GitHub监控消息提醒!!!
更新了:应急响应
描述:Argus 取名自希腊神话中的\"百眼巨人\" (Argus Panoptes),寓意以永不闭合的眼睛时刻守护系统安全。这是一款专为红蓝对抗、应急响应、威胁狩猎设计的现代化跨平台安全工具,致力于提供更隐蔽、更强大、更智能的威胁检测能力。
URL:https://github.com/25smoking/Argus
标签:#应急响应
更新了:应急响应
描述:Argus 取名自希腊神话中的\"百眼巨人\" (Argus Panoptes),寓意以永不闭合的眼睛时刻守护系统安全。这是一款专为红蓝对抗、应急响应、威胁狩猎设计的现代化跨平台安全工具,致力于提供更隐蔽、更强大、更智能的威胁检测能力。
URL:https://github.com/25smoking/Argus
标签:#应急响应
GitHub
GitHub - 25smoking/Argus: Argus 取名自希腊神话中的"百眼巨人" (Argus Panoptes),寓意以永不闭合的眼睛时刻守护系统安全。这是一款专为红蓝对抗、应急响应、威胁狩猎设计的现代化跨平台安全工具,致力于提供更隐蔽…
Argus 取名自希腊神话中的"百眼巨人" (Argus Panoptes),寓意以永不闭合的眼睛时刻守护系统安全。这是一款专为红蓝对抗、应急响应、威胁狩猎设计的现代化跨平台安全工具,致力于提供更隐蔽、更强大、更智能的威胁检测能力。 - 25smoking/Argus
GitHub监控消息提醒!!!
更新了:sql注入
描述:chrome的自动化检测sql注入的插件
URL:https://github.com/smallcat9612/chrome-sql-
标签:#sql注入
更新了:sql注入
描述:chrome的自动化检测sql注入的插件
URL:https://github.com/smallcat9612/chrome-sql-
标签:#sql注入
GitHub
GitHub - smallcat9612/chrome-sql-: chrome的自动化检测sql注入的插件
chrome的自动化检测sql注入的插件. Contribute to smallcat9612/chrome-sql- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-concept exploit demo for CVE-2025-66478 using Node.js
URL:https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-concept exploit demo for CVE-2025-66478 using Node.js
URL:https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC
标签:#CVE-2025
GitHub
GitHub - zhixiangyao/CVE-2025-66478-Exploit-PoC: Proof-of-concept exploit demo for CVE-2025-66478 using Node.js
Proof-of-concept exploit demo for CVE-2025-66478 using Node.js - zhixiangyao/CVE-2025-66478-Exploit-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This project provides a **fully functional** demonstration of CVE-2025-55182 (React2Shell) - a critical Remote Code Execution vulnerability in React Server Components and Next.js.
URL:https://github.com/subhdotsol/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:This project provides a **fully functional** demonstration of CVE-2025-55182 (React2Shell) - a critical Remote Code Execution vulnerability in React Server Components and Next.js.
URL:https://github.com/subhdotsol/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - subhdotsol/CVE-2025-55182: This project provides a fully functional demonstration of CVE-2025-55182 (React2Shell) - a…
This project provides a fully functional demonstration of CVE-2025-55182 (React2Shell) - a critical Remote Code Execution vulnerability in React Server Components and Next.js. - subhdotsol/CVE-2025...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal RCE vulnerability affecting versions 7.11 and earlier
URL:https://github.com/Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal RCE vulnerability affecting versions 7.11 and earlier
URL:https://github.com/Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC
标签:#CVE-2025
GitHub
GitHub - Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC: Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal…
Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal RCE vulnerability affecting versions 7.11 and earlier - Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/SoftAndoWetto/CVE-2025-24367-PoC-Cacti
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/SoftAndoWetto/CVE-2025-24367-PoC-Cacti
标签:#CVE-2025
GitHub
GitHub - SoftAndoWetto/CVE-2025-24367-PoC-Cacti: Authenticated RCE PoC for Cacti (CVE‑2025‑24367). Uses graph template injection…
Authenticated RCE PoC for Cacti (CVE‑2025‑24367). Uses graph template injection to write and execute a payload via the “Unix – Logged in Users” template. Intended for labs and controlled testing on...
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:一款现代化的企业级漏洞扫描与资产管理平台 提供自动化安全检测、资产发现、漏洞管理等功能
URL:https://github.com/uf9n1x/ZScan
标签:#漏洞检测
更新了:漏洞检测
描述:一款现代化的企业级漏洞扫描与资产管理平台 提供自动化安全检测、资产发现、漏洞管理等功能
URL:https://github.com/uf9n1x/ZScan
标签:#漏洞检测
GitHub
GitHub - uf9n1x/ZScan: 一款现代化的企业级漏洞扫描与资产管理平台 提供自动化安全检测、资产发现、漏洞管理等功能
一款现代化的企业级漏洞扫描与资产管理平台 提供自动化安全检测、资产发现、漏洞管理等功能. Contribute to uf9n1x/ZScan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de malwares, axé sur C et C++
URL:https://github.com/VzlRus/C-Cpp_for_Malware_Development
标签:#Red Team
更新了:Red Team
描述:C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de malwares, axé sur C et C++
URL:https://github.com/VzlRus/C-Cpp_for_Malware_Development
标签:#Red Team
GitHub
GitHub - VzlRus/C-Cpp_for_Malware_Development: C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de…
C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de malwares, axé sur C et C++ - VzlRus/C-Cpp_for_Malware_Development
GitHub监控消息提醒!!!
更新了:绕过
描述:基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit (P2WSH) 机制,将任意数据伪装成标准的区块链地址,从而实现绕过 OP_RETURN 限制的永久数据存证。
URL:https://github.com/Forlingham/ScashDataAddressProtocol
标签:#绕过
更新了:绕过
描述:基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit (P2WSH) 机制,将任意数据伪装成标准的区块链地址,从而实现绕过 OP_RETURN 限制的永久数据存证。
URL:https://github.com/Forlingham/ScashDataAddressProtocol
标签:#绕过
GitHub
GitHub - Forlingham/ScashDataAddressProtocol: 基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit…
基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit (P2WSH) 机制,将任意数据伪装成标准的区块链地址,从而实现绕过 OP_RETURN 限制的永久数据存证。 - Forlingham/ScashDataAddressProtocol
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-45805
URL:https://github.com/mohammed-alsaqqaf/CVE-2025-45805
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-45805
URL:https://github.com/mohammed-alsaqqaf/CVE-2025-45805
标签:#CVE-2025
GitHub
GitHub - mohammed-alsaqqaf/CVE-2025-45805: PoC of CVE-2025-45805
PoC of CVE-2025-45805. Contribute to mohammed-alsaqqaf/CVE-2025-45805 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A script for exploiting a vulnerability in PyTorch with subsequent RCE in library versions < 2.6.0
URL:https://github.com/B1tBit/CVE-2025-32434-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:A script for exploiting a vulnerability in PyTorch with subsequent RCE in library versions < 2.6.0
URL:https://github.com/B1tBit/CVE-2025-32434-exploit
标签:#CVE-2025
GitHub
GitHub - B1tBit/CVE-2025-32434-exploit: A script for exploiting a vulnerability in PyTorch with subsequent RCE in library versions…
A script for exploiting a vulnerability in PyTorch with subsequent RCE in library versions < 2.6.0 - B1tBit/CVE-2025-32434-exploit
GitHub监控消息提醒!!!
更新了:RCE
描述:Educational web security labs: SQLi, Brute Force, File Upload, RCE
URL:https://github.com/olgacmustafa/web-security-learning
标签:#RCE
更新了:RCE
描述:Educational web security labs: SQLi, Brute Force, File Upload, RCE
URL:https://github.com/olgacmustafa/web-security-learning
标签:#RCE
GitHub
GitHub - olgacmustafa/web-security-learning: Educational web security labs: SQLi, Brute Force, File Upload, RCE
Educational web security labs: SQLi, Brute Force, File Upload, RCE - olgacmustafa/web-security-learning
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection of CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039
URL:https://github.com/rxerium/FreePBX-Vulns-December-25
标签:#CVE-2025
更新了:CVE-2025
描述:Detection of CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039
URL:https://github.com/rxerium/FreePBX-Vulns-December-25
标签:#CVE-2025
GitHub
GitHub - rxerium/FreePBX-Vulns-December-25: Detection for CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039
Detection for CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039 - rxerium/FreePBX-Vulns-December-25
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repo contains the scripts you can execute to simulate the (CVE-2025-55182) along with next.js server
URL:https://github.com/premdanav/react2shelldemo
标签:#CVE-2025
更新了:CVE-2025
描述:This repo contains the scripts you can execute to simulate the (CVE-2025-55182) along with next.js server
URL:https://github.com/premdanav/react2shelldemo
标签:#CVE-2025
GitHub
GitHub - premdanav/react2shelldemo: This repo contains the scripts you can execute to simulate the (CVE-2025-55182) along with…
This repo contains the scripts you can execute to simulate the (CVE-2025-55182) along with next.js server - premdanav/react2shelldemo
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-12163
URL:https://github.com/SnailSploit/CVE-2025-12163
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-12163
URL:https://github.com/SnailSploit/CVE-2025-12163
标签:#CVE-2025
GitHub
GitHub - SnailSploit/CVE-2025-12163: CVE-2025-12163
CVE-2025-12163. Contribute to SnailSploit/CVE-2025-12163 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Security advisory for CVE-2025-65855
URL:https://github.com/LuisMirandaAcebedo/CVE-2025-65855
标签:#CVE-2025
更新了:CVE-2025
描述:Security advisory for CVE-2025-65855
URL:https://github.com/LuisMirandaAcebedo/CVE-2025-65855
标签:#CVE-2025
GitHub
GitHub - LuisMirandaAcebedo/CVE-2025-65855: Security advisory for CVE-2025-65855
Security advisory for CVE-2025-65855. Contribute to LuisMirandaAcebedo/CVE-2025-65855 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is a python PoC scripts for CVE-2025-24071 which is a vulnerability in Windows File Explorer that allows unauthorized access to sensitive information like NTLM Exposure.
URL:https://github.com/Abdelrahman0Sayed/CVE-2025-24071
标签:#CVE-2025
更新了:CVE-2025
描述:This is a python PoC scripts for CVE-2025-24071 which is a vulnerability in Windows File Explorer that allows unauthorized access to sensitive information like NTLM Exposure.
URL:https://github.com/Abdelrahman0Sayed/CVE-2025-24071
标签:#CVE-2025
GitHub
GitHub - Abdelrahman0Sayed/CVE-2025-24071: This is a python PoC scripts for CVE-2025-24071 which is a vulnerability in Windows…
This is a python PoC scripts for CVE-2025-24071 which is a vulnerability in Windows File Explorer that allows unauthorized access to sensitive information like NTLM Exposure. - Abdelrahman0Sayed/CV...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Documentation of CVE-2025-68116
URL:https://github.com/x0root/CVE-2025-68116
标签:#CVE-2025
更新了:CVE-2025
描述:A Documentation of CVE-2025-68116
URL:https://github.com/x0root/CVE-2025-68116
标签:#CVE-2025
GitHub
GitHub - x0root/CVE-2025-68116: A Documentation of CVE-2025-68116
A Documentation of CVE-2025-68116. Contribute to x0root/CVE-2025-68116 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:webshell编码工具 支持 jsp net php asp编码免杀
URL:https://github.com/hackerxj007/Bypass_Webshell
标签:#免杀
更新了:免杀
描述:webshell编码工具 支持 jsp net php asp编码免杀
URL:https://github.com/hackerxj007/Bypass_Webshell
标签:#免杀
GitHub
GitHub - hackerxj007/Bypass_Webshell: webshell编码工具 支持 jsp net php asp编码免杀
webshell编码工具 支持 jsp net php asp编码免杀. Contribute to hackerxj007/Bypass_Webshell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65427: Missing rate limiting in Dbit N300 T1 Pro router login API allows brute-force attacks
URL:https://github.com/kirubel-cve/CVE-2025-65427
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65427: Missing rate limiting in Dbit N300 T1 Pro router login API allows brute-force attacks
URL:https://github.com/kirubel-cve/CVE-2025-65427
标签:#CVE-2025
GitHub
GitHub - kirubel-cve/CVE-2025-65427: CVE-2025-65427: Missing rate limiting in Dbit N300 T1 Pro router login API allows brute-force…
CVE-2025-65427: Missing rate limiting in Dbit N300 T1 Pro router login API allows brute-force attacks - kirubel-cve/CVE-2025-65427