GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-41115
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-41115
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-41115
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-41115
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-41115: CVE-2025-41115
CVE-2025-41115. Contribute to Ashwesker/Blackash-CVE-2025-41115 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Fully automated Confluence RCE exploit (CVE-2023-22527 + OGNL injection) 100% from scratch • Python • 2025
URL:https://github.com/mylo-2001/AtlassianPwn
标签:#CVE-2025
更新了:CVE-2025
描述:Fully automated Confluence RCE exploit (CVE-2023-22527 + OGNL injection) 100% from scratch • Python • 2025
URL:https://github.com/mylo-2001/AtlassianPwn
标签:#CVE-2025
GitHub
GitHub - mylo-2001/AtlassianPwn: Fully automated Confluence RCE exploit (CVE-2023-22527 + OGNL injection) 100% from scratch •…
Fully automated Confluence RCE exploit (CVE-2023-22527 + OGNL injection) 100% from scratch • Python • 2025 - mylo-2001/AtlassianPwn
GitHub监控消息提醒!!!
更新了:RCE
描述:SAP RCE auto-chain (CVE-2024-22127 + DIAG)
URL:https://github.com/mylo-2001/SAPSlayer
标签:#RCE
更新了:RCE
描述:SAP RCE auto-chain (CVE-2024-22127 + DIAG)
URL:https://github.com/mylo-2001/SAPSlayer
标签:#RCE
GitHub
GitHub - mylo-2001/SAPSlayer: SAP RCE auto-chain (CVE-2024-22127 + DIAG)
SAP RCE auto-chain (CVE-2024-22127 + DIAG). Contribute to mylo-2001/SAPSlayer development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-10680
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-10680
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-10680
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-10680
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-10680: CVE-2025-10680
CVE-2025-10680. Contribute to Ashwesker/Blackash-CVE-2025-10680 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:wafw00f批量waf识别脚本,绕过waf网站结果保存到ok1.txt中,目标文件targets.txt
URL:https://github.com/smallcat9612/wafw00fall
标签:#绕过
更新了:绕过
描述:wafw00f批量waf识别脚本,绕过waf网站结果保存到ok1.txt中,目标文件targets.txt
URL:https://github.com/smallcat9612/wafw00fall
标签:#绕过
GitHub
GitHub - smallcat9612/wafw00fall: wafw00f批量waf识别脚本,绕过waf网站结果保存到ok1.txt中,目标文件targets.txt
wafw00f批量waf识别脚本,绕过waf网站结果保存到ok1.txt中,目标文件targets.txt - smallcat9612/wafw00fall
GitHub监控消息提醒!!!
更新了:RCE
描述:A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through forged cookies.
URL:https://github.com/Mirzadzare/django-rce-exploit
标签:#RCE
更新了:RCE
描述:A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through forged cookies.
URL:https://github.com/Mirzadzare/django-rce-exploit
标签:#RCE
GitHub
GitHub - Spix0r/django-rce-exploit: A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies…
A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through forged cookies. - Spix0r/django-rce-exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Cameloo1/sharepoint-toolshell-micro-postmortem
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Cameloo1/sharepoint-toolshell-micro-postmortem
标签:#CVE-2025
GitHub
GitHub - Cameloo1/sharepoint-toolshell-micro-postmortem: Reproducible incident micro-postmortem for on-prem Microsoft SharePoint…
Reproducible incident micro-postmortem for on-prem Microsoft SharePoint “ToolShell” (CVE-2025-53770): ATT&CK snapshot, “logs that matter” table, three hunts (KQL/SPL/Sigma), first-4-hours c...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A self-contained testbed for Django CVE-2025-64459. Demonstrates QuerySet.filter() parameter injection via dictionary expansion using Docker.
URL:https://github.com/omarkurt/django-connector-CVE-2025-64459-testbed
标签:#CVE-2025
更新了:CVE-2025
描述:A self-contained testbed for Django CVE-2025-64459. Demonstrates QuerySet.filter() parameter injection via dictionary expansion using Docker.
URL:https://github.com/omarkurt/django-connector-CVE-2025-64459-testbed
标签:#CVE-2025
GitHub
GitHub - omarkurt/django-connector-CVE-2025-64459-testbed: A self-contained testbed for Django CVE-2025-64459. Demonstrates QuerySet.filter()…
A self-contained testbed for Django CVE-2025-64459. Demonstrates QuerySet.filter() parameter injection via dictionary expansion using Docker. - omarkurt/django-connector-CVE-2025-64459-testbed
👍1
GitHub监控消息提醒!!!
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/arjanchaudharyy/GarudRecon
标签:#RCE
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/arjanchaudharyy/GarudRecon
标签:#RCE
GitHub
GitHub - arjanchaudharyy/GarudRecon: An automated recon tool for asset discovery and vulnerability scanning using open-source tools.…
An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more. - arjanchaudha...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25252-POC
URL:https://github.com/mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25252-POC
URL:https://github.com/mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation
标签:#CVE-2025
GitHub
GitHub - mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation: CVE-2025-26633 (CVSS 7.8) – Zero-day MMC .msc EvilTwin LPE actively…
CVE-2025-26633 (CVSS 7.8) – Zero-day MMC .msc EvilTwin LPE actively exploited by Water Gamayun APT. PoC creates local admin via malicious MSC file on unpatched Windows 10/11/Server. Patched March 2...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP with symlink. Allows arbitrary file write when extracted as Administrator. Fixed in 7-Zip 25.00 (July 2025).
URL:https://github.com/mbanyamer/CVE-2025-11001---7-Zip
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP with symlink. Allows arbitrary file write when extracted as Administrator. Fixed in 7-Zip 25.00 (July 2025).
URL:https://github.com/mbanyamer/CVE-2025-11001---7-Zip
标签:#CVE-2025
GitHub
GitHub - mbanyamer/CVE-2025-11001---7-Zip: CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP…
CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP with symlink. Allows arbitrary file write when extracted as Administrator. Fixed in 7-Zip 25.00 (July 2025...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure for CVE-2025-50716 to CVE-2025-13543
URL:https://github.com/MooseLoveti/PostGallery-CVE-Report
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure for CVE-2025-50716 to CVE-2025-13543
URL:https://github.com/MooseLoveti/PostGallery-CVE-Report
标签:#CVE-2025
GitHub
GitHub - MooseLoveti/PostGallery-CVE-Report: Disclosure for CVE-2025-13543
Disclosure for CVE-2025-13543. Contribute to MooseLoveti/PostGallery-CVE-Report development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-10230 PoC - Samba WINS Hook Command Injection Educational Review: This script demonstrates NetBIOS Name Service (NBNS)
URL:https://github.com/nehkark/CVE-2025-10230
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-10230 PoC - Samba WINS Hook Command Injection Educational Review: This script demonstrates NetBIOS Name Service (NBNS)
URL:https://github.com/nehkark/CVE-2025-10230
标签:#CVE-2025
GitHub
GitHub - nehkark/CVE-2025-10230: CVE-2025-10230 PoC - Samba WINS Hook Command Injection
CVE-2025-10230 PoC - Samba WINS Hook Command Injection - GitHub - nehkark/CVE-2025-10230: CVE-2025-10230 PoC - Samba WINS Hook Command Injection
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-64087 (SSTI)
URL:https://github.com/AT190510-Cuong/CVE-2025-64087-SSTI-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-64087 (SSTI)
URL:https://github.com/AT190510-Cuong/CVE-2025-64087-SSTI-
标签:#CVE-2025
GitHub
GitHub - AT190510-Cuong/CVE-2025-64087-SSTI-: CVE-2025-64087 (SSTI)
CVE-2025-64087 (SSTI). Contribute to AT190510-Cuong/CVE-2025-64087-SSTI- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65482 (XXE)
URL:https://github.com/AT190510-Cuong/CVE-2025-65482-XXE-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65482 (XXE)
URL:https://github.com/AT190510-Cuong/CVE-2025-65482-XXE-
标签:#CVE-2025
GitHub
GitHub - AT190510-Cuong/CVE-2025-65482-XXE-: CVE-2025-65482 (XXE)
CVE-2025-65482 (XXE). Contribute to AT190510-Cuong/CVE-2025-65482-XXE- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:I have created AegisJava, a tool to fix (detect and mitigate) CVE-2025-30749.
URL:https://github.com/rashedhasan090/AegisJava
标签:#CVE-2025
更新了:CVE-2025
描述:I have created AegisJava, a tool to fix (detect and mitigate) CVE-2025-30749.
URL:https://github.com/rashedhasan090/AegisJava
标签:#CVE-2025
GitHub
GitHub - rashedhasan090/AegisJava: I have created AegisJava, a tool to fix (detect and mitigate) CVE-2025-30749.
I have created AegisJava, a tool to fix (detect and mitigate) CVE-2025-30749. - rashedhasan090/AegisJava
GitHub监控消息提醒!!!
更新了:渗透测试
描述:蓝莲花XSS在线平台 (https://xss.li) 是一款完全免费开源的专业Web安全测试工具,专注于XSS(跨站脚本)漏洞检测与渗透测试。平台采用赛博朋克风格设计,提供实时监控、智能Payload管理、详细日志分析等强大功能,是安全研究人员、渗透测试工程师和CTF选手的首选工具。
URL:https://github.com/Hire-Hackers-Services/2025-XSS-
标签:#渗透测试
更新了:渗透测试
描述:蓝莲花XSS在线平台 (https://xss.li) 是一款完全免费开源的专业Web安全测试工具,专注于XSS(跨站脚本)漏洞检测与渗透测试。平台采用赛博朋克风格设计,提供实时监控、智能Payload管理、详细日志分析等强大功能,是安全研究人员、渗透测试工程师和CTF选手的首选工具。
URL:https://github.com/Hire-Hackers-Services/2025-XSS-
标签:#渗透测试
蓝莲花XSS在线平台
蓝莲花XSS在线平台 - 专业Web安全测试工具
免费开源的XSS漏洞检测平台,支持实时监控、Payload管理、日志分析。让Web安全测试更简单高效。
GitHub监控消息提醒!!!
更新了:渗透测试
描述:蓝莲花XSS在线平台 (https://xss.li) 是一款完全免费开源的专业Web安全测试工具,专注于XSS(跨站脚本)漏洞检测与渗透测试。平台采用赛博朋克风格设计,提供实时监控、智能Payload管理、详细日志分析等强大功能,是安全研究人员、渗透测试工程师和CTF选手的首选工具。
URL:https://github.com/Hire-Hackers-Services/2026-XSS--platform
标签:#渗透测试
更新了:渗透测试
描述:蓝莲花XSS在线平台 (https://xss.li) 是一款完全免费开源的专业Web安全测试工具,专注于XSS(跨站脚本)漏洞检测与渗透测试。平台采用赛博朋克风格设计,提供实时监控、智能Payload管理、详细日志分析等强大功能,是安全研究人员、渗透测试工程师和CTF选手的首选工具。
URL:https://github.com/Hire-Hackers-Services/2026-XSS--platform
标签:#渗透测试
蓝莲花XSS在线平台
蓝莲花XSS在线平台 - 专业Web安全测试工具
免费开源的XSS漏洞检测平台,支持实时监控、Payload管理、日志分析。让Web安全测试更简单高效。