GitHub监控消息提醒!!!
更新了:CVE-2025
描述:automation untuk CVE-2025-65862
URL:https://github.com/rimbadirgantara/opac-fast-automation
标签:#CVE-2025
更新了:CVE-2025
描述:automation untuk CVE-2025-65862
URL:https://github.com/rimbadirgantara/opac-fast-automation
标签:#CVE-2025
GitHub
GitHub - rimbadirgantara/opac-fast-automation: automation untuk CVE-2025-65862
automation untuk CVE-2025-65862. Contribute to rimbadirgantara/opac-fast-automation development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:maybe the first poc for CVE-2025-38678?
URL:https://github.com/guard-wait/CVE-2025-38678_POC
标签:#CVE-2025
更新了:CVE-2025
描述:maybe the first poc for CVE-2025-38678?
URL:https://github.com/guard-wait/CVE-2025-38678_POC
标签:#CVE-2025
GitHub
GitHub - guard-wait/CVE-2025-38678_POC: maybe the first poc for CVE-2025-38678?
maybe the first poc for CVE-2025-38678? Contribute to guard-wait/CVE-2025-38678_POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:Serde 是一个 高效和通用的序列化和反序列化Rust数据结构的框架。
URL:https://github.com/hepengpeng/-Python-
标签:#反序列化
更新了:反序列化
描述:Serde 是一个 高效和通用的序列化和反序列化Rust数据结构的框架。
URL:https://github.com/hepengpeng/-Python-
标签:#反序列化
GitHub
GitHub - hepengpeng/Propeller-Design-Program-Based-on-Charts: 传统船用螺旋桨图谱设计方法依赖于人工查图、插值与手算,存在设计工作量繁重、效率低下、易引入误差等问题。尤其在终结设计阶段,需对多…
传统船用螺旋桨图谱设计方法依赖于人工查图、插值与手算,存在设计工作量繁重、效率低下、易引入误差等问题。尤其在终结设计阶段,需对多个航速与盘面比组合进行反复图谱查询与数据插值,操作繁琐且难以保证一致性,严重制约了船舶设计效率与质量。为此,基于Python编程语言开发了一套船用螺旋桨图谱程序化设计系统。该系统采用Akima样条与三次样条插值算法,对MAU系列螺旋桨设计图谱进行高精度数据库构建,并...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-62593
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-62593
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-62593
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-62593
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-62593: CVE-2025-62593
CVE-2025-62593. Contribute to Ashwesker/Blackash-CVE-2025-62593 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-57833 PoC (취약한 도서 검색 서비스)
URL:https://github.com/Gayang2902/CVE-2025-57833
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-57833 PoC (취약한 도서 검색 서비스)
URL:https://github.com/Gayang2902/CVE-2025-57833
标签:#CVE-2025
GitHub
GitHub - Gayang2902/CVE-2025-57833: CVE-2025-57833 PoC (취약한 도서 검색 서비스)
CVE-2025-57833 PoC (취약한 도서 검색 서비스). Contribute to Gayang2902/CVE-2025-57833 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A sandbox playground to practice of bypassing PHP disabled/blacklisted functions to achicve RCE
URL:https://github.com/RajChowdhury240/php-filter-bypass-RCE
标签:#RCE
更新了:RCE
描述:A sandbox playground to practice of bypassing PHP disabled/blacklisted functions to achicve RCE
URL:https://github.com/RajChowdhury240/php-filter-bypass-RCE
标签:#RCE
GitHub
GitHub - RajChowdhury240/php-filter-bypass-RCE: A sandbox playground to practice of bypassing PHP disabled/blacklisted functions…
A sandbox playground to practice of bypassing PHP disabled/blacklisted functions to achicve RCE - RajChowdhury240/php-filter-bypass-RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Safety-first reverse-engineering framework for server emulation and RCE mitigation.
URL:https://github.com/LukasCollishawM/lazarus
标签:#RCE
更新了:RCE
描述:Safety-first reverse-engineering framework for server emulation and RCE mitigation.
URL:https://github.com/LukasCollishawM/lazarus
标签:#RCE
GitHub
GitHub - LukasCollishawM/lazarus: Safety-first reverse-engineering framework for server emulation and RCE mitigation.
Safety-first reverse-engineering framework for server emulation and RCE mitigation. - LukasCollishawM/lazarus
GitHub监控消息提醒!!!
更新了:代码审计
描述:通过大模型做完成代码审计赋能漏洞挖掘工作的经验尝试
URL:https://github.com/si1ence90/LLM_VulnSeeker
标签:#代码审计
更新了:代码审计
描述:通过大模型做完成代码审计赋能漏洞挖掘工作的经验尝试
URL:https://github.com/si1ence90/LLM_VulnSeeker
标签:#代码审计
GitHub
GitHub - si1ence90/LLM_VulnSeeker: 基于大语言模型的代码审计与漏洞挖掘实战项目
基于大语言模型的代码审计与漏洞挖掘实战项目. Contribute to si1ence90/LLM_VulnSeeker development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试工具启动器,支持工具分类管理、批量执行、拖拽排序,帮助高效管理和启动各类安全工具
URL:https://github.com/ming-moyin/Stars_Falling
标签:#渗透测试
更新了:渗透测试
描述:渗透测试工具启动器,支持工具分类管理、批量执行、拖拽排序,帮助高效管理和启动各类安全工具
URL:https://github.com/ming-moyin/Stars_Falling
标签:#渗透测试
GitHub
GitHub - ming-moyin/Stars_Falling: 渗透测试工具启动器,支持工具分类管理、批量执行、拖拽排序,帮助高效管理和启动各类安全工具
渗透测试工具启动器,支持工具分类管理、批量执行、拖拽排序,帮助高效管理和启动各类安全工具. Contribute to ming-moyin/Stars_Falling development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59528
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59528
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59528
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59528
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-59528: CVE-2025-59528
CVE-2025-59528. Contribute to Ashwesker/Blackash-CVE-2025-59528 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Secure expression evaluator - Drop-in replacement for expr-eval without CVE-2025-12735 vulnerability
URL:https://github.com/alecasg555/safe-expr-eval
标签:#CVE-2025
更新了:CVE-2025
描述:Secure expression evaluator - Drop-in replacement for expr-eval without CVE-2025-12735 vulnerability
URL:https://github.com/alecasg555/safe-expr-eval
标签:#CVE-2025
GitHub
GitHub - alecasg555/safe-expr-eval: Secure expression evaluator - Drop-in replacement for expr-eval without CVE-2025-12735 vulnerability
Secure expression evaluator - Drop-in replacement for expr-eval without CVE-2025-12735 vulnerability - alecasg555/safe-expr-eval
GitHub监控消息提醒!!!
更新了:红队
描述:PhantomHarvest 是一个隐蔽的后渗透传输软件,专为红队评估和安全研究设计。它能够从目标系统中提取敏感信息,并支持隐蔽的本地保存或远程传输。
URL:https://github.com/25smoking/PhantomHarvest
标签:#红队
更新了:红队
描述:PhantomHarvest 是一个隐蔽的后渗透传输软件,专为红队评估和安全研究设计。它能够从目标系统中提取敏感信息,并支持隐蔽的本地保存或远程传输。
URL:https://github.com/25smoking/PhantomHarvest
标签:#红队
GitHub
GitHub - 25smoking/PhantomHarvest: PhantomHarvest 是一个隐蔽的后渗透传输软件,专为红队评估和安全研究设计。它能够从目标系统中提取敏感信息,并支持隐蔽的本地保存或远程传输。
PhantomHarvest 是一个隐蔽的后渗透传输软件,专为红队评估和安全研究设计。它能够从目标系统中提取敏感信息,并支持隐蔽的本地保存或远程传输。 - 25smoking/PhantomHarvest
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Erlang/OTP SSH Vulnerable to Pre-Authentication RCE
URL:https://github.com/soltanali0/CVE-2025-32433-Eploit
标签:#CVE-2025
更新了:CVE-2025
描述:Erlang/OTP SSH Vulnerable to Pre-Authentication RCE
URL:https://github.com/soltanali0/CVE-2025-32433-Eploit
标签:#CVE-2025
GitHub
GitHub - soltanali0/CVE-2025-32433-Eploit: Erlang/OTP SSH Vulnerable to Pre-Authentication RCE
Erlang/OTP SSH Vulnerable to Pre-Authentication RCE - soltanali0/CVE-2025-32433-Eploit
GitHub监控消息提醒!!!
更新了:RCE
描述:An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy code remotely without authentication or prior access.
URL:https://github.com/dr4x1/xwiki-rce
标签:#RCE
更新了:RCE
描述:An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy code remotely without authentication or prior access.
URL:https://github.com/dr4x1/xwiki-rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy code remotely without authentication or prior access.
URL:https://github.com/dr4xp/xwiki-rce
标签:#RCE
更新了:RCE
描述:An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy code remotely without authentication or prior access.
URL:https://github.com/dr4xp/xwiki-rce
标签:#RCE
GitHub
GitHub - dr4xp/xwiki-rce: An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy…
An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy code remotely without authentication or prior access. - dr4xp/xwiki-rce