GitHub监控消息提醒!!!
更新了:CVE-2025
描述:SQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via time-based blind SQLi. For authorized penetration testing only.
URL:https://github.com/XploitGh0st/CVE-2025-26794-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:SQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via time-based blind SQLi. For authorized penetration testing only.
URL:https://github.com/XploitGh0st/CVE-2025-26794-exploit
标签:#CVE-2025
GitHub
GitHub - XploitGh0st/CVE-2025-26794-exploit: SQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via…
SQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via time-based blind SQLi. For authorized penetration testing only. - XploitGh0st/CVE-2025-26794-exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-concept for CVE-2025-49844
URL:https://github.com/saneki/cve-2025-49844
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-concept for CVE-2025-49844
URL:https://github.com/saneki/cve-2025-49844
标签:#CVE-2025
GitHub
GitHub - saneki/cve-2025-49844: Proof-of-concept for CVE-2025-49844
Proof-of-concept for CVE-2025-49844. Contribute to saneki/cve-2025-49844 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A deliberately vulnerable web application demonstrating various SQL injection techniques and PostgreSQL RCE escalation.
URL:https://github.com/tramanh2604/SQL-Injection-Lab
标签:#RCE
更新了:RCE
描述:A deliberately vulnerable web application demonstrating various SQL injection techniques and PostgreSQL RCE escalation.
URL:https://github.com/tramanh2604/SQL-Injection-Lab
标签:#RCE
GitHub
GitHub - tramanh2604/SQL-Injection-Lab: A deliberately vulnerable web application demonstrating various SQL injection techniques…
A deliberately vulnerable web application demonstrating various SQL injection techniques and PostgreSQL RCE escalation. - tramanh2604/SQL-Injection-Lab
GitHub监控消息提醒!!!
更新了:渗透测试
描述:AiScan-N 来了!这是一款基于人工智能的Ai全自动化渗透测试工具,专为企业和个人用户打造,尤其适合初学者(小白)快速上手使用,让你轻松迈入智能安全攻防时代!
URL:https://github.com/SecNN/AiScan-N
标签:#渗透测试
更新了:渗透测试
描述:AiScan-N 来了!这是一款基于人工智能的Ai全自动化渗透测试工具,专为企业和个人用户打造,尤其适合初学者(小白)快速上手使用,让你轻松迈入智能安全攻防时代!
URL:https://github.com/SecNN/AiScan-N
标签:#渗透测试
GitHub
GitHub - SecNN/AiScan-N: AiScan-N 来了!这是一款基于人工智能驱动的Ai自动化网络安全(运维)工具,专注于网络安全评估、漏洞扫描、运维、应急响应、渗透测试自动化,Ai大模型工具集【CLI Agent】 ,Ai驱动的安全检…
AiScan-N 来了!这是一款基于人工智能驱动的Ai自动化网络安全(运维)工具,专注于网络安全评估、漏洞扫描、运维、应急响应、渗透测试自动化,Ai大模型工具集【CLI Agent】 ,Ai驱动的安全检测技术,提升安全测试(运维)效率,专为企业和个人用户打造,尤其适合初学者(小白)快速上手使用,让你轻松迈入智能安全攻防时代!适用场景 :如(红队演练、CTF比赛、Web应用渗透测试、内网横向移...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Exploit CVE-2025-11001 in 7-Zip on Windows with admin privileges through a symlink attack; targeted for specific vulnerable versions, 21.02 - 25.00.
URL:https://github.com/litolito54/CVE-2025-11001
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Exploit CVE-2025-11001 in 7-Zip on Windows with admin privileges through a symlink attack; targeted for specific vulnerable versions, 21.02 - 25.00.
URL:https://github.com/litolito54/CVE-2025-11001
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-59287
URL:https://github.com/0xBruno/WSUSploit.NET
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-59287
URL:https://github.com/0xBruno/WSUSploit.NET
标签:#CVE-2025
GitHub
GitHub - 0xBruno/WSUSploit.NET: PoC for CVE-2025-59287
PoC for CVE-2025-59287. Contribute to 0xBruno/WSUSploit.NET development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Apache's commons-lang2 v2.6 with a backported fix for CVE-2025-48924
URL:https://github.com/njawalkar/apache-commons-lang2
标签:#CVE-2025
更新了:CVE-2025
描述:Apache's commons-lang2 v2.6 with a backported fix for CVE-2025-48924
URL:https://github.com/njawalkar/apache-commons-lang2
标签:#CVE-2025
GitHub
GitHub - njawalkar/apache-commons-lang2: Apache's commons-lang2 v2.6 with a backported fix for CVE-2025-48924
Apache's commons-lang2 v2.6 with a backported fix for CVE-2025-48924 - njawalkar/apache-commons-lang2
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Standardize penetration testing workflows with AI automation.借助AI自动化规范渗透测试工作流程。
URL:https://github.com/arch3rPro/spec-hack
标签:#渗透测试
更新了:渗透测试
描述:Standardize penetration testing workflows with AI automation.借助AI自动化规范渗透测试工作流程。
URL:https://github.com/arch3rPro/spec-hack
标签:#渗透测试
GitHub
GitHub - arch3rPro/spec-hack: Standardize penetration testing workflows with AI automation.借助AI自动化规范渗透测试工作流程。
Standardize penetration testing workflows with AI automation.借助AI自动化规范渗透测试工作流程。 - arch3rPro/spec-hack
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/Solityer/Smart-and-Safe-Travel
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/Solityer/Smart-and-Safe-Travel
标签:#护网
GitHub
GitHub - Solityer/Smart-and-Safe-Travel: 在数字经济时代,数据作为核心生产要素,其流通共享的安全与效率问题亟待解决——尤其是图数据,因其结构复杂,面临权属模糊、隐私泄露(全球单次数据泄露平均成本高达435万美元)…
在数字经济时代,数据作为核心生产要素,其流通共享的安全与效率问题亟待解决——尤其是图数据,因其结构复杂,面临权属模糊、隐私泄露(全球单次数据泄露平均成本高达435万美元)、流通互信不足(中间成本占比高达30%-40%)等痛点,传统方案难以兼顾“安全”与“可用”。 本项目依托贵州数据宝的国有数据资质,融合AI技术(包括联邦学习和图神经网络GNN)、密码学(如差分隐私和多方安全计算MPC)、区块...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/QurtiDev/WSUS-CVE-2025-59287-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/QurtiDev/WSUS-CVE-2025-59287-RCE
标签:#CVE-2025
GitHub
GitHub - QurtiDev/WSUS-CVE-2025-59287-RCE: Exploit script written in C# to aid gaining a reverse shell on targets with Windows…
Exploit script written in C# to aid gaining a reverse shell on targets with Windows Server Update Service(WSUS) CVE-2025-59287. - QurtiDev/WSUS-CVE-2025-59287-RCE
GitHub监控消息提醒!!!
更新了:应急响应
描述:基于SSM的应急资源管理系统,主要用于提高应急响应效率,实现资源的合理调配。核心功能包括应急资源信息管理、实时监控、智能调度和数据分析。系统能够有效解决资源分散、调度不及时等问题,为应急工作提供快速、准确的资源支持,确保应急任务的高效完成。
URL:https://github.com/kevinyang11101g/CgGeWuxY
标签:#应急响应
更新了:应急响应
描述:基于SSM的应急资源管理系统,主要用于提高应急响应效率,实现资源的合理调配。核心功能包括应急资源信息管理、实时监控、智能调度和数据分析。系统能够有效解决资源分散、调度不及时等问题,为应急工作提供快速、准确的资源支持,确保应急任务的高效完成。
URL:https://github.com/kevinyang11101g/CgGeWuxY
标签:#应急响应
GitHub
GitHub - kevinyang11101g/CgGeWuxY: 基于SSM的应急资源管理系统,主要用于提高应急响应效率,实现资源的合理调配。核心功能包括应急资源信息管理、实时监控、智能调度和数据分析。系统能够有效解决资源分散、调度不及时等问题,为…
基于SSM的应急资源管理系统,主要用于提高应急响应效率,实现资源的合理调配。核心功能包括应急资源信息管理、实时监控、智能调度和数据分析。系统能够有效解决资源分散、调度不及时等问题,为应急工作提供快速、准确的资源支持,确保应急任务的高效完成。 - kevinyang11101g/CgGeWuxY
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Document Library Lite <= 1.1.6 - Missing Authorization to Sensitive Information Exposure | CVE-2025-11174
URL:https://github.com/SnailSploit/CVE-2025-11174
标签:#CVE-2025
更新了:CVE-2025
描述:Document Library Lite <= 1.1.6 - Missing Authorization to Sensitive Information Exposure | CVE-2025-11174
URL:https://github.com/SnailSploit/CVE-2025-11174
标签:#CVE-2025
GitHub
GitHub - SnailSploit/CVE-2025-11174: Document Library Lite <= 1.1.6 - Missing Authorization to Sensitive Information Exposure |…
Document Library Lite <= 1.1.6 - Missing Authorization to Sensitive Information Exposure | CVE-2025-11174 - SnailSploit/CVE-2025-11174
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Analysis and reproduction of CVE-2025-57833
URL:https://github.com/sw0rd1ight/CVE-2025-57833
标签:#CVE-2025
更新了:CVE-2025
描述:Analysis and reproduction of CVE-2025-57833
URL:https://github.com/sw0rd1ight/CVE-2025-57833
标签:#CVE-2025
GitHub
GitHub - sw0rd1ight/CVE-2025-57833: Analysis and reproduction of CVE-2025-57833
Analysis and reproduction of CVE-2025-57833. Contribute to sw0rd1ight/CVE-2025-57833 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-62168
URL:https://github.com/shahroodcert/CVE-2025-62168
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-62168
URL:https://github.com/shahroodcert/CVE-2025-62168
标签:#CVE-2025
GitHub
GitHub - shahroodcert/CVE-2025-62168: PoC of CVE-2025-62168
PoC of CVE-2025-62168. Contribute to shahroodcert/CVE-2025-62168 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This repo contains a valid ready to run Dockefile to be used in 1C cluster RCE technique
URL:https://github.com/curiv/postgres-1c-for-pentest
标签:#RCE
更新了:RCE
描述:This repo contains a valid ready to run Dockefile to be used in 1C cluster RCE technique
URL:https://github.com/curiv/postgres-1c-for-pentest
标签:#RCE
GitHub
GitHub - curiv/postgres-1c-for-pentest: This repo contains a valid ready to run Dockefile to be used in 1C cluster RCE technique
This repo contains a valid ready to run Dockefile to be used in 1C cluster RCE technique - curiv/postgres-1c-for-pentest