
描述:针对各个系统、服务收集的常见User与Password弱口令字典合集
URL:https://github.com/wdc15664/Weak_Password_Dict
标签:#弱口令
更新了:弱口令
描述:针对各个系统、服务收集的常见User与Password弱口令字典合集
URL:https://github.com/wdc15664/Weak_Password_Dict
标签:#弱口令
GitHub
GitHub - wdc15664/Weak_Password_Dict: 针对各个系统、服务收集的常见User与Password弱口令字典合集
针对各个系统、服务收集的常见User与Password弱口令字典合集. Contribute to wdc15664/Weak_Password_Dict development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Official public advisory for CVE-2025-61155
URL:https://github.com/pollotherunner/CVE-2025-61155
标签:#CVE-2025
更新了:CVE-2025
描述:Official public advisory for CVE-2025-61155
URL:https://github.com/pollotherunner/CVE-2025-61155
标签:#CVE-2025
GitHub
GitHub - pollotherunner/CVE-2025-61155: Official public advisory for CVE-2025-61155
Official public advisory for CVE-2025-61155. Contribute to pollotherunner/CVE-2025-61155 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-60349: Pxscan Arbitrary Process Termination
URL:https://github.com/djackreuter/CVE-2025-60349
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-60349: Pxscan Arbitrary Process Termination
URL:https://github.com/djackreuter/CVE-2025-60349
标签:#CVE-2025
GitHub
GitHub - djackreuter/CVE-2025-60349: CVE-2025-60349: Pxscan Arbitrary Process Termination
CVE-2025-60349: Pxscan Arbitrary Process Termination - djackreuter/CVE-2025-60349
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE vulnerability detection tool
URL:https://github.com/StrangerMRX/metaRce
标签:#RCE
更新了:RCE
描述:RCE vulnerability detection tool
URL:https://github.com/StrangerMRX/metaRce
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-48385.
URL:https://github.com/Mitchellzhou1/CVE-2025-48385-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-48385.
URL:https://github.com/Mitchellzhou1/CVE-2025-48385-PoC
标签:#CVE-2025