GitHub监控消息提醒!!!
更新了:RCE
描述:A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through forged cookies.
URL:https://github.com/Mirzadzare/django-rce-exploit
标签:#RCE
更新了:RCE
描述:A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through forged cookies.
URL:https://github.com/Mirzadzare/django-rce-exploit
标签:#RCE
GitHub
GitHub - Spix0r/django-rce-exploit: A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies…
A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through forged cookies. - Spix0r/django-rce-exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Cameloo1/sharepoint-toolshell-micro-postmortem
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Cameloo1/sharepoint-toolshell-micro-postmortem
标签:#CVE-2025
GitHub
GitHub - Cameloo1/sharepoint-toolshell-micro-postmortem: Reproducible incident micro-postmortem for on-prem Microsoft SharePoint…
Reproducible incident micro-postmortem for on-prem Microsoft SharePoint “ToolShell” (CVE-2025-53770): ATT&CK snapshot, “logs that matter” table, three hunts (KQL/SPL/Sigma), first-4-hours c...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A self-contained testbed for Django CVE-2025-64459. Demonstrates QuerySet.filter() parameter injection via dictionary expansion using Docker.
URL:https://github.com/omarkurt/django-connector-CVE-2025-64459-testbed
标签:#CVE-2025
更新了:CVE-2025
描述:A self-contained testbed for Django CVE-2025-64459. Demonstrates QuerySet.filter() parameter injection via dictionary expansion using Docker.
URL:https://github.com/omarkurt/django-connector-CVE-2025-64459-testbed
标签:#CVE-2025
GitHub
GitHub - omarkurt/django-connector-CVE-2025-64459-testbed: A self-contained testbed for Django CVE-2025-64459. Demonstrates QuerySet.filter()…
A self-contained testbed for Django CVE-2025-64459. Demonstrates QuerySet.filter() parameter injection via dictionary expansion using Docker. - omarkurt/django-connector-CVE-2025-64459-testbed
👍1
GitHub监控消息提醒!!!
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/arjanchaudharyy/GarudRecon
标签:#RCE
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/arjanchaudharyy/GarudRecon
标签:#RCE
GitHub
GitHub - arjanchaudharyy/GarudRecon: An automated recon tool for asset discovery and vulnerability scanning using open-source tools.…
An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more. - arjanchaudha...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25252-POC
URL:https://github.com/mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25252-POC
URL:https://github.com/mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation
标签:#CVE-2025
GitHub
GitHub - mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation: CVE-2025-26633 (CVSS 7.8) – Zero-day MMC .msc EvilTwin LPE actively…
CVE-2025-26633 (CVSS 7.8) – Zero-day MMC .msc EvilTwin LPE actively exploited by Water Gamayun APT. PoC creates local admin via malicious MSC file on unpatched Windows 10/11/Server. Patched March 2...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP with symlink. Allows arbitrary file write when extracted as Administrator. Fixed in 7-Zip 25.00 (July 2025).
URL:https://github.com/mbanyamer/CVE-2025-11001---7-Zip
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP with symlink. Allows arbitrary file write when extracted as Administrator. Fixed in 7-Zip 25.00 (July 2025).
URL:https://github.com/mbanyamer/CVE-2025-11001---7-Zip
标签:#CVE-2025
GitHub
GitHub - mbanyamer/CVE-2025-11001---7-Zip: CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP…
CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP with symlink. Allows arbitrary file write when extracted as Administrator. Fixed in 7-Zip 25.00 (July 2025...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure for CVE-2025-50716 to CVE-2025-13543
URL:https://github.com/MooseLoveti/PostGallery-CVE-Report
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure for CVE-2025-50716 to CVE-2025-13543
URL:https://github.com/MooseLoveti/PostGallery-CVE-Report
标签:#CVE-2025
GitHub
GitHub - MooseLoveti/PostGallery-CVE-Report: Disclosure for CVE-2025-13543
Disclosure for CVE-2025-13543. Contribute to MooseLoveti/PostGallery-CVE-Report development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-10230 PoC - Samba WINS Hook Command Injection Educational Review: This script demonstrates NetBIOS Name Service (NBNS)
URL:https://github.com/nehkark/CVE-2025-10230
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-10230 PoC - Samba WINS Hook Command Injection Educational Review: This script demonstrates NetBIOS Name Service (NBNS)
URL:https://github.com/nehkark/CVE-2025-10230
标签:#CVE-2025
GitHub
GitHub - nehkark/CVE-2025-10230: CVE-2025-10230 PoC - Samba WINS Hook Command Injection
CVE-2025-10230 PoC - Samba WINS Hook Command Injection - GitHub - nehkark/CVE-2025-10230: CVE-2025-10230 PoC - Samba WINS Hook Command Injection
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-64087 (SSTI)
URL:https://github.com/AT190510-Cuong/CVE-2025-64087-SSTI-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-64087 (SSTI)
URL:https://github.com/AT190510-Cuong/CVE-2025-64087-SSTI-
标签:#CVE-2025
GitHub
GitHub - AT190510-Cuong/CVE-2025-64087-SSTI-: CVE-2025-64087 (SSTI)
CVE-2025-64087 (SSTI). Contribute to AT190510-Cuong/CVE-2025-64087-SSTI- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65482 (XXE)
URL:https://github.com/AT190510-Cuong/CVE-2025-65482-XXE-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65482 (XXE)
URL:https://github.com/AT190510-Cuong/CVE-2025-65482-XXE-
标签:#CVE-2025
GitHub
GitHub - AT190510-Cuong/CVE-2025-65482-XXE-: CVE-2025-65482 (XXE)
CVE-2025-65482 (XXE). Contribute to AT190510-Cuong/CVE-2025-65482-XXE- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:I have created AegisJava, a tool to fix (detect and mitigate) CVE-2025-30749.
URL:https://github.com/rashedhasan090/AegisJava
标签:#CVE-2025
更新了:CVE-2025
描述:I have created AegisJava, a tool to fix (detect and mitigate) CVE-2025-30749.
URL:https://github.com/rashedhasan090/AegisJava
标签:#CVE-2025
GitHub
GitHub - rashedhasan090/AegisJava: I have created AegisJava, a tool to fix (detect and mitigate) CVE-2025-30749.
I have created AegisJava, a tool to fix (detect and mitigate) CVE-2025-30749. - rashedhasan090/AegisJava
GitHub监控消息提醒!!!
更新了:渗透测试
描述:蓝莲花XSS在线平台 (https://xss.li) 是一款完全免费开源的专业Web安全测试工具,专注于XSS(跨站脚本)漏洞检测与渗透测试。平台采用赛博朋克风格设计,提供实时监控、智能Payload管理、详细日志分析等强大功能,是安全研究人员、渗透测试工程师和CTF选手的首选工具。
URL:https://github.com/Hire-Hackers-Services/2025-XSS-
标签:#渗透测试
更新了:渗透测试
描述:蓝莲花XSS在线平台 (https://xss.li) 是一款完全免费开源的专业Web安全测试工具,专注于XSS(跨站脚本)漏洞检测与渗透测试。平台采用赛博朋克风格设计,提供实时监控、智能Payload管理、详细日志分析等强大功能,是安全研究人员、渗透测试工程师和CTF选手的首选工具。
URL:https://github.com/Hire-Hackers-Services/2025-XSS-
标签:#渗透测试
蓝莲花XSS在线平台
蓝莲花XSS在线平台 - 专业Web安全测试工具
免费开源的XSS漏洞检测平台,支持实时监控、Payload管理、日志分析。让Web安全测试更简单高效。
GitHub监控消息提醒!!!
更新了:渗透测试
描述:蓝莲花XSS在线平台 (https://xss.li) 是一款完全免费开源的专业Web安全测试工具,专注于XSS(跨站脚本)漏洞检测与渗透测试。平台采用赛博朋克风格设计,提供实时监控、智能Payload管理、详细日志分析等强大功能,是安全研究人员、渗透测试工程师和CTF选手的首选工具。
URL:https://github.com/Hire-Hackers-Services/2026-XSS--platform
标签:#渗透测试
更新了:渗透测试
描述:蓝莲花XSS在线平台 (https://xss.li) 是一款完全免费开源的专业Web安全测试工具,专注于XSS(跨站脚本)漏洞检测与渗透测试。平台采用赛博朋克风格设计,提供实时监控、智能Payload管理、详细日志分析等强大功能,是安全研究人员、渗透测试工程师和CTF选手的首选工具。
URL:https://github.com/Hire-Hackers-Services/2026-XSS--platform
标签:#渗透测试
蓝莲花XSS在线平台
蓝莲花XSS在线平台 - 专业Web安全测试工具
免费开源的XSS漏洞检测平台,支持实时监控、Payload管理、日志分析。让Web安全测试更简单高效。
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8943
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-8943
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8943
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-8943
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-8943: CVE-2025-8943
CVE-2025-8943. Contribute to Ashwesker/Blackash-CVE-2025-8943 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Testing if AWS exploit CVE-2025-2598 still works
URL:https://github.com/Catnip-Express-Maxim/AWSTESTEXPLOIT
标签:#CVE-2025
更新了:CVE-2025
描述:Testing if AWS exploit CVE-2025-2598 still works
URL:https://github.com/Catnip-Express-Maxim/AWSTESTEXPLOIT
标签:#CVE-2025
GitHub
GitHub - Catnip-Express-Maxim/AWSTESTEXPLOIT: Testing if AWS exploit CVE-2025-2598 still works
Testing if AWS exploit CVE-2025-2598 still works. Contribute to Catnip-Express-Maxim/AWSTESTEXPLOIT development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一款用于红队功放演练协作、渗透测试漏洞生命周期管理平台
URL:https://github.com/ChinaRan0/Red_Team_Collaboration
标签:#渗透测试
更新了:渗透测试
描述:一款用于红队功放演练协作、渗透测试漏洞生命周期管理平台
URL:https://github.com/ChinaRan0/Red_Team_Collaboration
标签:#渗透测试
GitHub
GitHub - ChinaRan0/Red_Team_Collaboration: 一款用于红队攻防演练协作、渗透测试漏洞生命周期管理平台
一款用于红队攻防演练协作、渗透测试漏洞生命周期管理平台. Contribute to ChinaRan0/Red_Team_Collaboration development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:TL-Rustscan是由天禄实验室开发的一款基于 Rust 编写的高性能、高并发端口扫描命令行工具。专为攻防演练、资产摸排和渗透测试设计,旨在提供快速、稳定且易于集成的端口探测能力。
URL:https://github.com/tianlusec/TL-Rustscan
标签:#渗透测试
更新了:渗透测试
描述:TL-Rustscan是由天禄实验室开发的一款基于 Rust 编写的高性能、高并发端口扫描命令行工具。专为攻防演练、资产摸排和渗透测试设计,旨在提供快速、稳定且易于集成的端口探测能力。
URL:https://github.com/tianlusec/TL-Rustscan
标签:#渗透测试
GitHub
GitHub - tianlusec/TL-Rustscan: TL-Rustscan是由天禄实验室开发的一款基于 Rust 编写的高性能、高并发端口扫描命令行工具。专为攻防演练、资产摸排和渗透测试设计,旨在提供快速、稳定且易于集成的端口探测能力。
TL-Rustscan是由天禄实验室开发的一款基于 Rust 编写的高性能、高并发端口扫描命令行工具。专为攻防演练、资产摸排和渗透测试设计,旨在提供快速、稳定且易于集成的端口探测能力。 - tianlusec/TL-Rustscan