GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-64459-Exploit-Fix
URL:https://github.com/ALPYAHYA/CVE-2025-64459-Exploit-Fix
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-64459-Exploit-Fix
URL:https://github.com/ALPYAHYA/CVE-2025-64459-Exploit-Fix
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-64459-Exploit-PoC
URL:https://github.com/ALPYAHYA/CVE-2025-64459-Exploit-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-64459-Exploit-PoC
URL:https://github.com/ALPYAHYA/CVE-2025-64459-Exploit-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A fast, simple scanner for detecting CVE-2025-66470 - XSS vulnerability in NiceGUI's ui.interactive_image component.
URL:https://github.com/Jmehta10/CVE-2025-66470
标签:#CVE-2025
更新了:CVE-2025
描述:A fast, simple scanner for detecting CVE-2025-66470 - XSS vulnerability in NiceGUI's ui.interactive_image component.
URL:https://github.com/Jmehta10/CVE-2025-66470
标签:#CVE-2025
GitHub
GitHub - Jmehta10/CVE-2025-66470: A fast, simple scanner for detecting CVE-2025-66470 - XSS vulnerability in NiceGUI's ui.interactive_image…
A fast, simple scanner for detecting CVE-2025-66470 - XSS vulnerability in NiceGUI's ui.interactive_image component. - Jmehta10/CVE-2025-66470
GitHub监控消息提醒!!!
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/lza6/zai.is-2api-python
标签:#绕过
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/lza6/zai.is-2api-python
标签:#绕过
GitHub
GitHub - lza6/zai.is-2api-python: Playwright 浏览器自动化 (Headless/Headed) · 自动 Token 提取与保活 (Auto-Refresh) · 上下文持久化 (Persistent Context)…
Playwright 浏览器自动化 (Headless/Headed) · 自动 Token 提取与保活 (Auto-Refresh) · 上下文持久化 (Persistent Context) · 移除自动化指纹 (Anti-Detection) · 绕过 Cloudflare/Vercel 验证 · OpenAI 格式流式 API (SSE) · 图片自动转存代理 (Image Prox...
GitHub监控消息提醒!!!
更新了:反序列化
描述:适用于Godot引擎的ActionMessageFormat脚本 支持AMF3 AMF0协议的序列化和反序列化
URL:https://github.com/Amireux0921/Godot-FlashRemoting
标签:#反序列化
更新了:反序列化
描述:适用于Godot引擎的ActionMessageFormat脚本 支持AMF3 AMF0协议的序列化和反序列化
URL:https://github.com/Amireux0921/Godot-FlashRemoting
标签:#反序列化
GitHub监控消息提醒!!!
更新了:RCE
描述:python RCE, listens on a port and executes commands passed in as a url argument
URL:https://github.com/mirroredMemory/pythonPOC2
标签:#RCE
更新了:RCE
描述:python RCE, listens on a port and executes commands passed in as a url argument
URL:https://github.com/mirroredMemory/pythonPOC2
标签:#RCE
GitHub
mirroredMemory/pythonPOC2
python RCE, listens on a port and executes commands passed in as a url argument - mirroredMemory/pythonPOC2
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8110
URL:https://github.com/Ashwesker/Blackash-CVE-2025-8110
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8110
URL:https://github.com/Ashwesker/Blackash-CVE-2025-8110
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Ashwesker-CVE-2025-8110: CVE-2025-8110
CVE-2025-8110. Contribute to Ashwesker/Ashwesker-CVE-2025-8110 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/andrei2308/react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/andrei2308/react2shell
标签:#CVE-2025
GitHub
GitHub - andrei2308/react2shell: CVE-2025-55182
CVE-2025-55182. Contribute to andrei2308/react2shell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Out-Of-Tree Llama Stack Eval Provider for Red Teaming LLM Systems with Garak
URL:https://github.com/trustyai-explainability/llama-stack-provider-trustyai-garak
标签:#Red Team
更新了:Red Team
描述:Out-Of-Tree Llama Stack Eval Provider for Red Teaming LLM Systems with Garak
URL:https://github.com/trustyai-explainability/llama-stack-provider-trustyai-garak
标签:#Red Team
GitHub
GitHub - trustyai-explainability/llama-stack-provider-trustyai-garak: Out-Of-Tree Llama Stack Eval Provider for Red Teaming LLM…
Out-Of-Tree Llama Stack Eval Provider for Red Teaming LLM Systems with Garak - trustyai-explainability/llama-stack-provider-trustyai-garak
GitHub监控消息提醒!!!
更新了:RCE
描述:Interactive visualization explaining React Server Components, Flight Protocol, and the React2Shell (CVE-2025-55182) RCE vulnerability.
URL:https://github.com/VolksRat71/react2shellexploitvisualized
标签:#RCE
更新了:RCE
描述:Interactive visualization explaining React Server Components, Flight Protocol, and the React2Shell (CVE-2025-55182) RCE vulnerability.
URL:https://github.com/VolksRat71/react2shellexploitvisualized
标签:#RCE
GitHub
GitHub - VolksRat71/react2shellexploitvisualized: Interactive visualization of the React2Shell (CVE-2025-55182) RCE vulnerability…
Interactive visualization of the React2Shell (CVE-2025-55182) RCE vulnerability with narrated animations for three audiences: Expert, Practitioner, and Stakeholder. Audio synced via ElevenLabs + W...
GitHub监控消息提醒!!!
更新了:RCE
描述:Modified ruby script for RCE
URL:https://github.com/7s26simon/CVE-2013-0156
标签:#RCE
更新了:RCE
描述:Modified ruby script for RCE
URL:https://github.com/7s26simon/CVE-2013-0156
标签:#RCE
GitHub
GitHub - 7s26simon/CVE-2013-0156: Modified ruby script for RCE
Modified ruby script for RCE. Contribute to 7s26simon/CVE-2013-0156 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/j0lt-github/react2shell-burp
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/j0lt-github/react2shell-burp
标签:#CVE-2025
GitHub
GitHub - j0lt-github/react2shell-burp: Burp Suite extension for identifying the React Server Components unsafe deserialization…
Burp Suite extension for identifying the React Server Components unsafe deserialization vulnerability (React2Shell / CVE-2025-55182). It provides a focused UI tab, context-menu actions, active-scan...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A CVE-2025-55183 secret miner
URL:https://github.com/Saturate/CVE-2025-55183
标签:#CVE-2025
更新了:CVE-2025
描述:A CVE-2025-55183 secret miner
URL:https://github.com/Saturate/CVE-2025-55183
标签:#CVE-2025
GitHub
GitHub - Saturate/CVE-2025-55183: A CVE-2025-55183 secret miner
A CVE-2025-55183 secret miner. Contribute to Saturate/CVE-2025-55183 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 payload
URL:https://github.com/IrsyadSEC/CVE-2025-55182-MassPayloadAttack
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 payload
URL:https://github.com/IrsyadSEC/CVE-2025-55182-MassPayloadAttack
标签:#CVE-2025
GitHub
GitHub - IrsyadSEC/CVE-2025-55182-MassPayloadAttack: CVE-2025-55182 payload
CVE-2025-55182 payload. Contribute to IrsyadSEC/CVE-2025-55182-MassPayloadAttack development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/securityforge/RemoteMouse-3.008-Exploit
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/securityforge/RemoteMouse-3.008-Exploit
标签:#RCE
GitHub
GitHub - securityforge/RemoteMouse-3.008-Exploit: This repository documents a security research analysis of the RemoteMouse 3.008…
This repository documents a security research analysis of the RemoteMouse 3.008 vulnerability, which allowed remote code execution (RCE) on systems running the affected version of the RemoteMouse d...
GitHub监控消息提醒!!!
更新了:漏洞挖掘
描述:Personal Blog/主记录漏洞挖掘相关研究(文章位于issues)
URL:https://github.com/xinali/articles
标签:#漏洞挖掘
更新了:漏洞挖掘
描述:Personal Blog/主记录漏洞挖掘相关研究(文章位于issues)
URL:https://github.com/xinali/articles
标签:#漏洞挖掘
GitHub
GitHub - xinali/articles: Personal Blog/主记录漏洞挖掘相关研究(文章位于issues)
Personal Blog/主记录漏洞挖掘相关研究(文章位于issues). Contribute to xinali/articles development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Checks if your JS vulnerable to React2Shell (CVE-2025-55182) or not.
URL:https://github.com/shyam-chauhan/react2shell_check
标签:#CVE-2025
更新了:CVE-2025
描述:Checks if your JS vulnerable to React2Shell (CVE-2025-55182) or not.
URL:https://github.com/shyam-chauhan/react2shell_check
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Batch upgrade all your Next.js apps to patched versions - fight back against CVE-2025-55183/55184/67779
URL:https://github.com/williavs/nextjs-security-update
标签:#CVE-2025
更新了:CVE-2025
描述:Batch upgrade all your Next.js apps to patched versions - fight back against CVE-2025-55183/55184/67779
URL:https://github.com/williavs/nextjs-security-update
标签:#CVE-2025
GitHub
GitHub - williavs/nextjs-security-update: Batch upgrade all your Next.js apps to patched versions - fight back against CVE-2025…
Batch upgrade all your Next.js apps to patched versions - fight back against CVE-2025-55183/55184/67779 - williavs/nextjs-security-update
GitHub监控消息提醒!!!
更新了:渗透测试
描述:TL-NodeJsShell 是一个为安全专业人员和渗透测试人员设计的综合性 WebShell 管理平台。它提供了一个现代化的 Web 界面,用于管理基于 Node.js 的 Shell,具有内存马注入、命令执行、文件管理和代理支持等高级功能。
URL:https://github.com/tianlusec/TL-NodeJsShell
标签:#渗透测试
更新了:渗透测试
描述:TL-NodeJsShell 是一个为安全专业人员和渗透测试人员设计的综合性 WebShell 管理平台。它提供了一个现代化的 Web 界面,用于管理基于 Node.js 的 Shell,具有内存马注入、命令执行、文件管理和代理支持等高级功能。
URL:https://github.com/tianlusec/TL-NodeJsShell
标签:#渗透测试
GitHub
GitHub - tianlusec/TL-NodeJsShell: TL-NodeJsShell 是一个为安全专业人员和渗透测试人员设计的综合性 WebShell 管理平台。它提供了一个现代化的 Web 界面,用于管理基于 Node.js 的 She…
TL-NodeJsShell 是一个为安全专业人员和渗透测试人员设计的综合性 WebShell 管理平台。它提供了一个现代化的 Web 界面,用于管理基于 Node.js 的 Shell,具有内存马注入、命令执行、文件管理和代理支持等高级功能。 - tianlusec/TL-NodeJsShell
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Passive detection for CVE-2025-58360
URL:https://github.com/rxerium/CVE-2025-58360
标签:#CVE-2025
更新了:CVE-2025
描述:Passive detection for CVE-2025-58360
URL:https://github.com/rxerium/CVE-2025-58360
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-58360: Passive detection for CVE-2025-58360
Passive detection for CVE-2025-58360. Contribute to rxerium/CVE-2025-58360 development by creating an account on GitHub.