GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59118
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59118
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59118
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59118
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/RyuHiro23/EXPLOTACI-N-Y-DEFENSA-DE-APIS-VULNERABLES-DAMN-VULNERABLE-RESTAURANT-API-GAME-
标签:#RCE
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/RyuHiro23/EXPLOTACI-N-Y-DEFENSA-DE-APIS-VULNERABLES-DAMN-VULNERABLE-RESTAURANT-API-GAME-
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/RyuHiro23/EXPLOTACI-N-Y-DEFENSA-DE-APIS-VULNERABLES-DAMN-VULNERABLE-RESTAURANT-API-GAME
标签:#RCE
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/RyuHiro23/EXPLOTACI-N-Y-DEFENSA-DE-APIS-VULNERABLES-DAMN-VULNERABLE-RESTAURANT-API-GAME
标签:#RCE
GitHub
GitHub - RyuHiro23/EXPLOTACI-N-Y-DEFENSA-DE-APIS-VULNERABLES-DAMN-VULNERABLE-RESTAURANT-API-GAME: ChatGPT dijo: Proyecto educativo…
ChatGPT dijo: Proyecto educativo que analiza y corrige vulnerabilidades en APIs REST usando Damn Vulnerable RESTaurant. Incluye explotación controlada, mitigaciones basadas en OWASP y ejemplos prá...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-39964 EXP
URL:https://github.com/n1k0oowang/CVE-2025-39964_EXP
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-39964 EXP
URL:https://github.com/n1k0oowang/CVE-2025-39964_EXP
标签:#CVE-2025
GitHub
GitHub - n1k0oowang/CVE-2025-39964_EXP: CVE-2025-39964 EXP
CVE-2025-39964 EXP. Contribute to n1k0oowang/CVE-2025-39964_EXP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-64500
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-64500
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-64500
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-64500
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-20337
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-20337
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-20337
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-20337
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for CVE-2025-26686
URL:https://github.com/alifaraj5723/CVE-2025-26686-poc
标签:#CVE-2025
更新了:CVE-2025
描述:POC for CVE-2025-26686
URL:https://github.com/alifaraj5723/CVE-2025-26686-poc
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-34299
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-34299
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-34299
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-34299
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Path traversal tool based on CVE-2025-8088
URL:https://github.com/WezRyan/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:Path traversal tool based on CVE-2025-8088
URL:https://github.com/WezRyan/CVE-2025-8088
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Path traversal tool based on CVE-2025-8088
URL:https://github.com/0xDTC/Below-Logger-Symlink-Attack_CVE-2025-27591
标签:#CVE-2025
更新了:CVE-2025
描述:Path traversal tool based on CVE-2025-8088
URL:https://github.com/0xDTC/Below-Logger-Symlink-Attack_CVE-2025-27591
标签:#CVE-2025
GitHub
GitHub - 0xDTC/Below-Logger-Symlink-Attack_CVE-2025-27591: A Bash-based privilege escalation exploit targeting the `below` system…
A Bash-based privilege escalation exploit targeting the `below` system performance monitoring tool. This refurbished exploit leverages a symlink vulnerability in the logging mechanism to inject a r...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Arbitrary physical memory read/write exploitation using ThrottleStop.sys (CVE-2025-7771) with superfetch address translation - Windows kernel security research
URL:https://github.com/AmrHuss/throttlestop-exploit-rw
标签:#CVE-2025
更新了:CVE-2025
描述:Arbitrary physical memory read/write exploitation using ThrottleStop.sys (CVE-2025-7771) with superfetch address translation - Windows kernel security research
URL:https://github.com/AmrHuss/throttlestop-exploit-rw
标签:#CVE-2025
GitHub
GitHub - AmrHuss/throttlestop-exploit-rw: Arbitrary physical memory read/write exploitation using ThrottleStop.sys (CVE-2025-7771)…
Arbitrary physical memory read/write exploitation using ThrottleStop.sys (CVE-2025-7771) with superfetch address translation - Windows kernel security research - AmrHuss/throttlestop-exploit-rw
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/Jasmin-Bharadiya/Health-Data-Red-Team-Protocol-for-Multimodal-Imaging-Pipelines
标签:#Red Team
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/Jasmin-Bharadiya/Health-Data-Red-Team-Protocol-for-Multimodal-Imaging-Pipelines
标签:#Red Team
GitHub
GitHub - Jasmin-Bharadiya/Health-Data-Red-Team-Protocol-for-Multimodal-Imaging-Pipelines: This research builds a red-team protocol…
This research builds a red-team protocol for multimodal health pipelines, starting with ophthalmology. We create realistic failure scenarios across imaging and clinical metadata, test how LLMs beha...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure for CVE-2025-63602, including a PoC for use of an insecure driver in Awesome Miner 11.2.4 leading to arbitrary kernel read/write to MSRs, resulting in kernel code execution.
URL:https://github.com/D7EAD/CVE-2025-63602
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure for CVE-2025-63602, including a PoC for use of an insecure driver in Awesome Miner 11.2.4 leading to arbitrary kernel read/write to MSRs, resulting in kernel code execution.
URL:https://github.com/D7EAD/CVE-2025-63602
标签:#CVE-2025
GitHub
GitHub - D7EAD/CVE-2025-63602: Disclosure for CVE-2025-63602, including a PoC for use of an insecure driver in Awesome Miner 11.2.4…
Disclosure for CVE-2025-63602, including a PoC for use of an insecure driver in Awesome Miner 11.2.4 leading to arbitrary kernel read/write to MSRs, resulting in kernel code execution. - D7EAD/CVE-...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试收集阶段,爬取SPA型应用的所有js文件
URL:https://github.com/catcaine-lab/JSFinder
标签:#渗透测试
更新了:渗透测试
描述:渗透测试收集阶段,爬取SPA型应用的所有js文件
URL:https://github.com/catcaine-lab/JSFinder
标签:#渗透测试
GitHub
GitHub - catcaine-lab/JSFinder: 渗透测试收集阶段,爬取SPA型应用的所有js文件
渗透测试收集阶段,爬取SPA型应用的所有js文件. Contribute to catcaine-lab/JSFinder development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Maybe a proof-of-concept for CVE-2025-48593
URL:https://github.com/zhuowei/blueshrimp
标签:#CVE-2025
更新了:CVE-2025
描述:Maybe a proof-of-concept for CVE-2025-48593
URL:https://github.com/zhuowei/blueshrimp
标签:#CVE-2025
GitHub
GitHub - zhuowei/blueshrimp: Proof-of-concept for CVE-2025-48593
Proof-of-concept for CVE-2025-48593. Contribute to zhuowei/blueshrimp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be actively exploited as a zero-day.
URL:https://github.com/dexterm300/CVE-2025-62215-exploit-poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be actively exploited as a zero-day.
URL:https://github.com/dexterm300/CVE-2025-62215-exploit-poc
标签:#CVE-2025
GitHub
GitHub - dexterm300/CVE-2025-62215-exploit-poc: CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows…
CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be actively exploited as a zero-day. - dexterm300/CVE-2025-62215-e...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59367
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59367
标签:#CVE-2025