GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.
URL:https://github.com/uziii2208/CVE-2025-33073
标签:#CVE-2025
更新了:CVE-2025
描述:Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.
URL:https://github.com/uziii2208/CVE-2025-33073
标签:#CVE-2025
GitHub
GitHub - uziii2208/CVE-2025-33073: Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins…
Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled. - uziii2208/CVE-2025-33073
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-XXXXX
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-XXXXX
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-XXXXX
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-XXXXX
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Tool that reproduces CVE-2025-55315 in ASP.NET Core.
URL:https://github.com/fevar54/CVE-2025-64446-PoC---FortiWeb-Path-Traversal
标签:#CVE-2025
更新了:CVE-2025
描述:Tool that reproduces CVE-2025-55315 in ASP.NET Core.
URL:https://github.com/fevar54/CVE-2025-64446-PoC---FortiWeb-Path-Traversal
标签:#CVE-2025
GitHub
GitHub - fevar54/CVE-2025-64446-PoC---FortiWeb-Path-Traversal: # CVE-2025-64446 PoC - FortiWeb Path Traversal Proof of Concept…
# CVE-2025-64446 PoC - FortiWeb Path Traversal Proof of Concept para la vulnerabilidad de path traversal en Fortinet FortiWeb que permite ejecución remota de comandos. Incluye herramienta de detec...
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE-GPT-4 Empirical Validation Results: GPT-4 120B benchmark with comprehensive Llama comparison
URL:https://github.com/IsmaIkami/rce-gpt4-validation
标签:#RCE
更新了:RCE
描述:RCE-GPT-4 Empirical Validation Results: GPT-4 120B benchmark with comprehensive Llama comparison
URL:https://github.com/IsmaIkami/rce-gpt4-validation
标签:#RCE
GitHub
GitHub - IsmaIkami/rce-gpt4-validation: RCE-GPT-4 Empirical Validation Results: GPT-4 120B benchmark with comprehensive Llama comparison
RCE-GPT-4 Empirical Validation Results: GPT-4 120B benchmark with comprehensive Llama comparison - IsmaIkami/rce-gpt4-validation
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC for the BinaryFormatter vulnerability allowing unauthenticated RCE in Microsoft Windows Server Update Service (WSUS) - CVE-2023-35317
URL:https://github.com/M507/CVE-2023-35317-PoC
标签:#RCE
更新了:RCE
描述:PoC for the BinaryFormatter vulnerability allowing unauthenticated RCE in Microsoft Windows Server Update Service (WSUS) - CVE-2023-35317
URL:https://github.com/M507/CVE-2023-35317-PoC
标签:#RCE
GitHub
GitHub - M507/CVE-2023-35317-PoC: PoC for the BinaryFormatter vulnerability allowing unauthenticated RCE in Microsoft Windows Server…
PoC for the BinaryFormatter vulnerability allowing unauthenticated RCE in Microsoft Windows Server Update Service (WSUS) - CVE-2023-35317 - M507/CVE-2023-35317-PoC
GitHub监控消息提醒!!!
更新了:免杀
描述:ZREBypass 是一款专业的免杀处理工具,支持二进制文件、Shellcode 和 Webshell 的免杀处理,集成了反调试、反虚拟机、反沙箱等多种对抗技术
URL:https://github.com/1276486/ZREBypass
标签:#免杀
更新了:免杀
描述:ZREBypass 是一款专业的免杀处理工具,支持二进制文件、Shellcode 和 Webshell 的免杀处理,集成了反调试、反虚拟机、反沙箱等多种对抗技术
URL:https://github.com/1276486/ZREBypass
标签:#免杀
GitHub
GitHub - 1276486/ZREBypass: ZREBypass 是一款专业的免杀处理工具,支持二进制文件、Shellcode 和 Webshell 的免杀处理,集成了反调试、反虚拟机、反沙箱等多种对抗技术
ZREBypass 是一款专业的免杀处理工具,支持二进制文件、Shellcode 和 Webshell 的免杀处理,集成了反调试、反虚拟机、反沙箱等多种对抗技术 - 1276486/ZREBypass
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE attack methodology, Real World Scenarios, Real LOLBin deployment etc.... FOR PROFFESSIONAL USE ONLY!
URL:https://github.com/azdabat/Offensive-Security-Methodology
标签:#RCE
更新了:RCE
描述:RCE attack methodology, Real World Scenarios, Real LOLBin deployment etc.... FOR PROFFESSIONAL USE ONLY!
URL:https://github.com/azdabat/Offensive-Security-Methodology
标签:#RCE
GitHub
azdabat/Offensive-Security-Methodology
RCE attack methodology, Real World Scenarios, Real LOLBin deployment etc.... FOR PROFFESSIONAL USE ONLY! - azdabat/Offensive-Security-Methodology
GitHub监控消息提醒!!!
更新了:RCE
描述:A complete set of tools for RCE as part of penetration tests. С2 + Implant
URL:https://github.com/AnonRedT/C2-Implant-Kworker32M
标签:#RCE
更新了:RCE
描述:A complete set of tools for RCE as part of penetration tests. С2 + Implant
URL:https://github.com/AnonRedT/C2-Implant-Kworker32M
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-64446
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-64446
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-64446
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-64446
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-64446: CVE-2025-64446
CVE-2025-64446. Contribute to B1ack4sh/Blackash-CVE-2025-64446 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-33073
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-33073
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-33073
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-33073
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-33073: CVE-2025-33073
CVE-2025-33073. Contribute to Ashwesker/Blackash-CVE-2025-33073 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A lightweight backend used to reproduce and demonstrate CVE-2025-4664
URL:https://github.com/mingijunggrape/CVE-2025-4664
标签:#CVE-2025
更新了:CVE-2025
描述:A lightweight backend used to reproduce and demonstrate CVE-2025-4664
URL:https://github.com/mingijunggrape/CVE-2025-4664
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Multi-threaded scanner for CVE-2025-12101 - Citrix NetScaler XSS
URL:https://github.com/boneys/CVE-2025-12101-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:Multi-threaded scanner for CVE-2025-12101 - Citrix NetScaler XSS
URL:https://github.com/boneys/CVE-2025-12101-Scanner
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/18524138603/React_1
标签:#信息收集
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/18524138603/React_1
标签:#信息收集
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-64328 FreePBX Authenticated Command Injection in the framework module.
URL:https://github.com/mcorybillington/CVE-2025-64328_FreePBX-framework-Command-Injection
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-64328 FreePBX Authenticated Command Injection in the framework module.
URL:https://github.com/mcorybillington/CVE-2025-64328_FreePBX-framework-Command-Injection
标签:#CVE-2025
GitHub
GitHub - mcorybillington/CVE-2025-64328_FreePBX-framework-Command-Injection: CVE-2025-64328 FreePBX Authenticated Command Injection…
CVE-2025-64328 FreePBX Authenticated Command Injection in the framework module. - mcorybillington/CVE-2025-64328_FreePBX-framework-Command-Injection
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Simple proof of concept repository for CVE-2025-34227 Nagios XI authenticated command injection in Configuration Wizard
URL:https://github.com/mcorybillington/CVE-2025-34227_Nagios-XI-Command-Injection-Configuration-Wizard
标签:#CVE-2025
更新了:CVE-2025
描述:Simple proof of concept repository for CVE-2025-34227 Nagios XI authenticated command injection in Configuration Wizard
URL:https://github.com/mcorybillington/CVE-2025-34227_Nagios-XI-Command-Injection-Configuration-Wizard
标签:#CVE-2025
GitHub
GitHub - mcorybillington/CVE-2025-34227_Nagios-XI-Command-Injection-Configuration-Wizard: Simple proof of concept repository for…
Simple proof of concept repository for CVE-2025-34227 Nagios XI authenticated command injection in Configuration Wizard - mcorybillington/CVE-2025-34227_Nagios-XI-Command-Injection-Configuration-Wi...
GitHub监控消息提醒!!!
更新了:RCE
描述:TryHackMe Blog: Injecting malicous code in the image data (Image RCE ) & directory traversal
URL:https://github.com/C1ph3r404/Blog
标签:#RCE
更新了:RCE
描述:TryHackMe Blog: Injecting malicous code in the image data (Image RCE ) & directory traversal
URL:https://github.com/C1ph3r404/Blog
标签:#RCE
GitHub
GitHub - C1ph3r404/Blog: TryHackMe Blog: Injecting malicous code in the image data (Image RCE ) & directory traversal
TryHackMe Blog: Injecting malicous code in the image data (Image RCE ) & directory traversal - GitHub - C1ph3r404/Blog: TryHackMe Blog: Injecting malicous code in the image data (Image RCE...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This script exploits CVE-2025-62369 in Xibo CMS to execute a reverse shell command.
URL:https://github.com/cristibtz/CVE-2025-62369
标签:#CVE-2025
更新了:CVE-2025
描述:This script exploits CVE-2025-62369 in Xibo CMS to execute a reverse shell command.
URL:https://github.com/cristibtz/CVE-2025-62369
标签:#CVE-2025
GitHub
cristibtz/CVE-2025-62369
This script exploits CVE-2025-62369 in Xibo CMS to execute a reverse shell command. - cristibtz/CVE-2025-62369
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE-LLM: A Relational Coherence Engine for Consistent and Energy-Efficient Language Modeling
URL:https://github.com/rbenaley/RCE
标签:#RCE
更新了:RCE
描述:RCE-LLM: A Relational Coherence Engine for Consistent and Energy-Efficient Language Modeling
URL:https://github.com/rbenaley/RCE
标签:#RCE
GitHub
GitHub - rbenaley/RCE: RCE-LLM: A Relational Coherence Engine for Consistent and Energy-Efficient Language Modeling
RCE-LLM: A Relational Coherence Engine for Consistent and Energy-Efficient Language Modeling - rbenaley/RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Practical security research project exploiting CVE-2025-32463 to gain root access on a vulnerable sudo version. Includes write-up, PoC, and mitigation steps.
URL:https://github.com/ankitpandey383/CVE-2025-32463-Sudo-Privilege-Escalation
标签:#CVE-2025
更新了:CVE-2025
描述:Practical security research project exploiting CVE-2025-32463 to gain root access on a vulnerable sudo version. Includes write-up, PoC, and mitigation steps.
URL:https://github.com/ankitpandey383/CVE-2025-32463-Sudo-Privilege-Escalation
标签:#CVE-2025
GitHub
GitHub - ankitpandey383/CVE-2025-32463-Sudo-Privilege-Escalation: Practical security research project exploiting CVE-2025-32463…
Practical security research project exploiting CVE-2025-32463 to gain root access on a vulnerable sudo version. Includes write-up, PoC, and mitigation steps. - ankitpandey383/CVE-2025-32463-Sudo-Pr...