GitHub监控消息提醒!!!
更新了:RCE
描述:TCP/UDP server & client, potential file transfer program, maybe RCE or Trojan malware
URL:https://github.com/win4er/messenger
标签:#RCE
更新了:RCE
描述:TCP/UDP server & client, potential file transfer program, maybe RCE or Trojan malware
URL:https://github.com/win4er/messenger
标签:#RCE
GitHub
GitHub - win4er/messenger: TCP/UDP server & client, potential file transfer program, maybe RCE or Trojan malware
TCP/UDP server & client, potential file transfer program, maybe RCE or Trojan malware - win4er/messenger
GitHub监控消息提醒!!!
更新了:代码审计
描述:开源的代码审计平台 - 支持项目级/文件级/片段级审计,支持 10+ LLM、自定义规则集(内置OWASP Top 10 规则集)、自定义提示词模板、可解释分析、PDF 报告导出。支持ollama私有部署模型,代码可不出内网。
URL:https://github.com/shus-s/java-web-
标签:#代码审计
更新了:代码审计
描述:开源的代码审计平台 - 支持项目级/文件级/片段级审计,支持 10+ LLM、自定义规则集(内置OWASP Top 10 规则集)、自定义提示词模板、可解释分析、PDF 报告导出。支持ollama私有部署模型,代码可不出内网。
URL:https://github.com/shus-s/java-web-
标签:#代码审计
GitHub
GitHub - shus-s/java-web-: 该自习室预约系统基于 Java Web 技术栈(Servlet+JSP+MySQL)实现,采用 MVC 架构分离数据、视图和控制逻辑,功能涵盖用户管理、自习室管理和预约管理。系统通过分层设计(DAO…
该自习室预约系统基于 Java Web 技术栈(Servlet+JSP+MySQL)实现,采用 MVC 架构分离数据、视图和控制逻辑,功能涵盖用户管理、自习室管理和预约管理。系统通过分层设计(DAO+Service+Controller)保证代码可维护性,前端使用 CSS 网格布局和 JS 表单验证提升用户体验。整体满足小型自习室的预约需求,可进一步扩展权限管理(如管理员审批)和统计功能(如...
GitHub监控消息提醒!!!
更新了:代码审计
描述:开源的代码审计平台 - 支持项目级/文件级/片段级审计,支持 10+ LLM、自定义规则集(内置OWASP Top 10 规则集)、自定义提示词模板、可解释分析、PDF 报告导出。支持ollama私有部署模型,代码可不出内网。
URL:https://github.com/shus-s/javaweb-Study-Room-Reservation-System
标签:#代码审计
更新了:代码审计
描述:开源的代码审计平台 - 支持项目级/文件级/片段级审计,支持 10+ LLM、自定义规则集(内置OWASP Top 10 规则集)、自定义提示词模板、可解释分析、PDF 报告导出。支持ollama私有部署模型,代码可不出内网。
URL:https://github.com/shus-s/javaweb-Study-Room-Reservation-System
标签:#代码审计
GitHub
GitHub - shus-s/javaweb-Study-Room-Reservation-System: 该自习室预约系统基于 Java Web 技术栈(Servlet+JSP+MySQL)实现,采用 MVC 架构分离数据、视图和控制逻辑,功能涵盖…
该自习室预约系统基于 Java Web 技术栈(Servlet+JSP+MySQL)实现,采用 MVC 架构分离数据、视图和控制逻辑,功能涵盖用户管理、自习室管理和预约管理。系统通过分层设计(DAO+Service+Controller)保证代码可维护性,前端使用 CSS 网格布局和 JS 表单验证提升用户体验。整体满足小型自习室的预约需求,可进一步扩展权限管理(如管理员审批)和统计功能(如...
GitHub监控消息提醒!!!
更新了:RCE
描述:💥Extension Tool para Auditoría y Explotación avanzada RCE/Source Leak/Dos (CVE-2025-55182/83/84) para entornos Next.js y React Server Components (RSC) directamente desde tu navegador ❌
URL:https://github.com/MammaniNelsonD/React2P4IM0Nshell
标签:#RCE
更新了:RCE
描述:💥Extension Tool para Auditoría y Explotación avanzada RCE/Source Leak/Dos (CVE-2025-55182/83/84) para entornos Next.js y React Server Components (RSC) directamente desde tu navegador ❌
URL:https://github.com/MammaniNelsonD/React2P4IM0Nshell
标签:#RCE
GitHub
GitHub - MammaniNelsonD/React2P4IM0Nshell: 💥Extension Tool para Auditoría y Explotación avanzada RCE/Source Leak/Dos (CVE-2025…
💥Extension Tool para Auditoría y Explotación avanzada RCE/Source Leak/Dos (CVE-2025-55182/83/84) para entornos Next.js y React Server Components (RSC) directamente desde tu navegador ❌ - MammaniNel...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC). It also includes a realistic \"Lab Environment\" to safely test and understand the vulnerability.
URL:https://github.com/BimBoxH4/CVE-2025-66039_CVE-2025-61675_CVE-2025-61678_reePBX
标签:#CVE-2025
更新了:CVE-2025
描述:a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC). It also includes a realistic \"Lab Environment\" to safely test and understand the vulnerability.
URL:https://github.com/BimBoxH4/CVE-2025-66039_CVE-2025-61675_CVE-2025-61678_reePBX
标签:#CVE-2025
GitHub
GitHub - BimBoxH4/CVE-2025-66039_CVE-2025-61675_CVE-2025-61678_reePBX: This vulnerability allows both authenticated and unauthenticated…
This vulnerability allows both authenticated and unauthenticated remote attackers to execute remote code on vulnerable FreePBX instances. These issues have been fixed in FreePBX versions 16.0.42, 1...
GitHub监控消息提醒!!!
更新了:RCE
描述:GIT vulnerability | Carriage Return and RCE on cloning
URL:https://github.com/vignesh21-git/CVE-2025-48384
标签:#RCE
更新了:RCE
描述:GIT vulnerability | Carriage Return and RCE on cloning
URL:https://github.com/vignesh21-git/CVE-2025-48384
标签:#RCE
GitHub
GitHub - vignesh21-git/CVE-2025-48384: GIT vulnerability | Carriage Return and RCE on cloning
GIT vulnerability | Carriage Return and RCE on cloning - vignesh21-git/CVE-2025-48384
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept for CVE-2025-55182, a critical unauthenticated RCE in React Server Components.
URL:https://github.com/VVVI5HNU/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept for CVE-2025-55182, a critical unauthenticated RCE in React Server Components.
URL:https://github.com/VVVI5HNU/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - VVVI5HNU/CVE-2025-55182: Proof-of-Concept for CVE-2025-55182, a critical unauthenticated RCE in React Server Components.
Proof-of-Concept for CVE-2025-55182, a critical unauthenticated RCE in React Server Components. - VVVI5HNU/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Precision-Based Detection of RSC/Next.js Remote Code Execution Vulnerabilities (CVE-2025-55182, CVE-2025-66478)
URL:https://github.com/hidden-investigations/react2shell-scanner
标签:#CVE-2025
更新了:CVE-2025
描述:Precision-Based Detection of RSC/Next.js Remote Code Execution Vulnerabilities (CVE-2025-55182, CVE-2025-66478)
URL:https://github.com/hidden-investigations/react2shell-scanner
标签:#CVE-2025
GitHub
GitHub - hidden-investigations/react2shell-scanner: Precision-Based Detection of RSC/Next.js Remote Code Execution Vulnerabilities…
Precision-Based Detection of RSC/Next.js Remote Code Execution Vulnerabilities (CVE-2025-55182, CVE-2025-66478) - hidden-investigations/react2shell-scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-14174 (EUVD-2025-203113) - Memory corruption in ANGLE
URL:https://github.com/Terrasue/CVE-2025-14174-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-14174 (EUVD-2025-203113) - Memory corruption in ANGLE
URL:https://github.com/Terrasue/CVE-2025-14174-Exploit
标签:#CVE-2025
GitHub
GitHub - Terrasue/CVE-2025-14174-Exploit: Proof-of-Concept exploit for CVE-2025-14174 (EUVD-2025-203113) - Memory corruption in…
Proof-of-Concept exploit for CVE-2025-14174 (EUVD-2025-203113) - Memory corruption in ANGLE - Terrasue/CVE-2025-14174-Exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/CyberPrince-hub/React2shell-ultimate-scanner
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/CyberPrince-hub/React2shell-ultimate-scanner
标签:#CVE-2025
GitHub
GitHub - CyberPrince-hub/React2shell-ultimate-scanner: CVE-2025-55182-Advanced-Scanner is an automated security tool designed to…
CVE-2025-55182-Advanced-Scanner is an automated security tool designed to detect and validate the CVE-2025-55182 vulnerability efficiently. it helps security researchers and bug bounty hunters quic...
GitHub监控消息提醒!!!
更新了:应急响应
描述:Argus 取名自希腊神话中的\"百眼巨人\" (Argus Panoptes),寓意以永不闭合的眼睛时刻守护系统安全。这是一款专为红蓝对抗、应急响应、威胁狩猎设计的现代化跨平台安全工具,致力于提供更隐蔽、更强大、更智能的威胁检测能力。
URL:https://github.com/25smoking/Argus
标签:#应急响应
更新了:应急响应
描述:Argus 取名自希腊神话中的\"百眼巨人\" (Argus Panoptes),寓意以永不闭合的眼睛时刻守护系统安全。这是一款专为红蓝对抗、应急响应、威胁狩猎设计的现代化跨平台安全工具,致力于提供更隐蔽、更强大、更智能的威胁检测能力。
URL:https://github.com/25smoking/Argus
标签:#应急响应
GitHub
GitHub - 25smoking/Argus: Argus 取名自希腊神话中的"百眼巨人" (Argus Panoptes),寓意以永不闭合的眼睛时刻守护系统安全。这是一款专为红蓝对抗、应急响应、威胁狩猎设计的现代化跨平台安全工具,致力于提供更隐蔽…
Argus 取名自希腊神话中的"百眼巨人" (Argus Panoptes),寓意以永不闭合的眼睛时刻守护系统安全。这是一款专为红蓝对抗、应急响应、威胁狩猎设计的现代化跨平台安全工具,致力于提供更隐蔽、更强大、更智能的威胁检测能力。 - 25smoking/Argus
GitHub监控消息提醒!!!
更新了:sql注入
描述:chrome的自动化检测sql注入的插件
URL:https://github.com/smallcat9612/chrome-sql-
标签:#sql注入
更新了:sql注入
描述:chrome的自动化检测sql注入的插件
URL:https://github.com/smallcat9612/chrome-sql-
标签:#sql注入
GitHub
GitHub - smallcat9612/chrome-sql-: chrome的自动化检测sql注入的插件
chrome的自动化检测sql注入的插件. Contribute to smallcat9612/chrome-sql- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-concept exploit demo for CVE-2025-66478 using Node.js
URL:https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-concept exploit demo for CVE-2025-66478 using Node.js
URL:https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC
标签:#CVE-2025
GitHub
GitHub - zhixiangyao/CVE-2025-66478-Exploit-PoC: Proof-of-concept exploit demo for CVE-2025-66478 using Node.js
Proof-of-concept exploit demo for CVE-2025-66478 using Node.js - zhixiangyao/CVE-2025-66478-Exploit-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This project provides a **fully functional** demonstration of CVE-2025-55182 (React2Shell) - a critical Remote Code Execution vulnerability in React Server Components and Next.js.
URL:https://github.com/subhdotsol/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:This project provides a **fully functional** demonstration of CVE-2025-55182 (React2Shell) - a critical Remote Code Execution vulnerability in React Server Components and Next.js.
URL:https://github.com/subhdotsol/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - subhdotsol/CVE-2025-55182: This project provides a fully functional demonstration of CVE-2025-55182 (React2Shell) - a…
This project provides a fully functional demonstration of CVE-2025-55182 (React2Shell) - a critical Remote Code Execution vulnerability in React Server Components and Next.js. - subhdotsol/CVE-2025...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal RCE vulnerability affecting versions 7.11 and earlier
URL:https://github.com/Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal RCE vulnerability affecting versions 7.11 and earlier
URL:https://github.com/Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC
标签:#CVE-2025
GitHub
GitHub - Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC: Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal…
Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal RCE vulnerability affecting versions 7.11 and earlier - Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/SoftAndoWetto/CVE-2025-24367-PoC-Cacti
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/SoftAndoWetto/CVE-2025-24367-PoC-Cacti
标签:#CVE-2025
GitHub
GitHub - SoftAndoWetto/CVE-2025-24367-PoC-Cacti: Authenticated RCE PoC for Cacti (CVE‑2025‑24367). Uses graph template injection…
Authenticated RCE PoC for Cacti (CVE‑2025‑24367). Uses graph template injection to write and execute a payload via the “Unix – Logged in Users” template. Intended for labs and controlled testing on...
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:一款现代化的企业级漏洞扫描与资产管理平台 提供自动化安全检测、资产发现、漏洞管理等功能
URL:https://github.com/uf9n1x/ZScan
标签:#漏洞检测
更新了:漏洞检测
描述:一款现代化的企业级漏洞扫描与资产管理平台 提供自动化安全检测、资产发现、漏洞管理等功能
URL:https://github.com/uf9n1x/ZScan
标签:#漏洞检测
GitHub
GitHub - uf9n1x/ZScan: 一款现代化的企业级漏洞扫描与资产管理平台 提供自动化安全检测、资产发现、漏洞管理等功能
一款现代化的企业级漏洞扫描与资产管理平台 提供自动化安全检测、资产发现、漏洞管理等功能. Contribute to uf9n1x/ZScan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de malwares, axé sur C et C++
URL:https://github.com/VzlRus/C-Cpp_for_Malware_Development
标签:#Red Team
更新了:Red Team
描述:C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de malwares, axé sur C et C++
URL:https://github.com/VzlRus/C-Cpp_for_Malware_Development
标签:#Red Team
GitHub
GitHub - VzlRus/C-Cpp_for_Malware_Development: C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de…
C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de malwares, axé sur C et C++ - VzlRus/C-Cpp_for_Malware_Development
GitHub监控消息提醒!!!
更新了:绕过
描述:基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit (P2WSH) 机制,将任意数据伪装成标准的区块链地址,从而实现绕过 OP_RETURN 限制的永久数据存证。
URL:https://github.com/Forlingham/ScashDataAddressProtocol
标签:#绕过
更新了:绕过
描述:基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit (P2WSH) 机制,将任意数据伪装成标准的区块链地址,从而实现绕过 OP_RETURN 限制的永久数据存证。
URL:https://github.com/Forlingham/ScashDataAddressProtocol
标签:#绕过
GitHub
GitHub - Forlingham/ScashDataAddressProtocol: 基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit…
基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit (P2WSH) 机制,将任意数据伪装成标准的区块链地址,从而实现绕过 OP_RETURN 限制的永久数据存证。 - Forlingham/ScashDataAddressProtocol