GitHub监控消息提醒!!!
更新了:RCE
描述:TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
URL:https://github.com/TyreekHaynes/Security-Research
标签:#RCE
更新了:RCE
描述:TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
URL:https://github.com/TyreekHaynes/Security-Research
标签:#RCE
GitHub
GitHub - TyreekHaynes/Security-Research: Independent security researcher specializing in critical vulnerability discovery across…
Independent security researcher specializing in critical vulnerability discovery across enterprise systems, WordPress ecosystems, and cloud infrastructure. Demonstrated track record of identifyin...
GitHub监控消息提醒!!!
更新了:应急响应
描述:「渊照」是一款功能强大的专业暗链扫描工具,专注于检测网站、HTML文件或目录中的隐蔽链接、隐藏元素和恶意代码。该工具能够智能识别扫描目标类型(本地文件/目录、内网URL、公网URL),并自动调整扫描策略以获得最佳效果,是安全人员进行网站安全审计和应急响应的理想工具。
URL:https://github.com/BINBIN02/YuanZhao
标签:#应急响应
更新了:应急响应
描述:「渊照」是一款功能强大的专业暗链扫描工具,专注于检测网站、HTML文件或目录中的隐蔽链接、隐藏元素和恶意代码。该工具能够智能识别扫描目标类型(本地文件/目录、内网URL、公网URL),并自动调整扫描策略以获得最佳效果,是安全人员进行网站安全审计和应急响应的理想工具。
URL:https://github.com/BINBIN02/YuanZhao
标签:#应急响应
GitHub
GitHub - BINBIN02/YuanZhao: 「渊照」是一款功能强大的专业暗链扫描工具,专注于检测网站、HTML文件或目录中的隐蔽链接、隐藏元素和恶意代码。该工具能够智能识别扫描目标类型(本地文件/目录、内网URL、公网URL),并自动调整扫…
「渊照」是一款功能强大的专业暗链扫描工具,专注于检测网站、HTML文件或目录中的隐蔽链接、隐藏元素和恶意代码。该工具能够智能识别扫描目标类型(本地文件/目录、内网URL、公网URL),并自动调整扫描策略以获得最佳效果,是安全人员进行网站安全审计和应急响应的理想工具。 - BINBIN02/YuanZhao
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-concept of CVE-2025-55188: 7-Zip arbitrary file write
URL:https://github.com/lunbun/CVE-2025-55188
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-concept of CVE-2025-55188: 7-Zip arbitrary file write
URL:https://github.com/lunbun/CVE-2025-55188
标签:#CVE-2025
GitHub
GitHub - lunbun/CVE-2025-55188: Proof-of-concept of CVE-2025-55188: 7-Zip arbitrary file write
Proof-of-concept of CVE-2025-55188: 7-Zip arbitrary file write - lunbun/CVE-2025-55188
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55315 PoC Exploit
URL:https://github.com/ZemarKhos/CVE-2025-55315-PoC-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55315 PoC Exploit
URL:https://github.com/ZemarKhos/CVE-2025-55315-PoC-Exploit
标签:#CVE-2025
GitHub
GitHub - ZemarKhos/CVE-2025-55315-PoC-Exploit: CVE-2025-55315 PoC Exploit
CVE-2025-55315 PoC Exploit. Contribute to ZemarKhos/CVE-2025-55315-PoC-Exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-34299
URL:https://github.com/rxerium/CVE-2025-34299
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-34299
URL:https://github.com/rxerium/CVE-2025-34299
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-34299: Detection for CVE-2025-34299
Detection for CVE-2025-34299. Contribute to rxerium/CVE-2025-34299 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25257 PoC for educational use and/or authorised pentesting.
URL:https://github.com/mr-r3b00t/CVE-2025-25257
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25257 PoC for educational use and/or authorised pentesting.
URL:https://github.com/mr-r3b00t/CVE-2025-25257
标签:#CVE-2025
GitHub
GitHub - mr-r3b00t/CVE-2025-25257: CVE-2025-25257 PoC for educational use and/or authorised pentesting.
CVE-2025-25257 PoC for educational use and/or authorised pentesting. - mr-r3b00t/CVE-2025-25257
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A BOF implementation of curl for Cobalt Strike - HTTP/HTTPS client with TLS certificate inspection
URL:https://github.com/chryzsh/curl-bof
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:A BOF implementation of curl for Cobalt Strike - HTTP/HTTPS client with TLS certificate inspection
URL:https://github.com/chryzsh/curl-bof
标签:#Cobalt Strike
GitHub
GitHub - chryzsh/curl-bof: A BOF implementation of curl for Cobalt Strike - HTTP/HTTPS client with TLS certificate inspection
A BOF implementation of curl for Cobalt Strike - HTTP/HTTPS client with TLS certificate inspection - chryzsh/curl-bof
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC CVE-2025-9223
URL:https://github.com/networkkiller/CVE-2025-9223
标签:#CVE-2025
更新了:CVE-2025
描述:POC CVE-2025-9223
URL:https://github.com/networkkiller/CVE-2025-9223
标签:#CVE-2025
GitHub
GitHub - networkkiller/CVE-2025-9223: POC CVE-2025-9223
POC CVE-2025-9223. Contribute to networkkiller/CVE-2025-9223 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-41244 is a critical local privilege escalation vulnerability in VMware Aria Operations and VMware Tools
URL:https://github.com/IBO-ATTACKS/CVE-2025-41244
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-41244 is a critical local privilege escalation vulnerability in VMware Aria Operations and VMware Tools
URL:https://github.com/IBO-ATTACKS/CVE-2025-41244
标签:#CVE-2025
GitHub
GitHub - NULL200OK/CVE-2025-41244: CVE-2025-41244 is a critical local privilege escalation vulnerability in VMware Aria Operations…
CVE-2025-41244 is a critical local privilege escalation vulnerability in VMware Aria Operations and VMware Tools - NULL200OK/CVE-2025-41244
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:First public poc for CVE-2025-48593
URL:https://github.com/GiladLeef/CVE-2025-48593
标签:#CVE-2025
更新了:CVE-2025
描述:First public poc for CVE-2025-48593
URL:https://github.com/GiladLeef/CVE-2025-48593
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment.
URL:https://github.com/jq6l43d1/proxmox-lxc-docker-fix
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment.
URL:https://github.com/jq6l43d1/proxmox-lxc-docker-fix
标签:#CVE-2025
GitHub
GitHub - jq6l43d1/proxmox-lxc-docker-fix: Workaround for CVE-2025-52881: Fixes Docker/Podman breakage in Proxmox LXC containers…
Workaround for CVE-2025-52881: Fixes Docker/Podman breakage in Proxmox LXC containers caused by AppArmor incompatibility with runc 1.2.7+. Universal wrapper for community-scripts with automatic App...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit and test stand for CVE-2025-2945
URL:https://github.com/137f/PoC-CVE-2025-48703
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit and test stand for CVE-2025-2945
URL:https://github.com/137f/PoC-CVE-2025-48703
标签:#CVE-2025
GitHub
GitHub - ftz7/PoC-CVE-2025-48703: CVE-2025-48703 é uma vulnerabilidade de Execução Remota de Código (RCE) no módulo filemanager…
CVE-2025-48703 é uma vulnerabilidade de Execução Remota de Código (RCE) no módulo filemanager de um painel de hospedagem web (por exemplo, cPanel). Ocorre devido ao tratamento de entrada não saniti...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一个基于langchain4j开发的ai辅助渗透测试助手
URL:https://github.com/gtasb/Burp-AI-Analyzer
标签:#渗透测试
更新了:渗透测试
描述:一个基于langchain4j开发的ai辅助渗透测试助手
URL:https://github.com/gtasb/Burp-AI-Analyzer
标签:#渗透测试
GitHub
GitHub - gtasb/Burp-AI-Analyzer: 一个基于langchain4j开发的ai辅助渗透测试助手
一个基于langchain4j开发的ai辅助渗透测试助手. Contribute to gtasb/Burp-AI-Analyzer development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:SUKUNA v11.0 – Multi-language penetration testing tool (Python + C + Assembly). Features OWASP Top 10 scanning, RCE proof, WAF bypass, and GUI/CLI interface. Author: @canmitm
URL:https://github.com/root-flow/sukuna
标签:#RCE
更新了:RCE
描述:SUKUNA v11.0 – Multi-language penetration testing tool (Python + C + Assembly). Features OWASP Top 10 scanning, RCE proof, WAF bypass, and GUI/CLI interface. Author: @canmitm
URL:https://github.com/root-flow/sukuna
标签:#RCE
GitHub监控消息提醒!!!
更新了:免杀
描述:平台:Windows/Mac/Linux。脚本语言:多种、不限;我流,按需编写。涉及:桌面基线排查、软件激活破解、免杀及特权执行、渗透式支援固件识别读写、主机账户密码空值检测、Wi-Fi密码扫描、云主机终端安全加固、主机系统日志分析、自然语言处理、人文社科信息数据分析等。
URL:https://github.com/ddlmanus/jcly-shop
标签:#免杀
更新了:免杀
描述:平台:Windows/Mac/Linux。脚本语言:多种、不限;我流,按需编写。涉及:桌面基线排查、软件激活破解、免杀及特权执行、渗透式支援固件识别读写、主机账户密码空值检测、Wi-Fi密码扫描、云主机终端安全加固、主机系统日志分析、自然语言处理、人文社科信息数据分析等。
URL:https://github.com/ddlmanus/jcly-shop
标签:#免杀
GitHub
ddlmanus/jcly-shop
JCLY 新零售电商平台 - JCLY 开源商城系统多商户Java版,基于Springboot+Deepseek+Vue+Uni-app开发。支持微信公众号、小程序、H5,PC,移动端全覆盖。核心功能包括:同城配送配置、人工客服模块、装修模块 AI智能客服自动回复、区域商品展示、分销推广、拼团、砍价、秒杀等多种经营模式。代码全开源无加密,独立部署,二开方便,支持免费商用,满足企业新零售、多商...