GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-concept of CVE-2025-55188: 7-Zip arbitrary file write
URL:https://github.com/lunbun/CVE-2025-55188
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-concept of CVE-2025-55188: 7-Zip arbitrary file write
URL:https://github.com/lunbun/CVE-2025-55188
标签:#CVE-2025
GitHub
GitHub - lunbun/CVE-2025-55188: Proof-of-concept of CVE-2025-55188: 7-Zip arbitrary file write
Proof-of-concept of CVE-2025-55188: 7-Zip arbitrary file write - lunbun/CVE-2025-55188
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55315 PoC Exploit
URL:https://github.com/ZemarKhos/CVE-2025-55315-PoC-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55315 PoC Exploit
URL:https://github.com/ZemarKhos/CVE-2025-55315-PoC-Exploit
标签:#CVE-2025
GitHub
GitHub - ZemarKhos/CVE-2025-55315-PoC-Exploit: CVE-2025-55315 PoC Exploit
CVE-2025-55315 PoC Exploit. Contribute to ZemarKhos/CVE-2025-55315-PoC-Exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-34299
URL:https://github.com/rxerium/CVE-2025-34299
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-34299
URL:https://github.com/rxerium/CVE-2025-34299
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-34299: Detection for CVE-2025-34299
Detection for CVE-2025-34299. Contribute to rxerium/CVE-2025-34299 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25257 PoC for educational use and/or authorised pentesting.
URL:https://github.com/mr-r3b00t/CVE-2025-25257
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25257 PoC for educational use and/or authorised pentesting.
URL:https://github.com/mr-r3b00t/CVE-2025-25257
标签:#CVE-2025
GitHub
GitHub - mr-r3b00t/CVE-2025-25257: CVE-2025-25257 PoC for educational use and/or authorised pentesting.
CVE-2025-25257 PoC for educational use and/or authorised pentesting. - mr-r3b00t/CVE-2025-25257
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A BOF implementation of curl for Cobalt Strike - HTTP/HTTPS client with TLS certificate inspection
URL:https://github.com/chryzsh/curl-bof
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:A BOF implementation of curl for Cobalt Strike - HTTP/HTTPS client with TLS certificate inspection
URL:https://github.com/chryzsh/curl-bof
标签:#Cobalt Strike
GitHub
GitHub - chryzsh/curl-bof: A BOF implementation of curl for Cobalt Strike - HTTP/HTTPS client with TLS certificate inspection
A BOF implementation of curl for Cobalt Strike - HTTP/HTTPS client with TLS certificate inspection - chryzsh/curl-bof
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC CVE-2025-9223
URL:https://github.com/networkkiller/CVE-2025-9223
标签:#CVE-2025
更新了:CVE-2025
描述:POC CVE-2025-9223
URL:https://github.com/networkkiller/CVE-2025-9223
标签:#CVE-2025
GitHub
GitHub - networkkiller/CVE-2025-9223: POC CVE-2025-9223
POC CVE-2025-9223. Contribute to networkkiller/CVE-2025-9223 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-41244 is a critical local privilege escalation vulnerability in VMware Aria Operations and VMware Tools
URL:https://github.com/IBO-ATTACKS/CVE-2025-41244
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-41244 is a critical local privilege escalation vulnerability in VMware Aria Operations and VMware Tools
URL:https://github.com/IBO-ATTACKS/CVE-2025-41244
标签:#CVE-2025
GitHub
GitHub - NULL200OK/CVE-2025-41244: CVE-2025-41244 is a critical local privilege escalation vulnerability in VMware Aria Operations…
CVE-2025-41244 is a critical local privilege escalation vulnerability in VMware Aria Operations and VMware Tools - NULL200OK/CVE-2025-41244
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:First public poc for CVE-2025-48593
URL:https://github.com/GiladLeef/CVE-2025-48593
标签:#CVE-2025
更新了:CVE-2025
描述:First public poc for CVE-2025-48593
URL:https://github.com/GiladLeef/CVE-2025-48593
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment.
URL:https://github.com/jq6l43d1/proxmox-lxc-docker-fix
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment.
URL:https://github.com/jq6l43d1/proxmox-lxc-docker-fix
标签:#CVE-2025
GitHub
GitHub - jq6l43d1/proxmox-lxc-docker-fix: Workaround for CVE-2025-52881: Fixes Docker/Podman breakage in Proxmox LXC containers…
Workaround for CVE-2025-52881: Fixes Docker/Podman breakage in Proxmox LXC containers caused by AppArmor incompatibility with runc 1.2.7+. Universal wrapper for community-scripts with automatic App...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit and test stand for CVE-2025-2945
URL:https://github.com/137f/PoC-CVE-2025-48703
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit and test stand for CVE-2025-2945
URL:https://github.com/137f/PoC-CVE-2025-48703
标签:#CVE-2025
GitHub
GitHub - ftz7/PoC-CVE-2025-48703: CVE-2025-48703 é uma vulnerabilidade de Execução Remota de Código (RCE) no módulo filemanager…
CVE-2025-48703 é uma vulnerabilidade de Execução Remota de Código (RCE) no módulo filemanager de um painel de hospedagem web (por exemplo, cPanel). Ocorre devido ao tratamento de entrada não saniti...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一个基于langchain4j开发的ai辅助渗透测试助手
URL:https://github.com/gtasb/Burp-AI-Analyzer
标签:#渗透测试
更新了:渗透测试
描述:一个基于langchain4j开发的ai辅助渗透测试助手
URL:https://github.com/gtasb/Burp-AI-Analyzer
标签:#渗透测试
GitHub
GitHub - gtasb/Burp-AI-Analyzer: 一个基于langchain4j开发的ai辅助渗透测试助手
一个基于langchain4j开发的ai辅助渗透测试助手. Contribute to gtasb/Burp-AI-Analyzer development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:SUKUNA v11.0 – Multi-language penetration testing tool (Python + C + Assembly). Features OWASP Top 10 scanning, RCE proof, WAF bypass, and GUI/CLI interface. Author: @canmitm
URL:https://github.com/root-flow/sukuna
标签:#RCE
更新了:RCE
描述:SUKUNA v11.0 – Multi-language penetration testing tool (Python + C + Assembly). Features OWASP Top 10 scanning, RCE proof, WAF bypass, and GUI/CLI interface. Author: @canmitm
URL:https://github.com/root-flow/sukuna
标签:#RCE
GitHub监控消息提醒!!!
更新了:免杀
描述:平台:Windows/Mac/Linux。脚本语言:多种、不限;我流,按需编写。涉及:桌面基线排查、软件激活破解、免杀及特权执行、渗透式支援固件识别读写、主机账户密码空值检测、Wi-Fi密码扫描、云主机终端安全加固、主机系统日志分析、自然语言处理、人文社科信息数据分析等。
URL:https://github.com/ddlmanus/jcly-shop
标签:#免杀
更新了:免杀
描述:平台:Windows/Mac/Linux。脚本语言:多种、不限;我流,按需编写。涉及:桌面基线排查、软件激活破解、免杀及特权执行、渗透式支援固件识别读写、主机账户密码空值检测、Wi-Fi密码扫描、云主机终端安全加固、主机系统日志分析、自然语言处理、人文社科信息数据分析等。
URL:https://github.com/ddlmanus/jcly-shop
标签:#免杀
GitHub
ddlmanus/jcly-shop
JCLY 新零售电商平台 - JCLY 开源商城系统多商户Java版,基于Springboot+Deepseek+Vue+Uni-app开发。支持微信公众号、小程序、H5,PC,移动端全覆盖。核心功能包括:同城配送配置、人工客服模块、装修模块 AI智能客服自动回复、区域商品展示、分销推广、拼团、砍价、秒杀等多种经营模式。代码全开源无加密,独立部署,二开方便,支持免费商用,满足企业新零售、多商...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-31133 PoC
URL:https://github.com/skynet-f-nvidia/CVE-2025-31133
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-31133 PoC
URL:https://github.com/skynet-f-nvidia/CVE-2025-31133
标签:#CVE-2025
GitHub
GitHub - skynet-f-nvidia/CVE-2025-31133: CVE-2025-31133 PoC
CVE-2025-31133 PoC. Contribute to skynet-f-nvidia/CVE-2025-31133 development by creating an account on GitHub.