GitHub监控消息提醒!!!
更新了:RCE
描述:This exploit script is designed to simplify exploitation of the Erlang/OTP SSH vulnerability CVE-2025-32433 in the TryHackMe lab environment.
URL:https://github.com/giriaryan694-a11y/cve-2025-32433_rce_exploit
标签:#RCE
更新了:RCE
描述:This exploit script is designed to simplify exploitation of the Erlang/OTP SSH vulnerability CVE-2025-32433 in the TryHackMe lab environment.
URL:https://github.com/giriaryan694-a11y/cve-2025-32433_rce_exploit
标签:#RCE
GitHub
GitHub - giriaryan694-a11y/cve-2025-32433_rce_exploit: This exploit script is designed to simplify exploitation of the Erlang/OTP…
This exploit script is designed to simplify exploitation of the Erlang/OTP SSH vulnerability CVE-2025-32433 in the TryHackMe lab environment. - giriaryan694-a11y/cve-2025-32433_rce_exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner.
URL:https://github.com/meneim99/react2shell-scanner
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner.
URL:https://github.com/meneim99/react2shell-scanner
标签:#CVE-2025
GitHub
GitHub - meneim99/react2shell-scanner: 🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable…
🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner. - meneim99/react2shell-scanner
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一款轻量级的CTF/渗透测试Fuzz工具,专为URL/输入框的字符模糊测试设计,支持多编码方式、多线程、代理转发等功能,适配CTF竞赛和渗透测试中的字符注入检测场景。
URL:https://github.com/qqstar221/Ryzf
标签:#渗透测试
更新了:渗透测试
描述:一款轻量级的CTF/渗透测试Fuzz工具,专为URL/输入框的字符模糊测试设计,支持多编码方式、多线程、代理转发等功能,适配CTF竞赛和渗透测试中的字符注入检测场景。
URL:https://github.com/qqstar221/Ryzf
标签:#渗透测试
GitHub
GitHub - qqstar221/Ryzf: 一款轻量级的CTF/渗透测试Fuzz工具,专为URL/输入框的字符模糊测试设计,支持多编码方式、多线程、代理转发等功能,适配CTF竞赛和渗透测试中的字符注入检测场景。
一款轻量级的CTF/渗透测试Fuzz工具,专为URL/输入框的字符模糊测试设计,支持多编码方式、多线程、代理转发等功能,适配CTF竞赛和渗透测试中的字符注入检测场景。 - qqstar221/Ryzf
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Remote Code Execution via n8n Workflows (Based on CVE-2025-68613)
URL:https://github.com/AbdulRKB/n8n-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:Remote Code Execution via n8n Workflows (Based on CVE-2025-68613)
URL:https://github.com/AbdulRKB/n8n-RCE
标签:#CVE-2025
GitHub
GitHub - AbdulRKB/n8n-RCE: Remote Code Execution via n8n Workflows (Based on CVE-2025-68613)
Remote Code Execution via n8n Workflows (Based on CVE-2025-68613) - AbdulRKB/n8n-RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from insecure prototype references in Next.js applications.
URL:https://github.com/Mayca369/CVE-2025-55182
标签:#RCE
更新了:RCE
描述:🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from insecure prototype references in Next.js applications.
URL:https://github.com/Mayca369/CVE-2025-55182
标签:#RCE
GitHub
GitHub - Mayca369/CVE-2025-55182: 🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from…
🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from insecure prototype references in Next.js applications. - Mayca369/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated arbitrary code execution.
URL:https://github.com/wiixx44/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated arbitrary code execution.
URL:https://github.com/wiixx44/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - wiixx44/CVE-2025-55182: 🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated…
🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated arbitrary code execution. - wiixx44/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:本项目是一个开源的威胁情报源(Threat Intelligence Feed),数据来源于真实互联网环境部署的高交互蜜罐系统(HFish)。 该系统实时捕获并分析针对 SSH、HTTP、MySQL、Redis 等服务的恶意扫描、暴力破解及漏洞利用行为。经过自动化脚本清洗和白名单过滤后,生成高保真(High Fidelity)的恶意 IP 列表。
URL:https://github.com/yuexuan521/honeypot-blocklist
标签:#漏洞利用
更新了:漏洞利用
描述:本项目是一个开源的威胁情报源(Threat Intelligence Feed),数据来源于真实互联网环境部署的高交互蜜罐系统(HFish)。 该系统实时捕获并分析针对 SSH、HTTP、MySQL、Redis 等服务的恶意扫描、暴力破解及漏洞利用行为。经过自动化脚本清洗和白名单过滤后,生成高保真(High Fidelity)的恶意 IP 列表。
URL:https://github.com/yuexuan521/honeypot-blocklist
标签:#漏洞利用
GitHub
GitHub - yuexuan521/honeypot-blocklist: 本项目是一个开源的威胁情报源(Threat Intelligence Feed),数据来源于真实互联网环境部署的高交互蜜罐系统(HFish)。 该系统实时捕获并分析针对 …
本项目是一个开源的威胁情报源(Threat Intelligence Feed),数据来源于真实互联网环境部署的高交互蜜罐系统(HFish)。 该系统实时捕获并分析针对 SSH、HTTP、MySQL、Redis 等服务的恶意扫描、暴力破解及漏洞利用行为。经过自动化脚本清洗和白名单过滤后,生成高保真(High Fidelity)的恶意 IP 列表。 - yuexuan521/honeypot...
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/small-bears/gyming
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/small-bears/gyming
标签:#护网
GitHub
GitHub - small-bears/gyming: (协同过滤推荐算法)健身房管理系统 java springboot vue ssm mysql python Django vue 健身网站系统(源代码+数据库+配套论文+ppt) 角色:管理员、会员、教练…
(协同过滤推荐算法)健身房管理系统 java springboot vue ssm mysql python Django vue 健身网站系统(源代码+数据库+配套论文+ppt) 角色:管理员、会员、教练 管理员:对系统首页、我的信息、会员管理、教练管理、预约教练管理、器材分类管理、健身器材管理、预约器材管理、器材维护管理、课程分类管理、课程信息管理、报名课程管理、健身指导管理、商品分...
GitHub监控消息提醒!!!
更新了:水坑
描述:道路黑冰与水坑检测识别:基于RetinaNet_effb3_fpn的模型实现与分析
URL:https://github.com/share2code99/black_ice_water_detection
标签:#水坑
更新了:水坑
描述:道路黑冰与水坑检测识别:基于RetinaNet_effb3_fpn的模型实现与分析
URL:https://github.com/share2code99/black_ice_water_detection
标签:#水坑
GitHub
GitHub - share2code99/black_ice_water_detection: 道路黑冰与水坑检测识别:基于RetinaNet_effb3_fpn的模型实现与分析
道路黑冰与水坑检测识别:基于RetinaNet_effb3_fpn的模型实现与分析. Contribute to share2code99/black_ice_water_detection development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源的代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署 ,一键生成报告。支持中转站。让安全不再昂贵,让审计不再复杂。
URL:https://github.com/yangqi1309134997-coder/Cybersecurity-Dataset
标签:#代码审计
更新了:代码审计
描述:DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源的代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署 ,一键生成报告。支持中转站。让安全不再昂贵,让审计不再复杂。
URL:https://github.com/yangqi1309134997-coder/Cybersecurity-Dataset
标签:#代码审计
GitHub
GitHub - yangqi1309134997-coder/Cybersecurity-Dataset: 网络安全数据集是一个全面的网络安全相关数据集合,旨在用于训练和微调网络安全应用中的大型语言模型 (LLM)。它专注于内部网络(离线)环境,解决漏洞检测、威胁分析、代码审计和…
网络安全数据集是一个全面的网络安全相关数据集合,旨在用于训练和微调网络安全应用中的大型语言模型 (LLM)。它专注于内部网络(离线)环境,解决漏洞检测、威胁分析、代码审计和 AI 驱动的防御机制等痛点。该数据集经过精心策划,旨在支持开发本地部署的 AI 模型,例如 DeepSeek-14B 和 Qwen-Code-30B MOE,从而实现敏感数据映射、零信任架构、AI 威胁预警、智能代码安全...
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/kevinyang5771323/TJQPrcbkoX
标签:#应急响应
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/kevinyang5771323/TJQPrcbkoX
标签:#应急响应
GitHub
GitHub - kevinyang5771323/TJQPrcbkoX: 本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急…
本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。 - kevinyang5771323/TJQPr...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Python Exploit for CVE-2025-68613.
URL:https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Python Exploit for CVE-2025-68613.
URL:https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit
标签:#CVE-2025
GitHub
GitHub - JohannesLks/CVE-2025-68613-Python-Exploit: Python Exploit for CVE-2025-68613.
Python Exploit for CVE-2025-68613. Contribute to JohannesLks/CVE-2025-68613-Python-Exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32462 is a local privilege escalation vulnerability in sudo
URL:https://github.com/OffSecPlaybook/CVE-2025-32462-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32462 is a local privilege escalation vulnerability in sudo
URL:https://github.com/OffSecPlaybook/CVE-2025-32462-
标签:#CVE-2025
GitHub
GitHub - OffSecPlaybook/CVE-2025-32462-: CVE-2025-32462 is a local privilege escalation vulnerability in sudo
CVE-2025-32462 is a local privilege escalation vulnerability in sudo - OffSecPlaybook/CVE-2025-32462-
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Scan Next.js apps for CVE-2025-66478 vulnerability detection with this command-line tool, ensuring your applications remain secure and unaffected.
URL:https://github.com/thedarckpassenger/Next.js-RSC-RCE-Scanner-CVE-2025-66478
标签:#RCE
更新了:RCE
描述:🔍 Scan Next.js apps for CVE-2025-66478 vulnerability detection with this command-line tool, ensuring your applications remain secure and unaffected.
URL:https://github.com/thedarckpassenger/Next.js-RSC-RCE-Scanner-CVE-2025-66478
标签:#RCE
GitHub
thedarckpassenger/Next.js-RSC-RCE-Scanner-CVE-2025-66478
🔍 Scan Next.js apps for CVE-2025-66478 vulnerability detection with this command-line tool, ensuring your applications remain secure and unaffected. - thedarckpassenger/Next.js-RSC-RCE-Scanner-CVE-...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:n8n God Mode Ultimate - CVE-2025-68613 Scanner v1.0.0 ║ ║ Workflow Automation Remote Code Execution
URL:https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate
标签:#CVE-2025
更新了:CVE-2025
描述:n8n God Mode Ultimate - CVE-2025-68613 Scanner v1.0.0 ║ ║ Workflow Automation Remote Code Execution
URL:https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate
标签:#CVE-2025
GitHub
GitHub - hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate: n8n God Mode Ultimate - CVE-2025-68613 Scanner v1.0.0…
n8n God Mode Ultimate - CVE-2025-68613 Scanner v1.0.0 ║ ║ Workflow Automation Remote Code Execution - GitHub - hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultim...
GitHub监控消息提醒!!!
更新了:RCE
描述:Exploiting command injection vulnerabilities in a web application to achieve Remote Code Execution (RCE).
URL:https://github.com/BokiCiphertext/Web-App-Penetration-Testing-Command-Injection.
标签:#RCE
更新了:RCE
描述:Exploiting command injection vulnerabilities in a web application to achieve Remote Code Execution (RCE).
URL:https://github.com/BokiCiphertext/Web-App-Penetration-Testing-Command-Injection.
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Exploit CVE-2025-55182 in Next.js with this versatile tool for security research, featuring advanced payloads and WAF bypass techniques.
URL:https://github.com/sobuj0007/Nextjs_RCE_Exploit_Tool
标签:#RCE
更新了:RCE
描述:🔍 Exploit CVE-2025-55182 in Next.js with this versatile tool for security research, featuring advanced payloads and WAF bypass techniques.
URL:https://github.com/sobuj0007/Nextjs_RCE_Exploit_Tool
标签:#RCE
GitHub
GitHub - sobuj0007/Nextjs_RCE_Exploit_Tool: 🔍 Exploit CVE-2025-55182 in Next.js with this versatile tool for security research…
🔍 Exploit CVE-2025-55182 in Next.js with this versatile tool for security research, featuring advanced payloads and WAF bypass techniques. - sobuj0007/Nextjs_RCE_Exploit_Tool
GitHub监控消息提醒!!!
更新了:RCE
描述:A Purple Team project simulating an RCE to Exfiltration attack chain on a LAMP stack. Includes Red Team exploitation (SSH Brute force, Web Shells) and Blue Team detection using Wazuh SIEM.
URL:https://github.com/MKubaszczykSecDev/Wazuh-SOC-Attack-Correlation
标签:#RCE
更新了:RCE
描述:A Purple Team project simulating an RCE to Exfiltration attack chain on a LAMP stack. Includes Red Team exploitation (SSH Brute force, Web Shells) and Blue Team detection using Wazuh SIEM.
URL:https://github.com/MKubaszczykSecDev/Wazuh-SOC-Attack-Correlation
标签:#RCE
GitHub
GitHub - MKubaszczykSecDev/Wazuh-SOC-Attack-Correlation: A Purple Team project simulating an RCE to Exfiltration attack chain on…
A Purple Team project simulating an RCE to Exfiltration attack chain on a LAMP stack. Includes Red Team exploitation (SSH Brute force, Web Shells) and Blue Team detection using Wazuh SIEM. - MKubas...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-68613: Authenticated Remote Code Execution in n8n via Expression Injection
URL:https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-68613: Authenticated Remote Code Execution in n8n via Expression Injection
URL:https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613
标签:#CVE-2025
GitHub
GitHub - mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613: Proof-of-Concept exploit for CVE-2025-68613: Authenticated…
Proof-of-Concept exploit for CVE-2025-68613: Authenticated Remote Code Execution in n8n via Expression Injection - mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Share original PoCs for CVE-2025-55182 in React2Shell, showcasing effective remote code execution examples for developers and security researchers.
URL:https://github.com/Huzii11/React2Shell-CVE-2025-55182-original-poc
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Share original PoCs for CVE-2025-55182 in React2Shell, showcasing effective remote code execution examples for developers and security researchers.
URL:https://github.com/Huzii11/React2Shell-CVE-2025-55182-original-poc
标签:#CVE-2025
GitHub
GitHub - Huzii11/React2Shell-CVE-2025-55182-original-poc: 🛠️ Share original PoCs for CVE-2025-55182 in React2Shell, showcasing…
🛠️ Share original PoCs for CVE-2025-55182 in React2Shell, showcasing effective remote code execution examples for developers and security researchers. - Huzii11/React2Shell-CVE-2025-55182-original-poc