GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试收集阶段,爬取SPA型应用的所有js文件
URL:https://github.com/catcaine-lab/JSFinder
标签:#渗透测试
更新了:渗透测试
描述:渗透测试收集阶段,爬取SPA型应用的所有js文件
URL:https://github.com/catcaine-lab/JSFinder
标签:#渗透测试
GitHub
GitHub - catcaine-lab/JSFinder: 渗透测试收集阶段,爬取SPA型应用的所有js文件
渗透测试收集阶段,爬取SPA型应用的所有js文件. Contribute to catcaine-lab/JSFinder development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Maybe a proof-of-concept for CVE-2025-48593
URL:https://github.com/zhuowei/blueshrimp
标签:#CVE-2025
更新了:CVE-2025
描述:Maybe a proof-of-concept for CVE-2025-48593
URL:https://github.com/zhuowei/blueshrimp
标签:#CVE-2025
GitHub
GitHub - zhuowei/blueshrimp: Proof-of-concept for CVE-2025-48593
Proof-of-concept for CVE-2025-48593. Contribute to zhuowei/blueshrimp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be actively exploited as a zero-day.
URL:https://github.com/dexterm300/CVE-2025-62215-exploit-poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be actively exploited as a zero-day.
URL:https://github.com/dexterm300/CVE-2025-62215-exploit-poc
标签:#CVE-2025
GitHub
GitHub - dexterm300/CVE-2025-62215-exploit-poc: CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows…
CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be actively exploited as a zero-day. - dexterm300/CVE-2025-62215-e...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59367
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59367
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-59367: CVE-2025-59367
CVE-2025-59367. Contribute to Ashwesker/Blackash-CVE-2025-59367 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/shinyseam/CVE-2025-64513
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/shinyseam/CVE-2025-64513
标签:#CVE-2025
GitHub
GitHub - shinyseam/CVE-2025-64513: PoC for CVE-2025-64513 — Milvus Proxy Authentication Bypass Vulnerability Batch scanner to…
PoC for CVE-2025-64513 — Milvus Proxy Authentication Bypass Vulnerability Batch scanner to verify unauthorized access and gather Milvus version, health, and database info. For security research...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/HanTul/Kotaemon-CVE-2025-56526-56527-disclosure
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/HanTul/Kotaemon-CVE-2025-56526-56527-disclosure
标签:#CVE-2025
GitHub
GitHub - HanTul/Kotaemon-CVE-2025-56526-56527-disclosure: Public disclosure for CVE-2025-56526 and CVE-2025-56527 — Stored XSS…
Public disclosure for CVE-2025-56526 and CVE-2025-56527 — Stored XSS via unsanitized PDF content rendering and plaintext credential exposure in Kotaemon 0.11.0. Includes full technical analysis, Po...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-12101 is a cross-site scripting (XSS) vulnerability impacting Citrix NetScaler ADC and Citrix NetScaler Gateway appliances when configured in certain roles (Gateway, AAA virtual server)
URL:https://github.com/7amzahard/CVE-2025-21202-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-12101 is a cross-site scripting (XSS) vulnerability impacting Citrix NetScaler ADC and Citrix NetScaler Gateway appliances when configured in certain roles (Gateway, AAA virtual server)
URL:https://github.com/7amzahard/CVE-2025-21202-exploit
标签:#CVE-2025
GitHub
GitHub - 7amzahard/CVE-2025-21202-exploit: CVE-2025-12101 is a cross-site scripting (XSS) vulnerability impacting Citrix NetScaler…
CVE-2025-12101 is a cross-site scripting (XSS) vulnerability impacting Citrix NetScaler ADC and Citrix NetScaler Gateway appliances when configured in certain roles (Gateway, AAA virtual server) - ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.
URL:https://github.com/uziii2208/CVE-2025-33073
标签:#CVE-2025
更新了:CVE-2025
描述:Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.
URL:https://github.com/uziii2208/CVE-2025-33073
标签:#CVE-2025
GitHub
GitHub - uziii2208/CVE-2025-33073: Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins…
Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled. - uziii2208/CVE-2025-33073
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-XXXXX
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-XXXXX
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-XXXXX
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-XXXXX
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Tool that reproduces CVE-2025-55315 in ASP.NET Core.
URL:https://github.com/fevar54/CVE-2025-64446-PoC---FortiWeb-Path-Traversal
标签:#CVE-2025
更新了:CVE-2025
描述:Tool that reproduces CVE-2025-55315 in ASP.NET Core.
URL:https://github.com/fevar54/CVE-2025-64446-PoC---FortiWeb-Path-Traversal
标签:#CVE-2025
GitHub
GitHub - fevar54/CVE-2025-64446-PoC---FortiWeb-Path-Traversal: # CVE-2025-64446 PoC - FortiWeb Path Traversal Proof of Concept…
# CVE-2025-64446 PoC - FortiWeb Path Traversal Proof of Concept para la vulnerabilidad de path traversal en Fortinet FortiWeb que permite ejecución remota de comandos. Incluye herramienta de detec...
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE-GPT-4 Empirical Validation Results: GPT-4 120B benchmark with comprehensive Llama comparison
URL:https://github.com/IsmaIkami/rce-gpt4-validation
标签:#RCE
更新了:RCE
描述:RCE-GPT-4 Empirical Validation Results: GPT-4 120B benchmark with comprehensive Llama comparison
URL:https://github.com/IsmaIkami/rce-gpt4-validation
标签:#RCE
GitHub
GitHub - IsmaIkami/rce-gpt4-validation: RCE-GPT-4 Empirical Validation Results: GPT-4 120B benchmark with comprehensive Llama comparison
RCE-GPT-4 Empirical Validation Results: GPT-4 120B benchmark with comprehensive Llama comparison - IsmaIkami/rce-gpt4-validation
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC for the BinaryFormatter vulnerability allowing unauthenticated RCE in Microsoft Windows Server Update Service (WSUS) - CVE-2023-35317
URL:https://github.com/M507/CVE-2023-35317-PoC
标签:#RCE
更新了:RCE
描述:PoC for the BinaryFormatter vulnerability allowing unauthenticated RCE in Microsoft Windows Server Update Service (WSUS) - CVE-2023-35317
URL:https://github.com/M507/CVE-2023-35317-PoC
标签:#RCE
GitHub
GitHub - M507/CVE-2023-35317-PoC: PoC for the BinaryFormatter vulnerability allowing unauthenticated RCE in Microsoft Windows Server…
PoC for the BinaryFormatter vulnerability allowing unauthenticated RCE in Microsoft Windows Server Update Service (WSUS) - CVE-2023-35317 - M507/CVE-2023-35317-PoC
GitHub监控消息提醒!!!
更新了:免杀
描述:ZREBypass 是一款专业的免杀处理工具,支持二进制文件、Shellcode 和 Webshell 的免杀处理,集成了反调试、反虚拟机、反沙箱等多种对抗技术
URL:https://github.com/1276486/ZREBypass
标签:#免杀
更新了:免杀
描述:ZREBypass 是一款专业的免杀处理工具,支持二进制文件、Shellcode 和 Webshell 的免杀处理,集成了反调试、反虚拟机、反沙箱等多种对抗技术
URL:https://github.com/1276486/ZREBypass
标签:#免杀
GitHub
GitHub - 1276486/ZREBypass: ZREBypass 是一款专业的免杀处理工具,支持二进制文件、Shellcode 和 Webshell 的免杀处理,集成了反调试、反虚拟机、反沙箱等多种对抗技术
ZREBypass 是一款专业的免杀处理工具,支持二进制文件、Shellcode 和 Webshell 的免杀处理,集成了反调试、反虚拟机、反沙箱等多种对抗技术 - 1276486/ZREBypass
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE attack methodology, Real World Scenarios, Real LOLBin deployment etc.... FOR PROFFESSIONAL USE ONLY!
URL:https://github.com/azdabat/Offensive-Security-Methodology
标签:#RCE
更新了:RCE
描述:RCE attack methodology, Real World Scenarios, Real LOLBin deployment etc.... FOR PROFFESSIONAL USE ONLY!
URL:https://github.com/azdabat/Offensive-Security-Methodology
标签:#RCE
GitHub
azdabat/Offensive-Security-Methodology
RCE attack methodology, Real World Scenarios, Real LOLBin deployment etc.... FOR PROFFESSIONAL USE ONLY! - azdabat/Offensive-Security-Methodology
GitHub监控消息提醒!!!
更新了:RCE
描述:A complete set of tools for RCE as part of penetration tests. С2 + Implant
URL:https://github.com/AnonRedT/C2-Implant-Kworker32M
标签:#RCE
更新了:RCE
描述:A complete set of tools for RCE as part of penetration tests. С2 + Implant
URL:https://github.com/AnonRedT/C2-Implant-Kworker32M
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-64446
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-64446
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-64446
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-64446
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-64446: CVE-2025-64446
CVE-2025-64446. Contribute to B1ack4sh/Blackash-CVE-2025-64446 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-33073
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-33073
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-33073
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-33073
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-33073: CVE-2025-33073
CVE-2025-33073. Contribute to Ashwesker/Blackash-CVE-2025-33073 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A lightweight backend used to reproduce and demonstrate CVE-2025-4664
URL:https://github.com/mingijunggrape/CVE-2025-4664
标签:#CVE-2025
更新了:CVE-2025
描述:A lightweight backend used to reproduce and demonstrate CVE-2025-4664
URL:https://github.com/mingijunggrape/CVE-2025-4664
标签:#CVE-2025