GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-61984
URL:https://github.com/flyskyfire/cve-2025-61984-poc
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-61984
URL:https://github.com/flyskyfire/cve-2025-61984-poc
标签:#CVE-2025
GitHub
GitHub - flyskyfire/cve-2025-61984-poc: PoC for CVE-2025-61984
PoC for CVE-2025-61984. Contribute to flyskyfire/cve-2025-61984-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:a technique to write JSP webshells via the groovy script console if you can't find where the application uploads files to, Check out the detailed guide here: https://vipa0z.github.io
URL:https://github.com/vipa0z/Groovy-bind-shell
标签:#RCE
更新了:RCE
描述:a technique to write JSP webshells via the groovy script console if you can't find where the application uploads files to, Check out the detailed guide here: https://vipa0z.github.io
URL:https://github.com/vipa0z/Groovy-bind-shell
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:a technique to write JSP webshells via the groovy script console if you can't find where the application uploads files to, Check out the detailed guide here: https://vipa0z.github.io
URL:https://github.com/vipa0z/jenkins-liferay--stable-bind-shell
标签:#RCE
更新了:RCE
描述:a technique to write JSP webshells via the groovy script console if you can't find where the application uploads files to, Check out the detailed guide here: https://vipa0z.github.io
URL:https://github.com/vipa0z/jenkins-liferay--stable-bind-shell
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-61882: Oracle E-Business Suite RCE Scanner and Exploit
URL:https://github.com/godnish/CVE-2025-61882
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-61882: Oracle E-Business Suite RCE Scanner and Exploit
URL:https://github.com/godnish/CVE-2025-61882
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:红蓝对抗
描述:红蓝对抗三维演练
URL:https://github.com/wangqiang-store/three-control-RedvsBlue
标签:#红蓝对抗
更新了:红蓝对抗
描述:红蓝对抗三维演练
URL:https://github.com/wangqiang-store/three-control-RedvsBlue
标签:#红蓝对抗
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Xeno RAT Server 中文汉化版 Xeno-RAT 是用 C# 开发的开源远程访问工具 (RAT),为远程系统管理提供了一套全面的功能。具有 HVNC、实时麦克风、反向代理等功能!适用于安全研究和渗透测试, 使用者必须严格遵守合规要求,禁止用于非法用途。远控|Red Team|钓鱼|提权|红队|信息收集|内供免杀版
URL:https://github.com/SecNN/Xeno-RAT-Server
标签:#渗透测试
更新了:渗透测试
描述:Xeno RAT Server 中文汉化版 Xeno-RAT 是用 C# 开发的开源远程访问工具 (RAT),为远程系统管理提供了一套全面的功能。具有 HVNC、实时麦克风、反向代理等功能!适用于安全研究和渗透测试, 使用者必须严格遵守合规要求,禁止用于非法用途。远控|Red Team|钓鱼|提权|红队|信息收集|内供免杀版
URL:https://github.com/SecNN/Xeno-RAT-Server
标签:#渗透测试
GitHub
GitHub - SecNN/Xeno-RAT-Server: Xeno RAT Server 中文汉化版 Xeno-RAT 是用 C# 开发的开源远程访问工具 (RAT),为远程系统管理提供了一套全面的功能。具有 HVNC、实时麦克风、反向代理等功能!适用于安全研究和渗透测试,…
Xeno RAT Server 中文汉化版 Xeno-RAT 是用 C# 开发的开源远程访问工具 (RAT),为远程系统管理提供了一套全面的功能。具有 HVNC、实时麦克风、反向代理等功能!适用于安全研究和渗透测试, 使用者必须严格遵守合规要求,禁止用于非法用途。远控|Red Team|钓鱼|提权|红队|信息收集|内供免杀版 - SecNN/Xeno-RAT-Server
GitHub监控消息提醒!!!
更新了:RCE
描述:Vulnerable API with prototype pollution and RCE
URL:https://github.com/fredrik-stigsson/prototype-pollution-rce-api
标签:#RCE
更新了:RCE
描述:Vulnerable API with prototype pollution and RCE
URL:https://github.com/fredrik-stigsson/prototype-pollution-rce-api
标签:#RCE
GitHub
GitHub - fredrik-stigsson/prototype-pollution-rce-api: Vulnerable API with prototype pollution and RCE
Vulnerable API with prototype pollution and RCE. Contribute to fredrik-stigsson/prototype-pollution-rce-api development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Theethat-Thamwasin/CVE-2025-56399
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Theethat-Thamwasin/CVE-2025-56399
标签:#CVE-2025
GitHub
GitHub - Theethat-Thamwasin/CVE-2025-56399: An authenticated Remote Code Execution (RCE) vulnerability in laravel-file-manager…
An authenticated Remote Code Execution (RCE) vulnerability in laravel-file-manager v3.3.1 and below allows attackers with access to the file manager interface to execute arbitrary code on the serve...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认参数与装饰器),攻击者可把恶意载荷放在参数默认值或装饰器里,借此在服务器上下文中执行任意语句(反弹 shell、下载器、横向移动等)
URL:https://github.com/bambooqj/cve-2025-3248
标签:#CVE-2025
更新了:CVE-2025
描述:Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认参数与装饰器),攻击者可把恶意载荷放在参数默认值或装饰器里,借此在服务器上下文中执行任意语句(反弹 shell、下载器、横向移动等)
URL:https://github.com/bambooqj/cve-2025-3248
标签:#CVE-2025
GitHub
GitHub - bambooqj/cve-2025-3248: Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认…
Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认参数与装饰器),攻击者可把恶意载荷放在参数默认值或装饰器里,借此在服务器上下文中执行任意语句(反弹 shell、下载器、横向移动等) - bambooqj/cve-2025-3248
GitHub监控消息提醒!!!
更新了:弱口令
描述:针对各个系统、服务收集的常见User与Password弱口令字典合集
URL:https://github.com/wdc15664/Weak_Password_Dict
标签:#弱口令
更新了:弱口令
描述:针对各个系统、服务收集的常见User与Password弱口令字典合集
URL:https://github.com/wdc15664/Weak_Password_Dict
标签:#弱口令
GitHub
GitHub - wdc15664/Weak_Password_Dict: 针对各个系统、服务收集的常见User与Password弱口令字典合集
针对各个系统、服务收集的常见User与Password弱口令字典合集. Contribute to wdc15664/Weak_Password_Dict development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Official public advisory for CVE-2025-61155
URL:https://github.com/pollotherunner/CVE-2025-61155
标签:#CVE-2025
更新了:CVE-2025
描述:Official public advisory for CVE-2025-61155
URL:https://github.com/pollotherunner/CVE-2025-61155
标签:#CVE-2025
GitHub
GitHub - pollotherunner/CVE-2025-61155: Official public advisory for CVE-2025-61155
Official public advisory for CVE-2025-61155. Contribute to pollotherunner/CVE-2025-61155 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-60349: Pxscan Arbitrary Process Termination
URL:https://github.com/djackreuter/CVE-2025-60349
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-60349: Pxscan Arbitrary Process Termination
URL:https://github.com/djackreuter/CVE-2025-60349
标签:#CVE-2025
GitHub
GitHub - djackreuter/CVE-2025-60349: CVE-2025-60349: Pxscan Arbitrary Process Termination
CVE-2025-60349: Pxscan Arbitrary Process Termination - djackreuter/CVE-2025-60349
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE vulnerability detection tool
URL:https://github.com/StrangerMRX/metaRce
标签:#RCE
更新了:RCE
描述:RCE vulnerability detection tool
URL:https://github.com/StrangerMRX/metaRce
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-48385.
URL:https://github.com/Mitchellzhou1/CVE-2025-48385-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-48385.
URL:https://github.com/Mitchellzhou1/CVE-2025-48385-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:WSUS Unauthenticated RCE
URL:https://github.com/jiansiting/CVE-2025-59287
标签:#CVE-2025
更新了:CVE-2025
描述:WSUS Unauthenticated RCE
URL:https://github.com/jiansiting/CVE-2025-59287
标签:#CVE-2025
GitHub
GitHub - jiansiting/CVE-2025-59287: WSUS Unauthenticated RCE
WSUS Unauthenticated RCE. Contribute to jiansiting/CVE-2025-59287 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:RexJava 是一个用 Go 语言编写的 Java 序列化流解析库,从 Ruby 的 rex-java 库移植而来。该库专门用于安全研究和渗透测试,能够解析和构建 Java 对象序列化格式的二进制流。
URL:https://github.com/Esonhugh/go-rex-java
标签:#渗透测试
更新了:渗透测试
描述:RexJava 是一个用 Go 语言编写的 Java 序列化流解析库,从 Ruby 的 rex-java 库移植而来。该库专门用于安全研究和渗透测试,能够解析和构建 Java 对象序列化格式的二进制流。
URL:https://github.com/Esonhugh/go-rex-java
标签:#渗透测试
GitHub
GitHub - Esonhugh/go-rex-java: 【Remain Fix】【测试项目 仍需修复】RexJava 是一个用 Go 语言编写的 Java 序列化流解析库,从 Ruby 的 rex-java 库移植而来。该库专门用于安全研究和渗透测试,能够解析和构建…
【Remain Fix】【测试项目 仍需修复】RexJava 是一个用 Go 语言编写的 Java 序列化流解析库,从 Ruby 的 rex-java 库移植而来。该库专门用于安全研究和渗透测试,能够解析和构建 Java 对象序列化格式的二进制流。Generated By Cursor - Esonhugh/go-rex-java
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Detect vulnerabilities CVE-2025-61882 and CVE-2025-61884 in Oracle E-Business Suite to help secure your systems from potential remote code execution threats.
URL:https://github.com/siddu7575/CVE-2025-61882-CVE-2025-61884
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Detect vulnerabilities CVE-2025-61882 and CVE-2025-61884 in Oracle E-Business Suite to help secure your systems from potential remote code execution threats.
URL:https://github.com/siddu7575/CVE-2025-61882-CVE-2025-61884
标签:#CVE-2025
GitHub
GitHub - siddu7575/CVE-2025-61882-CVE-2025-61884: 🔍 Detect vulnerabilities CVE-2025-61882 and CVE-2025-61884 in Oracle E-Business…
🔍 Detect vulnerabilities CVE-2025-61882 and CVE-2025-61884 in Oracle E-Business Suite to help secure your systems from potential remote code execution threats. - siddu7575/CVE-2025-61882-CVE-2025-6...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/vinodwick/CVE-2025-4334
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/vinodwick/CVE-2025-4334
标签:#CVE-2025
GitHub
GitHub - vinodwick/CVE-2025-4334: The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all…
The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-9983 POC Exploit
URL:https://github.com/sohaibeb/CVE-2025-9983
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-9983 POC Exploit
URL:https://github.com/sohaibeb/CVE-2025-9983
标签:#CVE-2025
GitHub
GitHub - sohaibeb/CVE-2025-9983: CVE-2025-9983 POC Exploit
CVE-2025-9983 POC Exploit. Contribute to sohaibeb/CVE-2025-9983 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research.
URL:https://github.com/ksnnd32/redis_exploit
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research.
URL:https://github.com/ksnnd32/redis_exploit
标签:#CVE-2025
GitHub
GitHub - ksnnd32/redis_exploit: 🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab…
🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research. - ksnnd32/redis_exploit