GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/md5sum-xjh/BS-vulscan
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/md5sum-xjh/BS-vulscan
标签:#RCE
GitHub
GitHub - md5sum-xjh/BS-vulscan: 该工具采用Python和Django技术体系作为Web应用层的支撑架构,确保系统的稳定性和可扩展性。为了实现目录探测功能,引入了Dirsearch工具,对目标网站进行全面的目录扫描。同时,…
该工具采用Python和Django技术体系作为Web应用层的支撑架构,确保系统的稳定性和可扩展性。为了实现目录探测功能,引入了Dirsearch工具,对目标网站进行全面的目录扫描。同时,调用AWVS接口为漏洞扫描功能提供强有力的技术支撑。该扫描工具利用目录扫描、子域名扫描、指纹识别以及端口扫描等常见Web渗透测试技术,结合网络爬虫实现了对Web应用系统漏洞的全面检测。针对常见的跨站脚本攻击...
GitHub监控消息提醒!!!
更新了:RCE
描述:Client-RCE-HAU-22CN2-NHOM1
URL:https://github.com/vitcoder131/Client
标签:#RCE
更新了:RCE
描述:Client-RCE-HAU-22CN2-NHOM1
URL:https://github.com/vitcoder131/Client
标签:#RCE
GitHub
GitHub - vitcoder131/Client: Client-RCE-HAU-22CN2-NHOM1
Client-RCE-HAU-22CN2-NHOM1. Contribute to vitcoder131/Client development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-9242
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-9242
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-9242
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-9242
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-9242: CVE-2025-9242
CVE-2025-9242. Contribute to Ashwesker/Blackash-CVE-2025-9242 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-40547
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-40547
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-40547
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-40547
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-40547: CVE-2025-40547
CVE-2025-40547. Contribute to Ashwesker/Blackash-CVE-2025-40547 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Oracle Identity Manager 远程代码执行漏洞CVE-2025-61757
URL:https://github.com/Jinxia62/Oracle-Identity-Manager-CVE-2025-61757
标签:#CVE-2025
更新了:CVE-2025
描述:Oracle Identity Manager 远程代码执行漏洞CVE-2025-61757
URL:https://github.com/Jinxia62/Oracle-Identity-Manager-CVE-2025-61757
标签:#CVE-2025
GitHub
GitHub - Jinxia62/Oracle-Identity-Manager-CVE-2025-61757: Oracle Identity Manager 远程代码执行漏洞CVE-2025-61757
Oracle Identity Manager 远程代码执行漏洞CVE-2025-61757. Contribute to Jinxia62/Oracle-Identity-Manager-CVE-2025-61757 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-41115
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-41115
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-41115
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-41115
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-41115: CVE-2025-41115
CVE-2025-41115. Contribute to Ashwesker/Blackash-CVE-2025-41115 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Fully automated Confluence RCE exploit (CVE-2023-22527 + OGNL injection) 100% from scratch • Python • 2025
URL:https://github.com/mylo-2001/AtlassianPwn
标签:#CVE-2025
更新了:CVE-2025
描述:Fully automated Confluence RCE exploit (CVE-2023-22527 + OGNL injection) 100% from scratch • Python • 2025
URL:https://github.com/mylo-2001/AtlassianPwn
标签:#CVE-2025
GitHub
GitHub - mylo-2001/AtlassianPwn: Fully automated Confluence RCE exploit (CVE-2023-22527 + OGNL injection) 100% from scratch •…
Fully automated Confluence RCE exploit (CVE-2023-22527 + OGNL injection) 100% from scratch • Python • 2025 - mylo-2001/AtlassianPwn
GitHub监控消息提醒!!!
更新了:RCE
描述:SAP RCE auto-chain (CVE-2024-22127 + DIAG)
URL:https://github.com/mylo-2001/SAPSlayer
标签:#RCE
更新了:RCE
描述:SAP RCE auto-chain (CVE-2024-22127 + DIAG)
URL:https://github.com/mylo-2001/SAPSlayer
标签:#RCE
GitHub
GitHub - mylo-2001/SAPSlayer: SAP RCE auto-chain (CVE-2024-22127 + DIAG)
SAP RCE auto-chain (CVE-2024-22127 + DIAG). Contribute to mylo-2001/SAPSlayer development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-10680
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-10680
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-10680
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-10680
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-10680: CVE-2025-10680
CVE-2025-10680. Contribute to Ashwesker/Blackash-CVE-2025-10680 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:wafw00f批量waf识别脚本,绕过waf网站结果保存到ok1.txt中,目标文件targets.txt
URL:https://github.com/smallcat9612/wafw00fall
标签:#绕过
更新了:绕过
描述:wafw00f批量waf识别脚本,绕过waf网站结果保存到ok1.txt中,目标文件targets.txt
URL:https://github.com/smallcat9612/wafw00fall
标签:#绕过
GitHub
GitHub - smallcat9612/wafw00fall: wafw00f批量waf识别脚本,绕过waf网站结果保存到ok1.txt中,目标文件targets.txt
wafw00f批量waf识别脚本,绕过waf网站结果保存到ok1.txt中,目标文件targets.txt - smallcat9612/wafw00fall
GitHub监控消息提醒!!!
更新了:RCE
描述:A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through forged cookies.
URL:https://github.com/Mirzadzare/django-rce-exploit
标签:#RCE
更新了:RCE
描述:A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through forged cookies.
URL:https://github.com/Mirzadzare/django-rce-exploit
标签:#RCE
GitHub
GitHub - Spix0r/django-rce-exploit: A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies…
A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through forged cookies. - Spix0r/django-rce-exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Cameloo1/sharepoint-toolshell-micro-postmortem
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Cameloo1/sharepoint-toolshell-micro-postmortem
标签:#CVE-2025
GitHub
GitHub - Cameloo1/sharepoint-toolshell-micro-postmortem: Reproducible incident micro-postmortem for on-prem Microsoft SharePoint…
Reproducible incident micro-postmortem for on-prem Microsoft SharePoint “ToolShell” (CVE-2025-53770): ATT&CK snapshot, “logs that matter” table, three hunts (KQL/SPL/Sigma), first-4-hours c...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A self-contained testbed for Django CVE-2025-64459. Demonstrates QuerySet.filter() parameter injection via dictionary expansion using Docker.
URL:https://github.com/omarkurt/django-connector-CVE-2025-64459-testbed
标签:#CVE-2025
更新了:CVE-2025
描述:A self-contained testbed for Django CVE-2025-64459. Demonstrates QuerySet.filter() parameter injection via dictionary expansion using Docker.
URL:https://github.com/omarkurt/django-connector-CVE-2025-64459-testbed
标签:#CVE-2025
GitHub
GitHub - omarkurt/django-connector-CVE-2025-64459-testbed: A self-contained testbed for Django CVE-2025-64459. Demonstrates QuerySet.filter()…
A self-contained testbed for Django CVE-2025-64459. Demonstrates QuerySet.filter() parameter injection via dictionary expansion using Docker. - omarkurt/django-connector-CVE-2025-64459-testbed
👍1
GitHub监控消息提醒!!!
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/arjanchaudharyy/GarudRecon
标签:#RCE
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/arjanchaudharyy/GarudRecon
标签:#RCE
GitHub
GitHub - arjanchaudharyy/GarudRecon: An automated recon tool for asset discovery and vulnerability scanning using open-source tools.…
An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more. - arjanchaudha...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25252-POC
URL:https://github.com/mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25252-POC
URL:https://github.com/mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation
标签:#CVE-2025
GitHub
GitHub - mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation: CVE-2025-26633 (CVSS 7.8) – Zero-day MMC .msc EvilTwin LPE actively…
CVE-2025-26633 (CVSS 7.8) – Zero-day MMC .msc EvilTwin LPE actively exploited by Water Gamayun APT. PoC creates local admin via malicious MSC file on unpatched Windows 10/11/Server. Patched March 2...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP with symlink. Allows arbitrary file write when extracted as Administrator. Fixed in 7-Zip 25.00 (July 2025).
URL:https://github.com/mbanyamer/CVE-2025-11001---7-Zip
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP with symlink. Allows arbitrary file write when extracted as Administrator. Fixed in 7-Zip 25.00 (July 2025).
URL:https://github.com/mbanyamer/CVE-2025-11001---7-Zip
标签:#CVE-2025
GitHub
GitHub - mbanyamer/CVE-2025-11001---7-Zip: CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP…
CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP with symlink. Allows arbitrary file write when extracted as Administrator. Fixed in 7-Zip 25.00 (July 2025...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure for CVE-2025-50716 to CVE-2025-13543
URL:https://github.com/MooseLoveti/PostGallery-CVE-Report
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure for CVE-2025-50716 to CVE-2025-13543
URL:https://github.com/MooseLoveti/PostGallery-CVE-Report
标签:#CVE-2025
GitHub
GitHub - MooseLoveti/PostGallery-CVE-Report: Disclosure for CVE-2025-13543
Disclosure for CVE-2025-13543. Contribute to MooseLoveti/PostGallery-CVE-Report development by creating an account on GitHub.