GitHub监控消息提醒!!!
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/arjanchaudharyy/GarudRecon
标签:#RCE
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/arjanchaudharyy/GarudRecon
标签:#RCE
GitHub
GitHub - arjanchaudharyy/GarudRecon: An automated recon tool for asset discovery and vulnerability scanning using open-source tools.…
An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more. - arjanchaudha...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25252-POC
URL:https://github.com/mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25252-POC
URL:https://github.com/mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation
标签:#CVE-2025
GitHub
GitHub - mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation: CVE-2025-26633 (CVSS 7.8) – Zero-day MMC .msc EvilTwin LPE actively…
CVE-2025-26633 (CVSS 7.8) – Zero-day MMC .msc EvilTwin LPE actively exploited by Water Gamayun APT. PoC creates local admin via malicious MSC file on unpatched Windows 10/11/Server. Patched March 2...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP with symlink. Allows arbitrary file write when extracted as Administrator. Fixed in 7-Zip 25.00 (July 2025).
URL:https://github.com/mbanyamer/CVE-2025-11001---7-Zip
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP with symlink. Allows arbitrary file write when extracted as Administrator. Fixed in 7-Zip 25.00 (July 2025).
URL:https://github.com/mbanyamer/CVE-2025-11001---7-Zip
标签:#CVE-2025
GitHub
GitHub - mbanyamer/CVE-2025-11001---7-Zip: CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP…
CVE-2025-11001 (CVSS 7.0) – 7-Zip < 25.00 Directory Traversal → RCE via crafted ZIP with symlink. Allows arbitrary file write when extracted as Administrator. Fixed in 7-Zip 25.00 (July 2025...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure for CVE-2025-50716 to CVE-2025-13543
URL:https://github.com/MooseLoveti/PostGallery-CVE-Report
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure for CVE-2025-50716 to CVE-2025-13543
URL:https://github.com/MooseLoveti/PostGallery-CVE-Report
标签:#CVE-2025
GitHub
GitHub - MooseLoveti/PostGallery-CVE-Report: Disclosure for CVE-2025-13543
Disclosure for CVE-2025-13543. Contribute to MooseLoveti/PostGallery-CVE-Report development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-10230 PoC - Samba WINS Hook Command Injection Educational Review: This script demonstrates NetBIOS Name Service (NBNS)
URL:https://github.com/nehkark/CVE-2025-10230
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-10230 PoC - Samba WINS Hook Command Injection Educational Review: This script demonstrates NetBIOS Name Service (NBNS)
URL:https://github.com/nehkark/CVE-2025-10230
标签:#CVE-2025
GitHub
GitHub - nehkark/CVE-2025-10230: CVE-2025-10230 PoC - Samba WINS Hook Command Injection
CVE-2025-10230 PoC - Samba WINS Hook Command Injection - GitHub - nehkark/CVE-2025-10230: CVE-2025-10230 PoC - Samba WINS Hook Command Injection
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-64087 (SSTI)
URL:https://github.com/AT190510-Cuong/CVE-2025-64087-SSTI-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-64087 (SSTI)
URL:https://github.com/AT190510-Cuong/CVE-2025-64087-SSTI-
标签:#CVE-2025
GitHub
GitHub - AT190510-Cuong/CVE-2025-64087-SSTI-: CVE-2025-64087 (SSTI)
CVE-2025-64087 (SSTI). Contribute to AT190510-Cuong/CVE-2025-64087-SSTI- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65482 (XXE)
URL:https://github.com/AT190510-Cuong/CVE-2025-65482-XXE-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65482 (XXE)
URL:https://github.com/AT190510-Cuong/CVE-2025-65482-XXE-
标签:#CVE-2025
GitHub
GitHub - AT190510-Cuong/CVE-2025-65482-XXE-: CVE-2025-65482 (XXE)
CVE-2025-65482 (XXE). Contribute to AT190510-Cuong/CVE-2025-65482-XXE- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:I have created AegisJava, a tool to fix (detect and mitigate) CVE-2025-30749.
URL:https://github.com/rashedhasan090/AegisJava
标签:#CVE-2025
更新了:CVE-2025
描述:I have created AegisJava, a tool to fix (detect and mitigate) CVE-2025-30749.
URL:https://github.com/rashedhasan090/AegisJava
标签:#CVE-2025
GitHub
GitHub - rashedhasan090/AegisJava: I have created AegisJava, a tool to fix (detect and mitigate) CVE-2025-30749.
I have created AegisJava, a tool to fix (detect and mitigate) CVE-2025-30749. - rashedhasan090/AegisJava
GitHub监控消息提醒!!!
更新了:渗透测试
描述:蓝莲花XSS在线平台 (https://xss.li) 是一款完全免费开源的专业Web安全测试工具,专注于XSS(跨站脚本)漏洞检测与渗透测试。平台采用赛博朋克风格设计,提供实时监控、智能Payload管理、详细日志分析等强大功能,是安全研究人员、渗透测试工程师和CTF选手的首选工具。
URL:https://github.com/Hire-Hackers-Services/2025-XSS-
标签:#渗透测试
更新了:渗透测试
描述:蓝莲花XSS在线平台 (https://xss.li) 是一款完全免费开源的专业Web安全测试工具,专注于XSS(跨站脚本)漏洞检测与渗透测试。平台采用赛博朋克风格设计,提供实时监控、智能Payload管理、详细日志分析等强大功能,是安全研究人员、渗透测试工程师和CTF选手的首选工具。
URL:https://github.com/Hire-Hackers-Services/2025-XSS-
标签:#渗透测试
蓝莲花XSS在线平台
蓝莲花XSS在线平台 - 专业Web安全测试工具
免费开源的XSS漏洞检测平台,支持实时监控、Payload管理、日志分析。让Web安全测试更简单高效。
GitHub监控消息提醒!!!
更新了:渗透测试
描述:蓝莲花XSS在线平台 (https://xss.li) 是一款完全免费开源的专业Web安全测试工具,专注于XSS(跨站脚本)漏洞检测与渗透测试。平台采用赛博朋克风格设计,提供实时监控、智能Payload管理、详细日志分析等强大功能,是安全研究人员、渗透测试工程师和CTF选手的首选工具。
URL:https://github.com/Hire-Hackers-Services/2026-XSS--platform
标签:#渗透测试
更新了:渗透测试
描述:蓝莲花XSS在线平台 (https://xss.li) 是一款完全免费开源的专业Web安全测试工具,专注于XSS(跨站脚本)漏洞检测与渗透测试。平台采用赛博朋克风格设计,提供实时监控、智能Payload管理、详细日志分析等强大功能,是安全研究人员、渗透测试工程师和CTF选手的首选工具。
URL:https://github.com/Hire-Hackers-Services/2026-XSS--platform
标签:#渗透测试
蓝莲花XSS在线平台
蓝莲花XSS在线平台 - 专业Web安全测试工具
免费开源的XSS漏洞检测平台,支持实时监控、Payload管理、日志分析。让Web安全测试更简单高效。
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8943
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-8943
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8943
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-8943
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-8943: CVE-2025-8943
CVE-2025-8943. Contribute to Ashwesker/Blackash-CVE-2025-8943 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Testing if AWS exploit CVE-2025-2598 still works
URL:https://github.com/Catnip-Express-Maxim/AWSTESTEXPLOIT
标签:#CVE-2025
更新了:CVE-2025
描述:Testing if AWS exploit CVE-2025-2598 still works
URL:https://github.com/Catnip-Express-Maxim/AWSTESTEXPLOIT
标签:#CVE-2025
GitHub
GitHub - Catnip-Express-Maxim/AWSTESTEXPLOIT: Testing if AWS exploit CVE-2025-2598 still works
Testing if AWS exploit CVE-2025-2598 still works. Contribute to Catnip-Express-Maxim/AWSTESTEXPLOIT development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一款用于红队功放演练协作、渗透测试漏洞生命周期管理平台
URL:https://github.com/ChinaRan0/Red_Team_Collaboration
标签:#渗透测试
更新了:渗透测试
描述:一款用于红队功放演练协作、渗透测试漏洞生命周期管理平台
URL:https://github.com/ChinaRan0/Red_Team_Collaboration
标签:#渗透测试
GitHub
GitHub - ChinaRan0/Red_Team_Collaboration: 一款用于红队攻防演练协作、渗透测试漏洞生命周期管理平台
一款用于红队攻防演练协作、渗透测试漏洞生命周期管理平台. Contribute to ChinaRan0/Red_Team_Collaboration development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:TL-Rustscan是由天禄实验室开发的一款基于 Rust 编写的高性能、高并发端口扫描命令行工具。专为攻防演练、资产摸排和渗透测试设计,旨在提供快速、稳定且易于集成的端口探测能力。
URL:https://github.com/tianlusec/TL-Rustscan
标签:#渗透测试
更新了:渗透测试
描述:TL-Rustscan是由天禄实验室开发的一款基于 Rust 编写的高性能、高并发端口扫描命令行工具。专为攻防演练、资产摸排和渗透测试设计,旨在提供快速、稳定且易于集成的端口探测能力。
URL:https://github.com/tianlusec/TL-Rustscan
标签:#渗透测试
GitHub
GitHub - tianlusec/TL-Rustscan: TL-Rustscan是由天禄实验室开发的一款基于 Rust 编写的高性能、高并发端口扫描命令行工具。专为攻防演练、资产摸排和渗透测试设计,旨在提供快速、稳定且易于集成的端口探测能力。
TL-Rustscan是由天禄实验室开发的一款基于 Rust 编写的高性能、高并发端口扫描命令行工具。专为攻防演练、资产摸排和渗透测试设计,旨在提供快速、稳定且易于集成的端口探测能力。 - tianlusec/TL-Rustscan
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-11001
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-11001
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-11001
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-11001
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-11001: CVE-2025-11001
CVE-2025-11001. Contribute to Ashwesker/Blackash-CVE-2025-11001 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:交互式网络安全教学模拟器 - 学习抓包、逆向与漏洞利用 | Interactive Web Security Training Simulator
URL:https://github.com/yehan-s/netrunner-academy
标签:#漏洞利用
更新了:漏洞利用
描述:交互式网络安全教学模拟器 - 学习抓包、逆向与漏洞利用 | Interactive Web Security Training Simulator
URL:https://github.com/yehan-s/netrunner-academy
标签:#漏洞利用
GitHub
GitHub - yehan-s/netrunner-academy: 交互式网络安全教学模拟器 - 学习抓包、逆向与漏洞利用 | Interactive Web Security Training Simulator
交互式网络安全教学模拟器 - 学习抓包、逆向与漏洞利用 | Interactive Web Security Training Simulator - yehan-s/netrunner-academy
GitHub监控消息提醒!!!
更新了:Red Team
描述:This repository is a structured collection of Red Team automation projects, scripts, and labs to keep my progress hands-on and not only theorical.
URL:https://github.com/bohmiiidd/Cage2Host
标签:#Red Team
更新了:Red Team
描述:This repository is a structured collection of Red Team automation projects, scripts, and labs to keep my progress hands-on and not only theorical.
URL:https://github.com/bohmiiidd/Cage2Host
标签:#Red Team
GitHub
GitHub - bohmiiidd/Cage2Host: Offensive container‑escape toolkit for red teams. Automatically hunts and exploits Docker socket…
Offensive container‑escape toolkit for red teams. Automatically hunts and exploits Docker socket abuse, privileged containers, host mounts, and breakout vectors. Modular, stealthy, and engineered f...