GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit POC for the CVE-2025-48988 that affects Apache tomcat and causes a DOS
URL:https://github.com/moehkass/CVE-2025-48988-Exploit-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit POC for the CVE-2025-48988 that affects Apache tomcat and causes a DOS
URL:https://github.com/moehkass/CVE-2025-48988-Exploit-POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:绕过
描述:逆向工程Gradio API、无头浏览器(Headless Browser)模拟、无需Cookie自动持久化会话、高级匿名伪装(User-Agent轮换)、自动绕过Cloudflare人机验证、原生流式SSE转换、多模型兼容映射(GPT-4V/GPT-4o)、Base64图片处理、ArrayBuffer二进制操作、CORS跨域支持、错误处理与状态监控、Web UI集成测试
URL:https://github.com/lza6/joycaption-2api-cfwork
标签:#绕过
更新了:绕过
描述:逆向工程Gradio API、无头浏览器(Headless Browser)模拟、无需Cookie自动持久化会话、高级匿名伪装(User-Agent轮换)、自动绕过Cloudflare人机验证、原生流式SSE转换、多模型兼容映射(GPT-4V/GPT-4o)、Base64图片处理、ArrayBuffer二进制操作、CORS跨域支持、错误处理与状态监控、Web UI集成测试
URL:https://github.com/lza6/joycaption-2api-cfwork
标签:#绕过
GitHub
GitHub - lza6/joycaption-2api-cfwork: 逆向工程Gradio API、无头浏览器(Headless Browser)模拟、无需Cookie自动持久化会话、高级匿名伪装(User-Agent轮换)、自动绕过Cloudf…
逆向工程Gradio API、无头浏览器(Headless Browser)模拟、无需Cookie自动持久化会话、高级匿名伪装(User-Agent轮换)、自动绕过Cloudflare人机验证、原生流式SSE转换、多模型兼容映射(GPT-4V/GPT-4o)、Base64图片处理、ArrayBuffer二进制操作、CORS跨域支持、错误处理与状态监控、Web UI集成测试 - lza6/jo...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Golang Automation Framework for Cobalt Strike using the Rest API
URL:https://github.com/Xenov-X/csbot
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Golang Automation Framework for Cobalt Strike using the Rest API
URL:https://github.com/Xenov-X/csbot
标签:#Cobalt Strike
GitHub
GitHub - Xenov-X/csbot: Golang Automation Framework for Cobalt Strike using the Rest API
Golang Automation Framework for Cobalt Strike using the Rest API - Xenov-X/csbot
GitHub监控消息提醒!!!
更新了:蓝队
描述:EFF-Monitoring(Efficient Monitoring,高效监控),是一款面向安全运营 / 蓝队的本地告警处理工具,聚焦“高效日志处理 + 自动化情报补全 + AI 研判”,帮助安全监测人员在攻防演练和日常值班中快速看懂告警、打通上下游。
URL:https://github.com/JJsnowx/RUIE_Dataset
标签:#蓝队
更新了:蓝队
描述:EFF-Monitoring(Efficient Monitoring,高效监控),是一款面向安全运营 / 蓝队的本地告警处理工具,聚焦“高效日志处理 + 自动化情报补全 + AI 研判”,帮助安全监测人员在攻防演练和日常值班中快速看懂告警、打通上下游。
URL:https://github.com/JJsnowx/RUIE_Dataset
标签:#蓝队
GitHub
GitHub - JJsnowx/RUIE_Dataset: RUIE由大连理工大学刘日升老师所在团队构建的数据集,该数据集提供了同一水域采集的 水下图像质量子集UIQS(Underwater Image Quality Set,UIQS) 水下颜色失真子集…
RUIE由大连理工大学刘日升老师所在团队构建的数据集,该数据集提供了同一水域采集的 水下图像质量子集UIQS(Underwater Image Quality Set,UIQS) 水下颜色失真子集 UCCS(Underwater Color Cast Set,UCCS) 水下高级任务驱动子集UHTS(Underwater Higher-level Task-driven Set,UHTS) ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/wasfyelbaz/CVE-2025-66022
标签:#CVE-2025
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/wasfyelbaz/CVE-2025-66022
标签:#CVE-2025
GitHub
wasfyelbaz/CVE-2025-66022
FACTION versions before 1.7.1 allowed unauthenticated RCE. A missing auth check on /portal/AppStoreDashboard let attackers upload malicious extensions, which executed system commands through lifecy...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59390 and ThreadLocalRandom Inverse
URL:https://github.com/Daeda1usUK/CVE-2025-59390-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59390 and ThreadLocalRandom Inverse
URL:https://github.com/Daeda1usUK/CVE-2025-59390-
标签:#CVE-2025
GitHub
GitHub - Daeda1usUK/CVE-2025-59390-: CVE-2025-59390 and ThreadLocalRandom Inverse
CVE-2025-59390 and ThreadLocalRandom Inverse. Contribute to Daeda1usUK/CVE-2025-59390- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-13315
URL:https://github.com/Ashwesker/Blackash-CVE-2025-13315
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-13315
URL:https://github.com/Ashwesker/Blackash-CVE-2025-13315
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-13315: CVE-2025-13315
CVE-2025-13315. Contribute to Ashwesker/Blackash-CVE-2025-13315 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Adjustment of the infamous Gateway to heaven available at https://github.com/chipik/SAP_GW_RCE_exploit
URL:https://github.com/0xwaf/SAPexpGWanon
标签:#RCE
更新了:RCE
描述:Adjustment of the infamous Gateway to heaven available at https://github.com/chipik/SAP_GW_RCE_exploit
URL:https://github.com/0xwaf/SAPexpGWanon
标签:#RCE
GitHub
GitHub - chipik/SAP_GW_RCE_exploit: SAP Gateway RCE exploits
SAP Gateway RCE exploits. Contribute to chipik/SAP_GW_RCE_exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:本系统是一款基于Python的web渗透测试工具,采用django框架构建功能模块,并通过MySQL管理数据。核心功能包括web漏洞扫描和端口安全检测,旨在帮助用户发现并解决网络安全问题,确保网络环境的安全稳定。系统简洁高效,为用户提供了一个可靠的安全检测平台。
URL:https://github.com/3886370410/CZdypWZfkH
标签:#渗透测试
更新了:渗透测试
描述:本系统是一款基于Python的web渗透测试工具,采用django框架构建功能模块,并通过MySQL管理数据。核心功能包括web漏洞扫描和端口安全检测,旨在帮助用户发现并解决网络安全问题,确保网络环境的安全稳定。系统简洁高效,为用户提供了一个可靠的安全检测平台。
URL:https://github.com/3886370410/CZdypWZfkH
标签:#渗透测试
GitHub
GitHub - 3886370410/CZdypWZfkH: 本系统是一款基于Python的web渗透测试工具,采用django框架构建功能模块,并通过MySQL管理数据。核心功能包括web漏洞扫描和端口安全检测,旨在帮助用户发现并解决网络安全问题,…
本系统是一款基于Python的web渗透测试工具,采用django框架构建功能模块,并通过MySQL管理数据。核心功能包括web漏洞扫描和端口安全检测,旨在帮助用户发现并解决网络安全问题,确保网络环境的安全稳定。系统简洁高效,为用户提供了一个可靠的安全检测平台。 - 3886370410/CZdypWZfkH
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-2011
URL:https://github.com/Ashwesker/Blackash-CVE-2025-2011
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-2011
URL:https://github.com/Ashwesker/Blackash-CVE-2025-2011
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-2011: CVE-2025-2011
CVE-2025-2011. Contribute to Ashwesker/Blackash-CVE-2025-2011 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment.
URL:https://github.com/MartinFabianIonut/CVE-2025-55315
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment.
URL:https://github.com/MartinFabianIonut/CVE-2025-55315
标签:#CVE-2025
GitHub
GitHub - MartinFabianIonut/CVE-2025-55315: Proof-of-concept exploit for CVE-2025-55315 (.NET HTTP Request Smuggling). Demonstrates…
Proof-of-concept exploit for CVE-2025-55315 (.NET HTTP Request Smuggling). Demonstrates how improperly parsed chunked encoding lets attackers smuggle requests past proxies and load balancers in vul...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A proof-of-concept for CVE-2025-21479, chained with a Dirty Pagetable technique.
URL:https://github.com/MMAKINGDOM/CVE-2025-63419
标签:#CVE-2025
更新了:CVE-2025
描述:A proof-of-concept for CVE-2025-21479, chained with a Dirty Pagetable technique.
URL:https://github.com/MMAKINGDOM/CVE-2025-63419
标签:#CVE-2025
GitHub
GitHub - MMAKINGDOM/CVE-2025-63419: CrushFTP before 11.3.7_60 is vulnerable to HTML Injection. The Web-Based Server has a feature…
CrushFTP before 11.3.7_60 is vulnerable to HTML Injection. The Web-Based Server has a feature where users can share files, the feature reflects the filename to an emailbody field with no sanitzatio...
GitHub监控消息提醒!!!
更新了:RCE
描述:N-day Exploit for Synology BeeStation RCE by DEVCORE (Pwn2Own 2024)
URL:https://github.com/kiddo-pwn/CVE-2024-50629_50631
标签:#RCE
更新了:RCE
描述:N-day Exploit for Synology BeeStation RCE by DEVCORE (Pwn2Own 2024)
URL:https://github.com/kiddo-pwn/CVE-2024-50629_50631
标签:#RCE
GitHub
GitHub - kiddo-pwn/CVE-2024-50629_50631: N-day Exploit for Synology BeeStation RCE by DEVCORE (Pwn2Own 2024)
N-day Exploit for Synology BeeStation RCE by DEVCORE (Pwn2Own 2024) - kiddo-pwn/CVE-2024-50629_50631
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Unauth RCE PoC for XWiki SolrSearch (CVE-2025-24893). Command exec + reverse shell. Built during process of pwning HTB “Editor”
URL:https://github.com/torjan0/xwiki_solrsearch-rce-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Unauth RCE PoC for XWiki SolrSearch (CVE-2025-24893). Command exec + reverse shell. Built during process of pwning HTB “Editor”
URL:https://github.com/torjan0/xwiki_solrsearch-rce-exploit
标签:#CVE-2025
GitHub
GitHub - torjan0/xwiki_solrsearch-rce-exploit: Unauth RCE PoC for XWiki SolrSearch (CVE-2025-24893). Command exec + reverse shell.
Unauth RCE PoC for XWiki SolrSearch (CVE-2025-24893). Command exec + reverse shell. - torjan0/xwiki_solrsearch-rce-exploit
GitHub监控消息提醒!!!
更新了:RCE
描述:Sayfalse、Junior RCE – FUNK MI CAMINO
URL:https://github.com/LRCHub/MWsuHKUgZ98
标签:#RCE
更新了:RCE
描述:Sayfalse、Junior RCE – FUNK MI CAMINO
URL:https://github.com/LRCHub/MWsuHKUgZ98
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public exploit for CVE-2025-13615
URL:https://github.com/cowboyburgh781/CVE-2025-13615-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Public exploit for CVE-2025-13615
URL:https://github.com/cowboyburgh781/CVE-2025-13615-Exploit
标签:#CVE-2025
GitHub
GitHub - cowboyburgh781/CVE-2025-13615-Exploit
Contribute to cowboyburgh781/CVE-2025-13615-Exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Analysis and reproduction of CVE-2025-57833
URL:https://github.com/f3d0rq/CVE-2025-49132
标签:#CVE-2025
更新了:CVE-2025
描述:Analysis and reproduction of CVE-2025-57833
URL:https://github.com/f3d0rq/CVE-2025-49132
标签:#CVE-2025
GitHub
GitHub - f3d0rq/CVE-2025-49132: CVE-2025-49132 is a critical arbitrary code execution vulnerability affecting the Pterodactyl game…
CVE-2025-49132 is a critical arbitrary code execution vulnerability affecting the Pterodactyl game server management panel. This vulnerability allows unauthenticated remote attackers to execute arb...