GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)
URL:https://github.com/jedisct1/CVE-2025-65945-poc
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)
URL:https://github.com/jedisct1/CVE-2025-65945-poc
标签:#CVE-2025
GitHub
GitHub - jedisct1/CVE-2025-65945-poc: PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)
PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws) - jedisct1/CVE-2025-65945-poc
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2shell vulnerable lab (CVE-2025-55182)
URL:https://github.com/pwnxpl0it/react2shell-lab
标签:#CVE-2025
更新了:CVE-2025
描述:React2shell vulnerable lab (CVE-2025-55182)
URL:https://github.com/pwnxpl0it/react2shell-lab
标签:#CVE-2025
GitHub
GitHub - pwnxpl0it/react2shell-lab: React2shell vulnerable lab (CVE-2025-55182)
React2shell vulnerable lab (CVE-2025-55182) . Contribute to pwnxpl0it/react2shell-lab development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Nixon-H/CVE-2025-68147-OSPOS-Stored-XSS
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Nixon-H/CVE-2025-68147-OSPOS-Stored-XSS
标签:#CVE-2025
GitHub
GitHub - Nixon-H/CVE-2025-68147-OSPOS-Stored-XSS: PoC repository for CVE-2025-68147: Stored Cross-Site Scripting (XSS) in OpenSourcePOS.…
PoC repository for CVE-2025-68147: Stored Cross-Site Scripting (XSS) in OpenSourcePOS. Vulnerability allows privilege escalation via malicious JavaScript injection in the Store Config module. Inclu...
GitHub监控消息提醒!!!
更新了:反序列化
描述:旨在提供一套简单高效、跨语言的数据封包(FB)与解包(deFB)方案(包含复杂对象序列化/反序列化),便于在对数据进行统一的二进制参数级交互(封包中无需存档额外元信息)
URL:https://github.com/xbcsoft/BC-FB-Standard
标签:#反序列化
更新了:反序列化
描述:旨在提供一套简单高效、跨语言的数据封包(FB)与解包(deFB)方案(包含复杂对象序列化/反序列化),便于在对数据进行统一的二进制参数级交互(封包中无需存档额外元信息)
URL:https://github.com/xbcsoft/BC-FB-Standard
标签:#反序列化
GitHub
xbcsoft/BC-FB-Standard
旨在提供一套简单高效、跨语言的数据封包(FB)与解包(deFB)方案(包含复杂对象序列化/反序列化),便于在对数据进行统一的二进制参数级交互(封包中无需存档额外元信息) - xbcsoft/BC-FB-Standard
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1
URL:https://github.com/Nosiume/CVE-2025-14700-poc
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1
URL:https://github.com/Nosiume/CVE-2025-14700-poc
标签:#CVE-2025
GitHub
GitHub - Nosiume/CVE-2025-14700-poc: Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1
Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1 - Nosiume/CVE-2025-14700-poc
GitHub监控消息提醒!!!
更新了:RCE
描述:A comprehensive vulnerability scanner for CVE-2025-13780, a Remote Code Execution (RCE) vulnerability in pgAdmin 4 versions ≤ 8.14.
URL:https://github.com/ThemeHackers/CVE-2025-13780
标签:#RCE
更新了:RCE
描述:A comprehensive vulnerability scanner for CVE-2025-13780, a Remote Code Execution (RCE) vulnerability in pgAdmin 4 versions ≤ 8.14.
URL:https://github.com/ThemeHackers/CVE-2025-13780
标签:#RCE
GitHub
GitHub - ThemeHackers/CVE-2025-13780: Under development. Please read me carefully.
Under development. Please read me carefully. Contribute to ThemeHackers/CVE-2025-13780 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/aleksandrova834/react2shell-bypasswaf
标签:#CVE-2025
更新了:CVE-2025
描述:High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/aleksandrova834/react2shell-bypasswaf
标签:#CVE-2025
GitHub
GitHub - aleksandrova834/react2shell-bypasswaf: High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025…
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478) - aleksandrova834/react2shell-bypasswaf
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Ce dépôt fournit des règles Sigma prêtes pour la production afin de détecter l’exploitation de la vulnérabilité CVE-2025-6218 affectant WinRAR sous Windows.
URL:https://github.com/thesystemowner/CVE-2025-20393-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Ce dépôt fournit des règles Sigma prêtes pour la production afin de détecter l’exploitation de la vulnérabilité CVE-2025-6218 affectant WinRAR sous Windows.
URL:https://github.com/thesystemowner/CVE-2025-20393-POC
标签:#CVE-2025
GitHub
GitHub - thesystemowner/CVE-2025-20393-POC: This scanner detects Cisco SEG/SEWM appliances vulnerable to CVE-2025-20393, a…
This scanner detects Cisco SEG/SEWM appliances vulnerable to CVE-2025-20393, a critical unauthenticated RCE vulnerability in Cisco AsyncOS affecting devices with Spam Quarantine feature...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-40602
URL:https://github.com/rxerium/CVE-2025-40602
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-40602
URL:https://github.com/rxerium/CVE-2025-40602
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-40602: Detection for CVE-2025-40602
Detection for CVE-2025-40602. Contribute to rxerium/CVE-2025-40602 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:“银狐木马”应急响应工具包
URL:https://github.com/anonymous-echo/Silver_Fox_IncidentResponse
标签:#应急响应
更新了:应急响应
描述:“银狐木马”应急响应工具包
URL:https://github.com/anonymous-echo/Silver_Fox_IncidentResponse
标签:#应急响应
GitHub
GitHub - anonymous-echo/Silver_Fox_IncidentResponse: “银狐木马”应急响应工具包
“银狐木马”应急响应工具包. Contribute to anonymous-echo/Silver_Fox_IncidentResponse development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182.
URL:https://github.com/r4j3sh-com/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182.
URL:https://github.com/r4j3sh-com/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - r4j3sh-com/CVE-2025-55182: Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182.
Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182. - r4j3sh-com/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller
URL:https://github.com/secdongle/POC_CVE-2025-14700
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller
URL:https://github.com/secdongle/POC_CVE-2025-14700
标签:#CVE-2025
GitHub
GitHub - secdongle/POC_CVE-2025-14700: Proof of Concept for Authenticated RCE in Crafty Controller
Proof of Concept for Authenticated RCE in Crafty Controller - secdongle/POC_CVE-2025-14700
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Satirush/CVE-2025-14174-Poc
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Satirush/CVE-2025-14174-Poc
标签:#CVE-2025
GitHub
GitHub - Satirush/CVE-2025-14174-Poc: Proof-of-Concept exploit for CVE-2025-14174 (EUVD-2025-203113) - Memory corruption in ANGLE…
Proof-of-Concept exploit for CVE-2025-14174 (EUVD-2025-203113) - Memory corruption in ANGLE allowing out-of-bounds access and RCE in web browsers. Reliable on iOS/Android/Windows, including patched...
GitHub监控消息提醒!!!
更新了:RCE
描述:Hands-on penetration testing lab exploiting a Laravel Debug RCE vulnerability in a controlled environment.
URL:https://github.com/BlackOussema/laravel-debug-rce-lab
标签:#RCE
更新了:RCE
描述:Hands-on penetration testing lab exploiting a Laravel Debug RCE vulnerability in a controlled environment.
URL:https://github.com/BlackOussema/laravel-debug-rce-lab
标签:#RCE
GitHub
GitHub - BlackOussema/laravel-debug-rce-lab: Hands-on penetration testing lab exploiting a Laravel Debug RCE vulnerability in a…
Hands-on penetration testing lab exploiting a Laravel Debug RCE vulnerability in a controlled environment. - BlackOussema/laravel-debug-rce-lab
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-37164
URL:https://github.com/rxerium/CVE-2025-37164
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-37164
URL:https://github.com/rxerium/CVE-2025-37164
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-37164: Detection for CVE-2025-37164
Detection for CVE-2025-37164. Contribute to rxerium/CVE-2025-37164 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Notes about Active Directory Red Teaming from CRTP
URL:https://github.com/k1tch0p/CRTP
标签:#Red Team
更新了:Red Team
描述:Notes about Active Directory Red Teaming from CRTP
URL:https://github.com/k1tch0p/CRTP
标签:#Red Team
GitHub
GitHub - k1tch0p/CRTP: Notes about Active Directory Red Teaming from CRTP
Notes about Active Directory Red Teaming from CRTP - GitHub - k1tch0p/CRTP: Notes about Active Directory Red Teaming from CRTP
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/3886370410/KxqzlUFkOM
标签:#应急响应
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/3886370410/KxqzlUFkOM
标签:#应急响应
GitHub
GitHub - 3886370410/KxqzlUFkOM: 本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有…
本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。 - 3886370410/KxqzlUFkOM
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:B1ackH0rse是一款现代化的、性能更快的Web漏洞扫描器,目前正在使用rust重新开发。
URL:https://github.com/L1nf3ng/B1ackH0rse
标签:#漏洞扫描
更新了:漏洞扫描
描述:B1ackH0rse是一款现代化的、性能更快的Web漏洞扫描器,目前正在使用rust重新开发。
URL:https://github.com/L1nf3ng/B1ackH0rse
标签:#漏洞扫描
GitHub
GitHub - L1nf3ng/B1ackH0rse: B1ackH0rse是一款现代化的、性能更快的Web漏洞扫描器,目前正在使用rust重新开发。
B1ackH0rse是一款现代化的、性能更快的Web漏洞扫描器,目前正在使用rust重新开发。. Contribute to L1nf3ng/B1ackH0rse development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC
标签:#RCE
GitHub
GitHub - RavinduRathnayaka/CVE-2025-55182-PoC: React2Shell (CVE-2025-66478): A Python-based Proof of Concept for Critical Remote…
React2Shell (CVE-2025-66478): A Python-based Proof of Concept for Critical Remote Code Execution (RCE) in Next.js Server Components. Features an interactive CLI, custom payload injection, and clean...