GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29306
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-29306
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29306
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-29306
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-29306: CVE-2025-29306
CVE-2025-29306. Contribute to Ashwesker/Blackash-CVE-2025-29306 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A public repository containing comprehensive mitigations for currently active RCE exploits in COD games.
URL:https://github.com/Peribunt/COD-RCE-Mitigations
标签:#RCE
更新了:RCE
描述:A public repository containing comprehensive mitigations for currently active RCE exploits in COD games.
URL:https://github.com/Peribunt/COD-RCE-Mitigations
标签:#RCE
GitHub
GitHub - Peribunt/COD-RCE-Mitigations: A public repository containing comprehensive mitigations for currently active RCE exploits…
A public repository containing comprehensive mitigations for currently active RCE exploits in COD games. - Peribunt/COD-RCE-Mitigations
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:automation untuk CVE-2025-65862
URL:https://github.com/rimbadirgantara/opac-fast-automation
标签:#CVE-2025
更新了:CVE-2025
描述:automation untuk CVE-2025-65862
URL:https://github.com/rimbadirgantara/opac-fast-automation
标签:#CVE-2025
GitHub
GitHub - rimbadirgantara/opac-fast-automation: automation untuk CVE-2025-65862
automation untuk CVE-2025-65862. Contribute to rimbadirgantara/opac-fast-automation development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:maybe the first poc for CVE-2025-38678?
URL:https://github.com/guard-wait/CVE-2025-38678_POC
标签:#CVE-2025
更新了:CVE-2025
描述:maybe the first poc for CVE-2025-38678?
URL:https://github.com/guard-wait/CVE-2025-38678_POC
标签:#CVE-2025
GitHub
GitHub - guard-wait/CVE-2025-38678_POC: maybe the first poc for CVE-2025-38678?
maybe the first poc for CVE-2025-38678? Contribute to guard-wait/CVE-2025-38678_POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:Serde 是一个 高效和通用的序列化和反序列化Rust数据结构的框架。
URL:https://github.com/hepengpeng/-Python-
标签:#反序列化
更新了:反序列化
描述:Serde 是一个 高效和通用的序列化和反序列化Rust数据结构的框架。
URL:https://github.com/hepengpeng/-Python-
标签:#反序列化
GitHub
GitHub - hepengpeng/Propeller-Design-Program-Based-on-Charts: 传统船用螺旋桨图谱设计方法依赖于人工查图、插值与手算,存在设计工作量繁重、效率低下、易引入误差等问题。尤其在终结设计阶段,需对多…
传统船用螺旋桨图谱设计方法依赖于人工查图、插值与手算,存在设计工作量繁重、效率低下、易引入误差等问题。尤其在终结设计阶段,需对多个航速与盘面比组合进行反复图谱查询与数据插值,操作繁琐且难以保证一致性,严重制约了船舶设计效率与质量。为此,基于Python编程语言开发了一套船用螺旋桨图谱程序化设计系统。该系统采用Akima样条与三次样条插值算法,对MAU系列螺旋桨设计图谱进行高精度数据库构建,并...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-62593
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-62593
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-62593
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-62593
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-62593: CVE-2025-62593
CVE-2025-62593. Contribute to Ashwesker/Blackash-CVE-2025-62593 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-57833 PoC (취약한 도서 검색 서비스)
URL:https://github.com/Gayang2902/CVE-2025-57833
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-57833 PoC (취약한 도서 검색 서비스)
URL:https://github.com/Gayang2902/CVE-2025-57833
标签:#CVE-2025
GitHub
GitHub - Gayang2902/CVE-2025-57833: CVE-2025-57833 PoC (취약한 도서 검색 서비스)
CVE-2025-57833 PoC (취약한 도서 검색 서비스). Contribute to Gayang2902/CVE-2025-57833 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A sandbox playground to practice of bypassing PHP disabled/blacklisted functions to achicve RCE
URL:https://github.com/RajChowdhury240/php-filter-bypass-RCE
标签:#RCE
更新了:RCE
描述:A sandbox playground to practice of bypassing PHP disabled/blacklisted functions to achicve RCE
URL:https://github.com/RajChowdhury240/php-filter-bypass-RCE
标签:#RCE
GitHub
GitHub - RajChowdhury240/php-filter-bypass-RCE: A sandbox playground to practice of bypassing PHP disabled/blacklisted functions…
A sandbox playground to practice of bypassing PHP disabled/blacklisted functions to achicve RCE - RajChowdhury240/php-filter-bypass-RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Safety-first reverse-engineering framework for server emulation and RCE mitigation.
URL:https://github.com/LukasCollishawM/lazarus
标签:#RCE
更新了:RCE
描述:Safety-first reverse-engineering framework for server emulation and RCE mitigation.
URL:https://github.com/LukasCollishawM/lazarus
标签:#RCE
GitHub
GitHub - LukasCollishawM/lazarus: Safety-first reverse-engineering framework for server emulation and RCE mitigation.
Safety-first reverse-engineering framework for server emulation and RCE mitigation. - LukasCollishawM/lazarus
GitHub监控消息提醒!!!
更新了:代码审计
描述:通过大模型做完成代码审计赋能漏洞挖掘工作的经验尝试
URL:https://github.com/si1ence90/LLM_VulnSeeker
标签:#代码审计
更新了:代码审计
描述:通过大模型做完成代码审计赋能漏洞挖掘工作的经验尝试
URL:https://github.com/si1ence90/LLM_VulnSeeker
标签:#代码审计
GitHub
GitHub - si1ence90/LLM_VulnSeeker: 基于大语言模型的代码审计与漏洞挖掘实战项目
基于大语言模型的代码审计与漏洞挖掘实战项目. Contribute to si1ence90/LLM_VulnSeeker development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试工具启动器,支持工具分类管理、批量执行、拖拽排序,帮助高效管理和启动各类安全工具
URL:https://github.com/ming-moyin/Stars_Falling
标签:#渗透测试
更新了:渗透测试
描述:渗透测试工具启动器,支持工具分类管理、批量执行、拖拽排序,帮助高效管理和启动各类安全工具
URL:https://github.com/ming-moyin/Stars_Falling
标签:#渗透测试
GitHub
GitHub - ming-moyin/Stars_Falling: 渗透测试工具启动器,支持工具分类管理、批量执行、拖拽排序,帮助高效管理和启动各类安全工具
渗透测试工具启动器,支持工具分类管理、批量执行、拖拽排序,帮助高效管理和启动各类安全工具. Contribute to ming-moyin/Stars_Falling development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59528
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59528
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59528
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59528
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-59528: CVE-2025-59528
CVE-2025-59528. Contribute to Ashwesker/Blackash-CVE-2025-59528 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Secure expression evaluator - Drop-in replacement for expr-eval without CVE-2025-12735 vulnerability
URL:https://github.com/alecasg555/safe-expr-eval
标签:#CVE-2025
更新了:CVE-2025
描述:Secure expression evaluator - Drop-in replacement for expr-eval without CVE-2025-12735 vulnerability
URL:https://github.com/alecasg555/safe-expr-eval
标签:#CVE-2025
GitHub
GitHub - alecasg555/safe-expr-eval: Secure expression evaluator - Drop-in replacement for expr-eval without CVE-2025-12735 vulnerability
Secure expression evaluator - Drop-in replacement for expr-eval without CVE-2025-12735 vulnerability - alecasg555/safe-expr-eval
GitHub监控消息提醒!!!
更新了:红队
描述:PhantomHarvest 是一个隐蔽的后渗透传输软件,专为红队评估和安全研究设计。它能够从目标系统中提取敏感信息,并支持隐蔽的本地保存或远程传输。
URL:https://github.com/25smoking/PhantomHarvest
标签:#红队
更新了:红队
描述:PhantomHarvest 是一个隐蔽的后渗透传输软件,专为红队评估和安全研究设计。它能够从目标系统中提取敏感信息,并支持隐蔽的本地保存或远程传输。
URL:https://github.com/25smoking/PhantomHarvest
标签:#红队
GitHub
GitHub - 25smoking/PhantomHarvest: PhantomHarvest 是一个隐蔽的后渗透传输软件,专为红队评估和安全研究设计。它能够从目标系统中提取敏感信息,并支持隐蔽的本地保存或远程传输。
PhantomHarvest 是一个隐蔽的后渗透传输软件,专为红队评估和安全研究设计。它能够从目标系统中提取敏感信息,并支持隐蔽的本地保存或远程传输。 - 25smoking/PhantomHarvest
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Erlang/OTP SSH Vulnerable to Pre-Authentication RCE
URL:https://github.com/soltanali0/CVE-2025-32433-Eploit
标签:#CVE-2025
更新了:CVE-2025
描述:Erlang/OTP SSH Vulnerable to Pre-Authentication RCE
URL:https://github.com/soltanali0/CVE-2025-32433-Eploit
标签:#CVE-2025
GitHub
GitHub - soltanali0/CVE-2025-32433-Eploit: Erlang/OTP SSH Vulnerable to Pre-Authentication RCE
Erlang/OTP SSH Vulnerable to Pre-Authentication RCE - soltanali0/CVE-2025-32433-Eploit