GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Writeup and code for CVE-2025-11492, CVE-2025-11493 - RCE in ConnctWise Automate RMM via Adversary-in-the-Middle
URL:https://github.com/synap5e/connectwise-automate-AiTM-rce
标签:#CVE-2025
更新了:CVE-2025
描述:Writeup and code for CVE-2025-11492, CVE-2025-11493 - RCE in ConnctWise Automate RMM via Adversary-in-the-Middle
URL:https://github.com/synap5e/connectwise-automate-AiTM-rce
标签:#CVE-2025
GitHub
GitHub - synap5e/connectwise-automate-AiTM-rce: Writeup and code for CVE-2025-11492, CVE-2025-11493 - RCE in ConnctWise Automate…
Writeup and code for CVE-2025-11492, CVE-2025-11493 - RCE in ConnctWise Automate RMM via Adversary-in-the-Middle - synap5e/connectwise-automate-AiTM-rce
GitHub监控消息提醒!!!
更新了:RCE
描述:A secure, AST-based mathematical expression evaluator that prevents code injection (RCE) by avoiding Python's unsafe eval() function.
URL:https://github.com/JanTeske06/math_engine
标签:#RCE
更新了:RCE
描述:A secure, AST-based mathematical expression evaluator that prevents code injection (RCE) by avoiding Python's unsafe eval() function.
URL:https://github.com/JanTeske06/math_engine
标签:#RCE
GitHub
GitHub - JanTeske06/math_engine: A secure, AST-based mathematical expression evaluator that prevents code injection (RCE) by avoiding…
A secure, AST-based mathematical expression evaluator that prevents code injection (RCE) by avoiding Python's unsafe eval() function. - JanTeske06/math_engine
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for Stored-XSS on Vulnerable WP-Statistics Plugin known as CVE-2025-9816
URL:https://github.com/monzaviman/CVE-2025-9816
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for Stored-XSS on Vulnerable WP-Statistics Plugin known as CVE-2025-9816
URL:https://github.com/monzaviman/CVE-2025-9816
标签:#CVE-2025
GitHub
GitHub - monzaviman/CVE-2025-9816: Proof of Concept for Stored-XSS on Vulnerable WP-Statistics Plugin known as CVE-2025-9816
Proof of Concept for Stored-XSS on Vulnerable WP-Statistics Plugin known as CVE-2025-9816 - monzaviman/CVE-2025-9816
GitHub监控消息提醒!!!
更新了:渗透测试
描述:这款工具引用了全自动化sqlmap,自动注入攻击,用于网络安全渗透测试网站测试。
URL:https://github.com/gjvsyj/Fully-automatic.-sqlmap
标签:#渗透测试
更新了:渗透测试
描述:这款工具引用了全自动化sqlmap,自动注入攻击,用于网络安全渗透测试网站测试。
URL:https://github.com/gjvsyj/Fully-automatic.-sqlmap
标签:#渗透测试
GitHub
GitHub - gjvsyj/Fully-automatic.-sqlmap: 这款工具引用了全自动化sqlmap,自动注入攻击,用于网络安全渗透测试网站测试。
这款工具引用了全自动化sqlmap,自动注入攻击,用于网络安全渗透测试网站测试。. Contribute to gjvsyj/Fully-automatic.-sqlmap development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:XSS vulnerability in SourceCodester Student Grades Management System (CVE-2025-63892)
URL:https://github.com/minhajultaivin/security-advisories
标签:#CVE-2025
更新了:CVE-2025
描述:XSS vulnerability in SourceCodester Student Grades Management System (CVE-2025-63892)
URL:https://github.com/minhajultaivin/security-advisories
标签:#CVE-2025
GitHub
GitHub - minhajultaivin/security-advisories: XSS vulnerability in SourceCodester Student Grades Management System (CVE-2025-63892)
XSS vulnerability in SourceCodester Student Grades Management System (CVE-2025-63892) - minhajultaivin/security-advisories
GitHub监控消息提醒!!!
更新了:RCE
描述:a totally serious, enterprise-grade PoC for a totally real RCE.
URL:https://github.com/TheHairyJ/rr_rce
标签:#RCE
更新了:RCE
描述:a totally serious, enterprise-grade PoC for a totally real RCE.
URL:https://github.com/TheHairyJ/rr_rce
标签:#RCE
GitHub
GitHub - TheHairyJ/rr_rce: a totally serious, enterprise-grade PoC for a totally real RCE.
a totally serious, enterprise-grade PoC for a totally real RCE. - TheHairyJ/rr_rce
🚀来自盘丝洞互推🌈1w+1组🚀
免费引流🤖公益互推
AD: 👉广告投放联系
1. 🌈重口•刑奴•反差母狗
2. 针孔摄像头[探花必备神器]
3. 🌈Github红队资源监控✨
AD: 广告位招租 广告位招租🪧
祝大家财源广进
免费引流🤖公益互推
AD: 👉广告投放联系
1. 🌈重口•刑奴•反差母狗
2. 针孔摄像头[探花必备神器]
3. 🌈Github红队资源监控✨
AD: 广告位招租 广告位招租🪧
祝大家财源广进
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-64513
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-64513
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-64513
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-64513
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59118
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59118
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59118
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59118
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/RyuHiro23/EXPLOTACI-N-Y-DEFENSA-DE-APIS-VULNERABLES-DAMN-VULNERABLE-RESTAURANT-API-GAME-
标签:#RCE
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/RyuHiro23/EXPLOTACI-N-Y-DEFENSA-DE-APIS-VULNERABLES-DAMN-VULNERABLE-RESTAURANT-API-GAME-
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/RyuHiro23/EXPLOTACI-N-Y-DEFENSA-DE-APIS-VULNERABLES-DAMN-VULNERABLE-RESTAURANT-API-GAME
标签:#RCE
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/RyuHiro23/EXPLOTACI-N-Y-DEFENSA-DE-APIS-VULNERABLES-DAMN-VULNERABLE-RESTAURANT-API-GAME
标签:#RCE
GitHub
GitHub - RyuHiro23/EXPLOTACI-N-Y-DEFENSA-DE-APIS-VULNERABLES-DAMN-VULNERABLE-RESTAURANT-API-GAME: ChatGPT dijo: Proyecto educativo…
ChatGPT dijo: Proyecto educativo que analiza y corrige vulnerabilidades en APIs REST usando Damn Vulnerable RESTaurant. Incluye explotación controlada, mitigaciones basadas en OWASP y ejemplos prá...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-39964 EXP
URL:https://github.com/n1k0oowang/CVE-2025-39964_EXP
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-39964 EXP
URL:https://github.com/n1k0oowang/CVE-2025-39964_EXP
标签:#CVE-2025
GitHub
GitHub - n1k0oowang/CVE-2025-39964_EXP: CVE-2025-39964 EXP
CVE-2025-39964 EXP. Contribute to n1k0oowang/CVE-2025-39964_EXP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-64500
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-64500
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-64500
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-64500
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-20337
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-20337
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-20337
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-20337
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for CVE-2025-26686
URL:https://github.com/alifaraj5723/CVE-2025-26686-poc
标签:#CVE-2025
更新了:CVE-2025
描述:POC for CVE-2025-26686
URL:https://github.com/alifaraj5723/CVE-2025-26686-poc
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-34299
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-34299
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-34299
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-34299
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Path traversal tool based on CVE-2025-8088
URL:https://github.com/WezRyan/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:Path traversal tool based on CVE-2025-8088
URL:https://github.com/WezRyan/CVE-2025-8088
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Path traversal tool based on CVE-2025-8088
URL:https://github.com/0xDTC/Below-Logger-Symlink-Attack_CVE-2025-27591
标签:#CVE-2025
更新了:CVE-2025
描述:Path traversal tool based on CVE-2025-8088
URL:https://github.com/0xDTC/Below-Logger-Symlink-Attack_CVE-2025-27591
标签:#CVE-2025
GitHub
GitHub - 0xDTC/Below-Logger-Symlink-Attack_CVE-2025-27591: A Bash-based privilege escalation exploit targeting the `below` system…
A Bash-based privilege escalation exploit targeting the `below` system performance monitoring tool. This refurbished exploit leverages a symlink vulnerability in the logging mechanism to inject a r...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Arbitrary physical memory read/write exploitation using ThrottleStop.sys (CVE-2025-7771) with superfetch address translation - Windows kernel security research
URL:https://github.com/AmrHuss/throttlestop-exploit-rw
标签:#CVE-2025
更新了:CVE-2025
描述:Arbitrary physical memory read/write exploitation using ThrottleStop.sys (CVE-2025-7771) with superfetch address translation - Windows kernel security research
URL:https://github.com/AmrHuss/throttlestop-exploit-rw
标签:#CVE-2025
GitHub
GitHub - AmrHuss/throttlestop-exploit-rw: Arbitrary physical memory read/write exploitation using ThrottleStop.sys (CVE-2025-7771)…
Arbitrary physical memory read/write exploitation using ThrottleStop.sys (CVE-2025-7771) with superfetch address translation - Windows kernel security research - AmrHuss/throttlestop-exploit-rw
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/Jasmin-Bharadiya/Health-Data-Red-Team-Protocol-for-Multimodal-Imaging-Pipelines
标签:#Red Team
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/Jasmin-Bharadiya/Health-Data-Red-Team-Protocol-for-Multimodal-Imaging-Pipelines
标签:#Red Team
GitHub
GitHub - Jasmin-Bharadiya/Health-Data-Red-Team-Protocol-for-Multimodal-Imaging-Pipelines: This research builds a red-team protocol…
This research builds a red-team protocol for multimodal health pipelines, starting with ophthalmology. We create realistic failure scenarios across imaging and clinical metadata, test how LLMs beha...