GitHub监控消息提醒!!!
更新了:CVE-2025
描述: CVE-2025-3464: Unprivileged LPE exploit for ASUS AsIO3.sys - TOCTOU auth bypass + PreviousMode decrement
URL:https://github.com/jeffaf/CVE-2025-3464-AsIO3-LPE
标签:#CVE-2025
更新了:CVE-2025
描述: CVE-2025-3464: Unprivileged LPE exploit for ASUS AsIO3.sys - TOCTOU auth bypass + PreviousMode decrement
URL:https://github.com/jeffaf/CVE-2025-3464-AsIO3-LPE
标签:#CVE-2025
GitHub
GitHub - jeffaf/CVE-2025-3464-AsIO3-LPE: CVE-2025-3464: LPE exploit for ASUS AsIO3.sys
CVE-2025-3464: LPE exploit for ASUS AsIO3.sys . Contribute to jeffaf/CVE-2025-3464-AsIO3-LPE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2Shell vulnerability verification lab for BreachPilot testing (CVE-2025-55182 simulation)
URL:https://github.com/d01ki/react2shell-lab
标签:#CVE-2025
更新了:CVE-2025
描述:React2Shell vulnerability verification lab for BreachPilot testing (CVE-2025-55182 simulation)
URL:https://github.com/d01ki/react2shell-lab
标签:#CVE-2025
GitHub
GitHub - d01ki/react2shell-lab: React2Shell vulnerability verification lab for BreachPilot testing (CVE-2025-55182 simulation)
React2Shell vulnerability verification lab for BreachPilot testing (CVE-2025-55182 simulation) - d01ki/react2shell-lab
GitHub监控消息提醒!!!
更新了:RCE
描述:Proof-of-concept for a patched WebSocket RCE in the CurseForge launcher
URL:https://github.com/elliott-diy/CurseForge
标签:#RCE
更新了:RCE
描述:Proof-of-concept for a patched WebSocket RCE in the CurseForge launcher
URL:https://github.com/elliott-diy/CurseForge
标签:#RCE
GitHub
GitHub - elliott-diy/CurseForge: Proof-of-concept for a patched WebSocket RCE in the CurseForge launcher
Proof-of-concept for a patched WebSocket RCE in the CurseForge launcher - elliott-diy/CurseForge
GitHub监控消息提醒!!!
更新了:代码审计
描述:DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源的代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署 ,一键生成报告。支持中转站。让安全不再昂贵,让审计不再复杂。
URL:https://github.com/BlkSword/DeepAudit
标签:#代码审计
更新了:代码审计
描述:DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源的代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署 ,一键生成报告。支持中转站。让安全不再昂贵,让审计不再复杂。
URL:https://github.com/BlkSword/DeepAudit
标签:#代码审计
GitHub
GitHub - BlkSword/DeepAudit: A high-level code auditing tool that supports the MCP protocol, integrated with an AST engine, rule…
A high-level code auditing tool that supports the MCP protocol, integrated with an AST engine, rule engine, code graph, and other tools, can further enhance LLM auditing capabilities. 支持 MCP 协议的高级...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一个模型上下文协议(MCP)服务器,将 Kali Linux 安全工具交给 AI使用,用于授权的安全测试和渗透测试。
URL:https://github.com/wooluo/kali-mcp
标签:#渗透测试
更新了:渗透测试
描述:一个模型上下文协议(MCP)服务器,将 Kali Linux 安全工具交给 AI使用,用于授权的安全测试和渗透测试。
URL:https://github.com/wooluo/kali-mcp
标签:#渗透测试
GitHub
GitHub - wooluo/kali-mcp: 一个模型上下文协议(MCP)服务器,将 Kali Linux 安全工具交给 AI使用,用于授权的安全测试和渗透测试。
一个模型上下文协议(MCP)服务器,将 Kali Linux 安全工具交给 AI使用,用于授权的安全测试和渗透测试。 - wooluo/kali-mcp
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:基于Pocsuite3 框架编写的漏洞验证与利用脚本,用于检测 n8n工作流自动化工具中的认证后远程代码执行漏洞(RCE)
URL:https://github.com/secjoker/CVE-2025-68613
标签:#CVE-2025
更新了:CVE-2025
描述:基于Pocsuite3 框架编写的漏洞验证与利用脚本,用于检测 n8n工作流自动化工具中的认证后远程代码执行漏洞(RCE)
URL:https://github.com/secjoker/CVE-2025-68613
标签:#CVE-2025
GitHub
GitHub - secjoker/CVE-2025-68613: 基于Pocsuite3 框架编写的漏洞验证与利用脚本,用于检测 n8n工作流自动化工具中的认证后远程代码执行漏洞(RCE)
基于Pocsuite3 框架编写的漏洞验证与利用脚本,用于检测 n8n工作流自动化工具中的认证后远程代码执行漏洞(RCE) - secjoker/CVE-2025-68613
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Analysis of CVE-2025-68613
URL:https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab
标签:#CVE-2025
更新了:CVE-2025
描述:Analysis of CVE-2025-68613
URL:https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab
标签:#CVE-2025
GitHub
GitHub - r4j3sh-com/CVE-2025-68613-n8n-lab: Analysis of CVE-2025-68613
Analysis of CVE-2025-68613. Contribute to r4j3sh-com/CVE-2025-68613-n8n-lab development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is a lab for reproducing CVE-2025-55182.
URL:https://github.com/bigbluewhale111/CVE-2025-55182-LAB
标签:#CVE-2025
更新了:CVE-2025
描述:This is a lab for reproducing CVE-2025-55182.
URL:https://github.com/bigbluewhale111/CVE-2025-55182-LAB
标签:#CVE-2025
GitHub
GitHub - bigbluewhale111/CVE-2025-55182-LAB: This is a lab for reproducing CVE-2025-55182.
This is a lab for reproducing CVE-2025-55182. Contribute to bigbluewhale111/CVE-2025-55182-LAB development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:🛡️ Explore CVE-2025-55182, a critical RCE vulnerability in React's Flight Protocol, demonstrating exploitation techniques and mitigation strategies.
URL:https://github.com/Farhan9488/CVE-2025-55182-research
标签:#RCE
更新了:RCE
描述:🛡️ Explore CVE-2025-55182, a critical RCE vulnerability in React's Flight Protocol, demonstrating exploitation techniques and mitigation strategies.
URL:https://github.com/Farhan9488/CVE-2025-55182-research
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:GUI Shodan-powered scanner to identify n8n instances exposed to CVE-2025-68613 (version range 0.211.0–1.122.0)
URL:https://github.com/manyaigdtuw/CVE-2025-68613_shodan-scanner_n8n
标签:#CVE-2025
更新了:CVE-2025
描述:GUI Shodan-powered scanner to identify n8n instances exposed to CVE-2025-68613 (version range 0.211.0–1.122.0)
URL:https://github.com/manyaigdtuw/CVE-2025-68613_shodan-scanner_n8n
标签:#CVE-2025
GitHub
GitHub - manyaigdtuw/CVE-2025-68613_shodan-scanner_n8n: GUI Shodan-powered scanner to identify n8n instances exposed to CVE-2025…
GUI Shodan-powered scanner to identify n8n instances exposed to CVE-2025-68613 (version range 0.211.0–1.122.0) - manyaigdtuw/CVE-2025-68613_shodan-scanner_n8n
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing remote code execution without authentication.
URL:https://github.com/Ghost121111/Blackash-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing remote code execution without authentication.
URL:https://github.com/Ghost121111/Blackash-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Ghost121111/Blackash-CVE-2025-55182: 🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing…
🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing remote code execution without authentication. - Ghost121111/Blackash-CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution via prototype chain pollution in `react-server-dom-webpack@19.0.0`.
URL:https://github.com/slreaperking/CVE-2025-55182-poc
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution via prototype chain pollution in `react-server-dom-webpack@19.0.0`.
URL:https://github.com/slreaperking/CVE-2025-55182-poc
标签:#CVE-2025
GitHub
GitHub - slreaperking/CVE-2025-55182-poc: 🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution…
🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution via prototype chain pollution in `react-server-dom-webpack@19.0.0`. - slreaperking/CVE-2025-55182-poc
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit and scan for CVE-2025-55182, a critical React/Next.js vulnerability enabling remote code execution through prototype pollution techniques.
URL:https://github.com/phornnato/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit and scan for CVE-2025-55182, a critical React/Next.js vulnerability enabling remote code execution through prototype pollution techniques.
URL:https://github.com/phornnato/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - phornnato/CVE-2025-55182: 🚨 Exploit and scan for CVE-2025-55182, a critical React/Next.js vulnerability enabling remote…
🚨 Exploit and scan for CVE-2025-55182, a critical React/Next.js vulnerability enabling remote code execution through prototype pollution techniques. - phornnato/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:信息收集
描述:1. (简答题) 要求根据EditText,CheckBox,RadioButton,Spinner,并用这些控件做一个学生信息收集页面。 或者一个注册界面,注册信息包括:学号,姓名,性别(单选),兴趣爱好(多选),界面中由提交按钮和推出按钮。当点提交按钮时,会收集界面中的信息并输出在log中,点击退出 按钮时结束程序。
URL:https://github.com/Dovebggs/BGGS
标签:#信息收集
更新了:信息收集
描述:1. (简答题) 要求根据EditText,CheckBox,RadioButton,Spinner,并用这些控件做一个学生信息收集页面。 或者一个注册界面,注册信息包括:学号,姓名,性别(单选),兴趣爱好(多选),界面中由提交按钮和推出按钮。当点提交按钮时,会收集界面中的信息并输出在log中,点击退出 按钮时结束程序。
URL:https://github.com/Dovebggs/BGGS
标签:#信息收集
GitHub
Dovebggs/BGGS
1. (简答题) 要求根据EditText,CheckBox,RadioButton,Spinner,并用这些控件做一个学生信息收集页面。 或者一个注册界面,注册信息包括:学号,姓名,性别(单选),兴趣爱好(多选),界面中由提交按钮和推出按钮。当点提交按钮时,会收集界面中的信息并输出在log中,点击退出 按钮时结束程序。 - Dovebggs/BGGS
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A evolved version of assetnote CVE-2025-55182 scanner
URL:https://github.com/guiimoraes/react2shell-evolved
标签:#CVE-2025
更新了:CVE-2025
描述:A evolved version of assetnote CVE-2025-55182 scanner
URL:https://github.com/guiimoraes/react2shell-evolved
标签:#CVE-2025
GitHub
GitHub - guiimoraes/react2shell-evolved: A evolved version of assetnote CVE-2025-55182 scanner
A evolved version of assetnote CVE-2025-55182 scanner - guiimoraes/react2shell-evolved
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool that helps detect critical vulnerabilities in your applications.
URL:https://github.com/mayank729/CVE-2025-55182-scanner
标签:#RCE
更新了:RCE
描述:🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool that helps detect critical vulnerabilities in your applications.
URL:https://github.com/mayank729/CVE-2025-55182-scanner
标签:#RCE
GitHub
GitHub - mayank729/CVE-2025-55182-scanner: 🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool…
🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool that helps detect critical vulnerabilities in your applications. - mayank729/CVE-2025-55182-scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A denial-of-service vulnerability in the AuntyFey BLE smart padlock allows unauthenticated connection floods to lock out legitimate users. CVE-2025-34462.
URL:https://github.com/NSM-Barii/CVE-2025-34462
标签:#CVE-2025
更新了:CVE-2025
描述:A denial-of-service vulnerability in the AuntyFey BLE smart padlock allows unauthenticated connection floods to lock out legitimate users. CVE-2025-34462.
URL:https://github.com/NSM-Barii/CVE-2025-34462
标签:#CVE-2025
GitHub
GitHub - NSM-Barii/CVE-2025-34462: Proof‑of‑Concept for unauthenticated BLE DoS on smart lock
Proof‑of‑Concept for unauthenticated BLE DoS on smart lock - NSM-Barii/CVE-2025-34462
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
URL:https://github.com/xgbtxy/Burp-Entropy-Reducer
标签:#渗透测试
更新了:渗透测试
描述:Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
URL:https://github.com/xgbtxy/Burp-Entropy-Reducer
标签:#渗透测试
GitHub
GitHub - xgbtxy/Burp-Entropy-Reducer: Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。 - xgbtxy/Burp-Entropy-Reducer
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/baktistr/cve-2025-59532-poc
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/baktistr/cve-2025-59532-poc
标签:#CVE-2025
GitHub
GitHub - baktistr/cve-2025-59532-poc: A Docker-based research environment for analyzing CVE-2025-59532, a path traversal vulnerability…
A Docker-based research environment for analyzing CVE-2025-59532, a path traversal vulnerability in OpenAI Codex CLI that allows arbitrary file write outside the intended workspace sandbox. Part of...
GitHub监控消息提醒!!!
更新了:RCE
描述:This exploit script is designed to simplify exploitation of the Erlang/OTP SSH vulnerability CVE-2025-32433 in the TryHackMe lab environment.
URL:https://github.com/giriaryan694-a11y/cve-2025-32433_rce_exploit
标签:#RCE
更新了:RCE
描述:This exploit script is designed to simplify exploitation of the Erlang/OTP SSH vulnerability CVE-2025-32433 in the TryHackMe lab environment.
URL:https://github.com/giriaryan694-a11y/cve-2025-32433_rce_exploit
标签:#RCE
GitHub
GitHub - giriaryan694-a11y/cve-2025-32433_rce_exploit: This exploit script is designed to simplify exploitation of the Erlang/OTP…
This exploit script is designed to simplify exploitation of the Erlang/OTP SSH vulnerability CVE-2025-32433 in the TryHackMe lab environment. - giriaryan694-a11y/cve-2025-32433_rce_exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner.
URL:https://github.com/meneim99/react2shell-scanner
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner.
URL:https://github.com/meneim99/react2shell-scanner
标签:#CVE-2025
GitHub
GitHub - meneim99/react2shell-scanner: 🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable…
🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner. - meneim99/react2shell-scanner