GitHub监控消息提醒!!!
更新了:CVE-2025
描述: POC for CVE-2025-63499
URL:https://github.com/poblaguev-tot/CVE-2025-63499
标签:#CVE-2025
更新了:CVE-2025
描述: POC for CVE-2025-63499
URL:https://github.com/poblaguev-tot/CVE-2025-63499
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-48633
URL:https://github.com/Ashwesker/Blackash-CVE-2025-48633
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-48633
URL:https://github.com/Ashwesker/Blackash-CVE-2025-48633
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-48633: CVE-2025-48633
CVE-2025-48633. Contribute to Ashwesker/Blackash-CVE-2025-48633 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for testing CVE-2025-29927 for Next.js versions 11.x, 12.x <= 12.3.5, 13.x <= 13.5.9, 14.x <=14.2.25, 15.x <= 15.2.3
URL:https://github.com/liamromanis101/CVE-2025-29927-NextJS
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for testing CVE-2025-29927 for Next.js versions 11.x, 12.x <= 12.3.5, 13.x <= 13.5.9, 14.x <=14.2.25, 15.x <= 15.2.3
URL:https://github.com/liamromanis101/CVE-2025-29927-NextJS
标签:#CVE-2025
GitHub
GitHub - liamromanis101/CVE-2025-29927-NextJS: PoC for testing CVE-2025-29927 for Next.js versions 11.x, 12.x <= 12.3.5, 13.x <=…
PoC for testing CVE-2025-29927 for Next.js versions 11.x, 12.x <= 12.3.5, 13.x <= 13.5.9, 14.x <=14.2.25, 15.x <= 15.2.3 - liamromanis101/CVE-2025-29927-NextJS
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Advisory for CVE-2025-65806 – nested ZIP file upload validation bypass in E-POINT CMS
URL:https://github.com/Bidon47/CVE-2025-65806
标签:#CVE-2025
更新了:CVE-2025
描述:Advisory for CVE-2025-65806 – nested ZIP file upload validation bypass in E-POINT CMS
URL:https://github.com/Bidon47/CVE-2025-65806
标签:#CVE-2025
GitHub
GitHub - Bidon47/CVE-2025-65806: Advisory for CVE-2025-65806 – nested ZIP file upload validation bypass in E-POINT CMS
Advisory for CVE-2025-65806 – nested ZIP file upload validation bypass in E-POINT CMS - Bidon47/CVE-2025-65806
GitHub监控消息提醒!!!
更新了:攻防
描述:本项目为《部落冲突》游戏的简化模拟实现,是一款结合即时战略与经营养成玩法的游戏原型。玩家将建设自己的村庄,管理资源(金币、圣水、人口),建造多样化的建筑(资源生成、军事训练、防御设施),训练并指挥多种兵种(弓箭手、野蛮人、炸弹人、巨人等),通过自动战斗系统进攻敌方基地,体验从发展到攻防的完整策略流程。
URL:https://github.com/tongsir-9527/-
标签:#攻防
更新了:攻防
描述:本项目为《部落冲突》游戏的简化模拟实现,是一款结合即时战略与经营养成玩法的游戏原型。玩家将建设自己的村庄,管理资源(金币、圣水、人口),建造多样化的建筑(资源生成、军事训练、防御设施),训练并指挥多种兵种(弓箭手、野蛮人、炸弹人、巨人等),通过自动战斗系统进攻敌方基地,体验从发展到攻防的完整策略流程。
URL:https://github.com/tongsir-9527/-
标签:#攻防
GitHub
GitHub - tongsir-9527/-: 本项目为《部落冲突》游戏的简化模拟实现,是一款结合即时战略与经营养成玩法的游戏原型。玩家将建设自己的村庄,管理资源(金币、圣水、人口),建造多样化的建筑(资源生成、军事训练、防御设施),训练并指挥多种兵…
本项目为《部落冲突》游戏的简化模拟实现,是一款结合即时战略与经营养成玩法的游戏原型。玩家将建设自己的村庄,管理资源(金币、圣水、人口),建造多样化的建筑(资源生成、军事训练、防御设施),训练并指挥多种兵种(弓箭手、野蛮人、炸弹人、巨人等),通过自动战斗系统进攻敌方基地,体验从发展到攻防的完整策略流程。 - tongsir-9527/-
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-43300: iOS/macOS DNG Image Processing Memory Corruption
URL:https://github.com/7amzahard/CVE-2025-43300
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-43300: iOS/macOS DNG Image Processing Memory Corruption
URL:https://github.com/7amzahard/CVE-2025-43300
标签:#CVE-2025
GitHub
GitHub - 7amzahard/CVE-2025-43300: CVE-2025-43300: iOS/macOS DNG Image Processing Memory Corruption
CVE-2025-43300: iOS/macOS DNG Image Processing Memory Corruption - 7amzahard/CVE-2025-43300
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC of CVE-2025-1337
URL:https://github.com/Zwique/CVE-2025-1337-POC
标签:#CVE-2025
更新了:CVE-2025
描述:POC of CVE-2025-1337
URL:https://github.com/Zwique/CVE-2025-1337-POC
标签:#CVE-2025
GitHub
GitHub - Zwique/CVE-2025-1337-POC: POC of CVE-2025-1337
POC of CVE-2025-1337. Contribute to Zwique/CVE-2025-1337-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:LightChat(轻聊),以学习C++和Qt为目的创建的TCP聊天项目,用于了解Qt网络模块,信号槽机制,多客户端管理,Json的序列化与反序列化以及AES加密
URL:https://github.com/Sh33p2007/LightChat
标签:#反序列化
更新了:反序列化
描述:LightChat(轻聊),以学习C++和Qt为目的创建的TCP聊天项目,用于了解Qt网络模块,信号槽机制,多客户端管理,Json的序列化与反序列化以及AES加密
URL:https://github.com/Sh33p2007/LightChat
标签:#反序列化
GitHub
GitHub - Sh33p2007/LightChat: LightChat(轻聊),以学习C++和Qt为目的创建的TCP聊天项目,用于了解Qt网络模块,信号槽机制,多客户端管理,Json的序列化与反序列化以及AES加密
LightChat(轻聊),以学习C++和Qt为目的创建的TCP聊天项目,用于了解Qt网络模块,信号槽机制,多客户端管理,Json的序列化与反序列化以及AES加密 - Sh33p2007/LightChat
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC of CVE-2025-1337
URL:https://github.com/Zwique/CVE-2025-1337-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:POC of CVE-2025-1337
URL:https://github.com/Zwique/CVE-2025-1337-PoC
标签:#CVE-2025
GitHub
GitHub - Zwique/CVE-2025-1337-PoC: POC of CVE-2025-1337
POC of CVE-2025-1337. Contribute to Zwique/CVE-2025-1337-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:burp
描述:Busy Dad inspired tabata timer specifically for burpee workouts
URL:https://github.com/garber-squared/burpeebata
标签:#burp
更新了:burp
描述:Busy Dad inspired tabata timer specifically for burpee workouts
URL:https://github.com/garber-squared/burpeebata
标签:#burp
GitHub
GitHub - garber-squared/burpeebata: Busy Dad inspired tabata timer specifically for burpee workouts
Busy Dad inspired tabata timer specifically for burpee workouts - garber-squared/burpeebata
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65637: Logrus Denial of Service Vulnerability
URL:https://github.com/mjuanxd/logrus-dos-poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65637: Logrus Denial of Service Vulnerability
URL:https://github.com/mjuanxd/logrus-dos-poc
标签:#CVE-2025
GitHub
GitHub - mjuanxd/logrus-dos-poc: CVE-2025-65637: Logrus Denial of Service Vulnerability
CVE-2025-65637: Logrus Denial of Service Vulnerability - mjuanxd/logrus-dos-poc
GitHub监控消息提醒!!!
更新了:应急响应
描述:基于若依框架的综合性应急指挥管理系统,提供应急响应、资源管理、视频监控、知识库等一体化解决方案
URL:https://github.com/oliverxu1996/aegis-command
标签:#应急响应
更新了:应急响应
描述:基于若依框架的综合性应急指挥管理系统,提供应急响应、资源管理、视频监控、知识库等一体化解决方案
URL:https://github.com/oliverxu1996/aegis-command
标签:#应急响应
GitHub
GitHub - oliverxu1996/aegis-command: 基于若依框架的综合性应急指挥管理系统,提供应急响应、资源管理、视频监控、知识库等一体化解决方案
基于若依框架的综合性应急指挥管理系统,提供应急响应、资源管理、视频监控、知识库等一体化解决方案. Contribute to oliverxu1996/aegis-command development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙
URL:https://github.com/Maleick/Cobalt-Docker
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙
URL:https://github.com/Maleick/Cobalt-Docker
标签:#Cobalt Strike
GitHub
GitHub - Maleick/Cobalt-Docker: Updated for 4.12. This project provides a simple way to build and run a Cobalt Strike team server…
Updated for 4.12. This project provides a simple way to build and run a Cobalt Strike team server in a Docker container. It includes a Dockerfile for building the image, a shell script for automati...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept exploit for the Untrusted Pointer Dereference vulnerability in Windows Graphics Component (CVE-2025-50165).
URL:https://github.com/useci-sys/CVE-2025-50165
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept exploit for the Untrusted Pointer Dereference vulnerability in Windows Graphics Component (CVE-2025-50165).
URL:https://github.com/useci-sys/CVE-2025-50165
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔒 Manage your server's IP whitelist with ease using iptables, featuring backup, logging, and interactive modes for Red Team vs Blue Team competitions.
URL:https://github.com/DEVayman20/firewall-whitelist-admin
标签:#Red Team
更新了:Red Team
描述:🔒 Manage your server's IP whitelist with ease using iptables, featuring backup, logging, and interactive modes for Red Team vs Blue Team competitions.
URL:https://github.com/DEVayman20/firewall-whitelist-admin
标签:#Red Team
GitHub
GitHub - DEVayman20/firewall-whitelist-admin: 🔒 Manage your server's IP whitelist with ease using iptables, featuring backup, logging…
🔒 Manage your server's IP whitelist with ease using iptables, featuring backup, logging, and interactive modes for Red Team vs Blue Team competitions. - DEVayman20/firewall-whitelist-admin
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59427 Cloudflare & Vite/Wrangler With Simple 403 Bypass
URL:https://github.com/ibnurusdianto/CVE-2025-59427
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59427 Cloudflare & Vite/Wrangler With Simple 403 Bypass
URL:https://github.com/ibnurusdianto/CVE-2025-59427
标签:#CVE-2025
GitHub
GitHub - ibnurusdianto/CVE-2025-59427: CVE-2025-59427 Cloudflare & Vite/Wrangler With Simple 403 Bypass
CVE-2025-59427 Cloudflare & Vite/Wrangler With Simple 403 Bypass - ibnurusdianto/CVE-2025-59427
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/sharma19d/CVE-2025-61148
标签:#CVE-2025
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/sharma19d/CVE-2025-61148
标签:#CVE-2025
GitHub
GitHub - sharma19d/CVE-2025-61148: The vulnerability exists in the Student Payment API. The application fails to properly validate…
The vulnerability exists in the Student Payment API. The application fails to properly validate whether the user requesting a receipt is authorized to view it. By modifying the rec_no parameter in ...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一个用于 AI 驱动的渗透测试竞赛的**模型上下文协议 (MCP)** 服务器。该工 具提供了一个完整的 API 接口,使 LLM 能够自主参与 CTF 挑战。
URL:https://github.com/m-sec-org/ez-xbow-platform-mcp
标签:#渗透测试
更新了:渗透测试
描述:一个用于 AI 驱动的渗透测试竞赛的**模型上下文协议 (MCP)** 服务器。该工 具提供了一个完整的 API 接口,使 LLM 能够自主参与 CTF 挑战。
URL:https://github.com/m-sec-org/ez-xbow-platform-mcp
标签:#渗透测试
GitHub
GitHub - m-sec-org/ez-xbow-platform-mcp: 一个用于 AI 驱动的渗透测试竞赛的**模型上下文协议 (MCP)** 服务器。该工 具提供了一个完整的 API 接口,使 LLM 能够自主参与 CTF 挑战。
一个用于 AI 驱动的渗透测试竞赛的**模型上下文协议 (MCP)** 服务器。该工 具提供了一个完整的 API 接口,使 LLM 能够自主参与 CTF 挑战。 - m-sec-org/ez-xbow-platform-mcp