GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Theethat-Thamwasin/CVE-2025-56399
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Theethat-Thamwasin/CVE-2025-56399
标签:#CVE-2025
GitHub
GitHub - Theethat-Thamwasin/CVE-2025-56399: An authenticated Remote Code Execution (RCE) vulnerability in laravel-file-manager…
An authenticated Remote Code Execution (RCE) vulnerability in laravel-file-manager v3.3.1 and below allows attackers with access to the file manager interface to execute arbitrary code on the serve...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认参数与装饰器),攻击者可把恶意载荷放在参数默认值或装饰器里,借此在服务器上下文中执行任意语句(反弹 shell、下载器、横向移动等)
URL:https://github.com/bambooqj/cve-2025-3248
标签:#CVE-2025
更新了:CVE-2025
描述:Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认参数与装饰器),攻击者可把恶意载荷放在参数默认值或装饰器里,借此在服务器上下文中执行任意语句(反弹 shell、下载器、横向移动等)
URL:https://github.com/bambooqj/cve-2025-3248
标签:#CVE-2025
GitHub
GitHub - bambooqj/cve-2025-3248: Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认…
Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认参数与装饰器),攻击者可把恶意载荷放在参数默认值或装饰器里,借此在服务器上下文中执行任意语句(反弹 shell、下载器、横向移动等) - bambooqj/cve-2025-3248
GitHub监控消息提醒!!!
更新了:弱口令
描述:针对各个系统、服务收集的常见User与Password弱口令字典合集
URL:https://github.com/wdc15664/Weak_Password_Dict
标签:#弱口令
更新了:弱口令
描述:针对各个系统、服务收集的常见User与Password弱口令字典合集
URL:https://github.com/wdc15664/Weak_Password_Dict
标签:#弱口令
GitHub
GitHub - wdc15664/Weak_Password_Dict: 针对各个系统、服务收集的常见User与Password弱口令字典合集
针对各个系统、服务收集的常见User与Password弱口令字典合集. Contribute to wdc15664/Weak_Password_Dict development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Official public advisory for CVE-2025-61155
URL:https://github.com/pollotherunner/CVE-2025-61155
标签:#CVE-2025
更新了:CVE-2025
描述:Official public advisory for CVE-2025-61155
URL:https://github.com/pollotherunner/CVE-2025-61155
标签:#CVE-2025
GitHub
GitHub - pollotherunner/CVE-2025-61155: Official public advisory for CVE-2025-61155
Official public advisory for CVE-2025-61155. Contribute to pollotherunner/CVE-2025-61155 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-60349: Pxscan Arbitrary Process Termination
URL:https://github.com/djackreuter/CVE-2025-60349
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-60349: Pxscan Arbitrary Process Termination
URL:https://github.com/djackreuter/CVE-2025-60349
标签:#CVE-2025
GitHub
GitHub - djackreuter/CVE-2025-60349: CVE-2025-60349: Pxscan Arbitrary Process Termination
CVE-2025-60349: Pxscan Arbitrary Process Termination - djackreuter/CVE-2025-60349
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE vulnerability detection tool
URL:https://github.com/StrangerMRX/metaRce
标签:#RCE
更新了:RCE
描述:RCE vulnerability detection tool
URL:https://github.com/StrangerMRX/metaRce
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-48385.
URL:https://github.com/Mitchellzhou1/CVE-2025-48385-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-48385.
URL:https://github.com/Mitchellzhou1/CVE-2025-48385-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:WSUS Unauthenticated RCE
URL:https://github.com/jiansiting/CVE-2025-59287
标签:#CVE-2025
更新了:CVE-2025
描述:WSUS Unauthenticated RCE
URL:https://github.com/jiansiting/CVE-2025-59287
标签:#CVE-2025
GitHub
GitHub - jiansiting/CVE-2025-59287: WSUS Unauthenticated RCE
WSUS Unauthenticated RCE. Contribute to jiansiting/CVE-2025-59287 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:RexJava 是一个用 Go 语言编写的 Java 序列化流解析库,从 Ruby 的 rex-java 库移植而来。该库专门用于安全研究和渗透测试,能够解析和构建 Java 对象序列化格式的二进制流。
URL:https://github.com/Esonhugh/go-rex-java
标签:#渗透测试
更新了:渗透测试
描述:RexJava 是一个用 Go 语言编写的 Java 序列化流解析库,从 Ruby 的 rex-java 库移植而来。该库专门用于安全研究和渗透测试,能够解析和构建 Java 对象序列化格式的二进制流。
URL:https://github.com/Esonhugh/go-rex-java
标签:#渗透测试
GitHub
GitHub - Esonhugh/go-rex-java: 【Remain Fix】【测试项目 仍需修复】RexJava 是一个用 Go 语言编写的 Java 序列化流解析库,从 Ruby 的 rex-java 库移植而来。该库专门用于安全研究和渗透测试,能够解析和构建…
【Remain Fix】【测试项目 仍需修复】RexJava 是一个用 Go 语言编写的 Java 序列化流解析库,从 Ruby 的 rex-java 库移植而来。该库专门用于安全研究和渗透测试,能够解析和构建 Java 对象序列化格式的二进制流。Generated By Cursor - Esonhugh/go-rex-java
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Detect vulnerabilities CVE-2025-61882 and CVE-2025-61884 in Oracle E-Business Suite to help secure your systems from potential remote code execution threats.
URL:https://github.com/siddu7575/CVE-2025-61882-CVE-2025-61884
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Detect vulnerabilities CVE-2025-61882 and CVE-2025-61884 in Oracle E-Business Suite to help secure your systems from potential remote code execution threats.
URL:https://github.com/siddu7575/CVE-2025-61882-CVE-2025-61884
标签:#CVE-2025
GitHub
GitHub - siddu7575/CVE-2025-61882-CVE-2025-61884: 🔍 Detect vulnerabilities CVE-2025-61882 and CVE-2025-61884 in Oracle E-Business…
🔍 Detect vulnerabilities CVE-2025-61882 and CVE-2025-61884 in Oracle E-Business Suite to help secure your systems from potential remote code execution threats. - siddu7575/CVE-2025-61882-CVE-2025-6...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/vinodwick/CVE-2025-4334
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/vinodwick/CVE-2025-4334
标签:#CVE-2025
GitHub
GitHub - vinodwick/CVE-2025-4334: The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all…
The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-9983 POC Exploit
URL:https://github.com/sohaibeb/CVE-2025-9983
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-9983 POC Exploit
URL:https://github.com/sohaibeb/CVE-2025-9983
标签:#CVE-2025
GitHub
GitHub - sohaibeb/CVE-2025-9983: CVE-2025-9983 POC Exploit
CVE-2025-9983 POC Exploit. Contribute to sohaibeb/CVE-2025-9983 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research.
URL:https://github.com/ksnnd32/redis_exploit
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research.
URL:https://github.com/ksnnd32/redis_exploit
标签:#CVE-2025
GitHub
GitHub - ksnnd32/redis_exploit: 🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab…
🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research. - ksnnd32/redis_exploit
GitHub监控消息提醒!!!
更新了:渗透测试
描述:自动化的 web 快速渗透测试工具
URL:https://github.com/RusianHu/lsj-websec-automation
标签:#渗透测试
更新了:渗透测试
描述:自动化的 web 快速渗透测试工具
URL:https://github.com/RusianHu/lsj-websec-automation
标签:#渗透测试
GitHub
GitHub - RusianHu/lsj-websec-automation: 基于 Autogen + Playwright 自动化的 web 渗透测试工具
基于 Autogen + Playwright 自动化的 web 渗透测试工具. Contribute to RusianHu/lsj-websec-automation development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Reflected Cross-Site Scripting (XSS) in Pi-hole - CVE-2025-53533 exploit (PoC)
URL:https://github.com/moezbouzayani9/Reflected-Cross-Site-Scripting-XSS-in-Pi-hole---CVE-2025-53533
标签:#CVE-2025
更新了:CVE-2025
描述:Reflected Cross-Site Scripting (XSS) in Pi-hole - CVE-2025-53533 exploit (PoC)
URL:https://github.com/moezbouzayani9/Reflected-Cross-Site-Scripting-XSS-in-Pi-hole---CVE-2025-53533
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Cross-Site-Scripting XSS in Pi-hole-CVE-2025-53533 exploit (PoC)
URL:https://github.com/moezbouzayani9/Cross-Site-Scripting-XSS-in-Pi-hole-CVE-2025-53533
标签:#CVE-2025
更新了:CVE-2025
描述:Cross-Site-Scripting XSS in Pi-hole-CVE-2025-53533 exploit (PoC)
URL:https://github.com/moezbouzayani9/Cross-Site-Scripting-XSS-in-Pi-hole-CVE-2025-53533
标签:#CVE-2025
GitHub
GitHub - moezbouzayani9/Cross-Site-Scripting-XSS-in-Pi-hole-CVE-2025-53533: Cross-Site-Scripting XSS in Pi-hole-CVE-2025-53533…
Cross-Site-Scripting XSS in Pi-hole-CVE-2025-53533 exploit (PoC) - moezbouzayani9/Cross-Site-Scripting-XSS-in-Pi-hole-CVE-2025-53533
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Cross-Site-Scripting XSS in Pi-hole-CVE-2025-53533 exploit (PoC)
URL:https://github.com/moezbouzayani9/Pi-hole-XSS-CVE-2025-53533
标签:#CVE-2025
更新了:CVE-2025
描述:Cross-Site-Scripting XSS in Pi-hole-CVE-2025-53533 exploit (PoC)
URL:https://github.com/moezbouzayani9/Pi-hole-XSS-CVE-2025-53533
标签:#CVE-2025
GitHub
GitHub - moezbouzayani9/Pi-hole-XSS-CVE-2025-53533: Cross-Site-Scripting XSS in Pi-hole-CVE-2025-53533 exploit (PoC)
Cross-Site-Scripting XSS in Pi-hole-CVE-2025-53533 exploit (PoC) - moezbouzayani9/Pi-hole-XSS-CVE-2025-53533
GitHub监控消息提醒!!!
更新了:渗透测试
描述:面向 Windows 的 Scoop 第三方桶,收录常用 CTF、安全与渗透测试工具,便于快速安装、更新与管理。
URL:https://github.com/123456phy/NetShield-AI-
标签:#渗透测试
更新了:渗透测试
描述:面向 Windows 的 Scoop 第三方桶,收录常用 CTF、安全与渗透测试工具,便于快速安装、更新与管理。
URL:https://github.com/123456phy/NetShield-AI-
标签:#渗透测试
GitHub
GitHub - 123456phy/NetShield-AI-: NetShield AI 是 AI 驱动的全栈网络安全防护系统,集实时监控、智能检测与自动化防御于一体。底层 C++ 模块实现硬件控制与网络捕获,中层 Python 部署神经网络、本地…
NetShield AI 是 AI 驱动的全栈网络安全防护系统,集实时监控、智能检测与自动化防御于一体。底层 C++ 模块实现硬件控制与网络捕获,中层 Python 部署神经网络、本地 LLM 及多智能体引擎,支持离线 / 在线双模检测,精准识别恶意流量、异常进程;上层 Java 控制端提供可视化仪表盘,可远程 IP 配对,实时呈现被控端硬件状态、渗透测试结果与安全事件。兼容多平台,支持自定...
GitHub监控消息提醒!!!
更新了:RCE
描述:TryHackMe Plotted-EMR: exploited OpenEMR RCE, abused a cron/rsync filename trick to get plot_admin, then used a capability on perl to grab root.
URL:https://github.com/C1ph3r404/Plotted-EMR
标签:#RCE
更新了:RCE
描述:TryHackMe Plotted-EMR: exploited OpenEMR RCE, abused a cron/rsync filename trick to get plot_admin, then used a capability on perl to grab root.
URL:https://github.com/C1ph3r404/Plotted-EMR
标签:#RCE
GitHub
GitHub - C1ph3r404/Plotted-EMR: TryHackMe Plotted-EMR: exploited OpenEMR RCE, abused a cron/rsync filename trick to get plot_admin…
TryHackMe Plotted-EMR: exploited OpenEMR RCE, abused a cron/rsync filename trick to get plot_admin, then used a capability on perl to grab root. - C1ph3r404/Plotted-EMR
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/itcoderyhl/farm-assist-server
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/itcoderyhl/farm-assist-server
标签:#护网
GitHub
GitHub - itcoderyhl/farm-assist-server: 基于SpringBoot+Vue前后端分离的西南助农网站系统,系统包含管理员、用户角色,功能如下: 管理员:首页统计(商品统计、销售额增长趋势图)、用户管理、产品种类、商品…
基于SpringBoot+Vue前后端分离的西南助农网站系统,系统包含管理员、用户角色,功能如下: 管理员:首页统计(商品统计、销售额增长趋势图)、用户管理、产品种类、商品管理、订单管理、评论管理、救助管理(救护信息、捐赠管理)、展销活动(活动信息、展销报名)、政策新闻、系统留言、公告管理、个人信息、密码修改。 用户:注册、登录、首页、农业产品商城(分类、商品信息、商品详情、加入购物车、下单...