GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1
URL:https://github.com/Nosiume/CVE-2025-14700-poc
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1
URL:https://github.com/Nosiume/CVE-2025-14700-poc
标签:#CVE-2025
GitHub
GitHub - Nosiume/CVE-2025-14700-poc: Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1
Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1 - Nosiume/CVE-2025-14700-poc
GitHub监控消息提醒!!!
更新了:RCE
描述:A comprehensive vulnerability scanner for CVE-2025-13780, a Remote Code Execution (RCE) vulnerability in pgAdmin 4 versions ≤ 8.14.
URL:https://github.com/ThemeHackers/CVE-2025-13780
标签:#RCE
更新了:RCE
描述:A comprehensive vulnerability scanner for CVE-2025-13780, a Remote Code Execution (RCE) vulnerability in pgAdmin 4 versions ≤ 8.14.
URL:https://github.com/ThemeHackers/CVE-2025-13780
标签:#RCE
GitHub
GitHub - ThemeHackers/CVE-2025-13780: Under development. Please read me carefully.
Under development. Please read me carefully. Contribute to ThemeHackers/CVE-2025-13780 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/aleksandrova834/react2shell-bypasswaf
标签:#CVE-2025
更新了:CVE-2025
描述:High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/aleksandrova834/react2shell-bypasswaf
标签:#CVE-2025
GitHub
GitHub - aleksandrova834/react2shell-bypasswaf: High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025…
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478) - aleksandrova834/react2shell-bypasswaf
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Ce dépôt fournit des règles Sigma prêtes pour la production afin de détecter l’exploitation de la vulnérabilité CVE-2025-6218 affectant WinRAR sous Windows.
URL:https://github.com/thesystemowner/CVE-2025-20393-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Ce dépôt fournit des règles Sigma prêtes pour la production afin de détecter l’exploitation de la vulnérabilité CVE-2025-6218 affectant WinRAR sous Windows.
URL:https://github.com/thesystemowner/CVE-2025-20393-POC
标签:#CVE-2025
GitHub
GitHub - thesystemowner/CVE-2025-20393-POC: This scanner detects Cisco SEG/SEWM appliances vulnerable to CVE-2025-20393, a…
This scanner detects Cisco SEG/SEWM appliances vulnerable to CVE-2025-20393, a critical unauthenticated RCE vulnerability in Cisco AsyncOS affecting devices with Spam Quarantine feature...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-40602
URL:https://github.com/rxerium/CVE-2025-40602
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-40602
URL:https://github.com/rxerium/CVE-2025-40602
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-40602: Detection for CVE-2025-40602
Detection for CVE-2025-40602. Contribute to rxerium/CVE-2025-40602 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:“银狐木马”应急响应工具包
URL:https://github.com/anonymous-echo/Silver_Fox_IncidentResponse
标签:#应急响应
更新了:应急响应
描述:“银狐木马”应急响应工具包
URL:https://github.com/anonymous-echo/Silver_Fox_IncidentResponse
标签:#应急响应
GitHub
GitHub - anonymous-echo/Silver_Fox_IncidentResponse: “银狐木马”应急响应工具包
“银狐木马”应急响应工具包. Contribute to anonymous-echo/Silver_Fox_IncidentResponse development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182.
URL:https://github.com/r4j3sh-com/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182.
URL:https://github.com/r4j3sh-com/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - r4j3sh-com/CVE-2025-55182: Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182.
Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182. - r4j3sh-com/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller
URL:https://github.com/secdongle/POC_CVE-2025-14700
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller
URL:https://github.com/secdongle/POC_CVE-2025-14700
标签:#CVE-2025
GitHub
GitHub - secdongle/POC_CVE-2025-14700: Proof of Concept for Authenticated RCE in Crafty Controller
Proof of Concept for Authenticated RCE in Crafty Controller - secdongle/POC_CVE-2025-14700
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Satirush/CVE-2025-14174-Poc
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Satirush/CVE-2025-14174-Poc
标签:#CVE-2025
GitHub
GitHub - Satirush/CVE-2025-14174-Poc: Proof-of-Concept exploit for CVE-2025-14174 (EUVD-2025-203113) - Memory corruption in ANGLE…
Proof-of-Concept exploit for CVE-2025-14174 (EUVD-2025-203113) - Memory corruption in ANGLE allowing out-of-bounds access and RCE in web browsers. Reliable on iOS/Android/Windows, including patched...
GitHub监控消息提醒!!!
更新了:RCE
描述:Hands-on penetration testing lab exploiting a Laravel Debug RCE vulnerability in a controlled environment.
URL:https://github.com/BlackOussema/laravel-debug-rce-lab
标签:#RCE
更新了:RCE
描述:Hands-on penetration testing lab exploiting a Laravel Debug RCE vulnerability in a controlled environment.
URL:https://github.com/BlackOussema/laravel-debug-rce-lab
标签:#RCE
GitHub
GitHub - BlackOussema/laravel-debug-rce-lab: Hands-on penetration testing lab exploiting a Laravel Debug RCE vulnerability in a…
Hands-on penetration testing lab exploiting a Laravel Debug RCE vulnerability in a controlled environment. - BlackOussema/laravel-debug-rce-lab
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-37164
URL:https://github.com/rxerium/CVE-2025-37164
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-37164
URL:https://github.com/rxerium/CVE-2025-37164
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-37164: Detection for CVE-2025-37164
Detection for CVE-2025-37164. Contribute to rxerium/CVE-2025-37164 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Notes about Active Directory Red Teaming from CRTP
URL:https://github.com/k1tch0p/CRTP
标签:#Red Team
更新了:Red Team
描述:Notes about Active Directory Red Teaming from CRTP
URL:https://github.com/k1tch0p/CRTP
标签:#Red Team
GitHub
GitHub - k1tch0p/CRTP: Notes about Active Directory Red Teaming from CRTP
Notes about Active Directory Red Teaming from CRTP - GitHub - k1tch0p/CRTP: Notes about Active Directory Red Teaming from CRTP
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/3886370410/KxqzlUFkOM
标签:#应急响应
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/3886370410/KxqzlUFkOM
标签:#应急响应
GitHub
GitHub - 3886370410/KxqzlUFkOM: 本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有…
本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。 - 3886370410/KxqzlUFkOM
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:B1ackH0rse是一款现代化的、性能更快的Web漏洞扫描器,目前正在使用rust重新开发。
URL:https://github.com/L1nf3ng/B1ackH0rse
标签:#漏洞扫描
更新了:漏洞扫描
描述:B1ackH0rse是一款现代化的、性能更快的Web漏洞扫描器,目前正在使用rust重新开发。
URL:https://github.com/L1nf3ng/B1ackH0rse
标签:#漏洞扫描
GitHub
GitHub - L1nf3ng/B1ackH0rse: B1ackH0rse是一款现代化的、性能更快的Web漏洞扫描器,目前正在使用rust重新开发。
B1ackH0rse是一款现代化的、性能更快的Web漏洞扫描器,目前正在使用rust重新开发。. Contribute to L1nf3ng/B1ackH0rse development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC
标签:#RCE
GitHub
GitHub - RavinduRathnayaka/CVE-2025-55182-PoC: React2Shell (CVE-2025-66478): A Python-based Proof of Concept for Critical Remote…
React2Shell (CVE-2025-66478): A Python-based Proof of Concept for Critical Remote Code Execution (RCE) in Next.js Server Components. Features an interactive CLI, custom payload injection, and clean...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is a Proof-Of-Concept of CVE-2025-63353
URL:https://github.com/0xA1M/CVE-2025-63353
标签:#CVE-2025
更新了:CVE-2025
描述:This is a Proof-Of-Concept of CVE-2025-63353
URL:https://github.com/0xA1M/CVE-2025-63353
标签:#CVE-2025
GitHub
GitHub - 0xA1M/CVE-2025-63353: This is a Proof-Of-Concept of CVE-2025-63353
This is a Proof-Of-Concept of CVE-2025-63353. Contribute to 0xA1M/CVE-2025-63353 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/findnr/findnr-feeds
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/findnr/findnr-feeds
标签:#护网
GitHub
GitHub - findnr/findnr-feeds: 这是一个 OpenWrt (lede)的 LuCI 插件 luci-app-simple2fa,旨在为路由器登录添加 TOTP 二次验证 (2FA) 功能,这样在做内网穿透增加了一层安全防护。luci…
这是一个 OpenWrt (lede)的 LuCI 插件 luci-app-simple2fa,旨在为路由器登录添加 TOTP 二次验证 (2FA) 功能,这样在做内网穿透增加了一层安全防护。luci-app-cymfrpc (客户端)` , 多实例管理:支持同时运行多个 frpc 进程,互不干扰。 luci-app-cymfrps (服务端),支持同时运行多个 frps 服务端进程,luc...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Demonstrate and validate the `addressof` and `fakeobj` primitives in the V8 sandbox for advanced security research on CVE-2025-6554.
URL:https://github.com/juccoblak/CVE-2025-6554
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Demonstrate and validate the `addressof` and `fakeobj` primitives in the V8 sandbox for advanced security research on CVE-2025-6554.
URL:https://github.com/juccoblak/CVE-2025-6554
标签:#CVE-2025
GitHub
GitHub - juccoblak/CVE-2025-6554: 🔍 Demonstrate and validate the `addressof` and `fakeobj` primitives in the V8 sandbox for advanced…
🔍 Demonstrate and validate the `addressof` and `fakeobj` primitives in the V8 sandbox for advanced security research on CVE-2025-6554. - juccoblak/CVE-2025-6554
GitHub监控消息提醒!!!
更新了:RCE
描述:Proof of concept of how to abuse a core “feature” in Terraria modding to obtain RCE on clients affecting all versions.
URL:https://github.com/s4mp0l/tModLoader_RCE
标签:#RCE
更新了:RCE
描述:Proof of concept of how to abuse a core “feature” in Terraria modding to obtain RCE on clients affecting all versions.
URL:https://github.com/s4mp0l/tModLoader_RCE
标签:#RCE
GitHub
GitHub - s4mp0l/tModLoader_RCE: Proof of concept of how to abuse a core “feature” in Terraria modding to obtain RCE on clients…
Proof of concept of how to abuse a core “feature” in Terraria modding to obtain RCE on clients affecting all versions. - s4mp0l/tModLoader_RCE
GitHub监控消息提醒!!!
更新了:应急响应
描述:Sentinel 是一个功能强大的跨平台(Windows/Linux)应急响应自动化分析工具,专注于威胁检测、恶意软件分析和安全评估。
URL:https://github.com/kk12-30/Sentinel
标签:#应急响应
更新了:应急响应
描述:Sentinel 是一个功能强大的跨平台(Windows/Linux)应急响应自动化分析工具,专注于威胁检测、恶意软件分析和安全评估。
URL:https://github.com/kk12-30/Sentinel
标签:#应急响应
GitHub
GitHub - kk12-30/Sentinel: Sentinel 是一个功能强大的跨平台(Windows/Linux)应急响应自动化分析工具,专注于威胁检测、恶意软件分析和安全评估。
Sentinel 是一个功能强大的跨平台(Windows/Linux)应急响应自动化分析工具,专注于威胁检测、恶意软件分析和安全评估。 - kk12-30/Sentinel