GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detect exposed MongoDB instances and CVE-2025-14847 \"MongoBleed\" risks — Zero-Trust Python scanner
URL:https://github.com/14mb1v45h/CYBERDUDEBIVASH-MONGODB-DETECTOR-v2026
标签:#CVE-2025
更新了:CVE-2025
描述:Detect exposed MongoDB instances and CVE-2025-14847 \"MongoBleed\" risks — Zero-Trust Python scanner
URL:https://github.com/14mb1v45h/CYBERDUDEBIVASH-MONGODB-DETECTOR-v2026
标签:#CVE-2025
GitHub
14mb1v45h/CYBERDUDEBIVASH-MONGODB-DETECTOR-v2026
Detect exposed MongoDB instances and CVE-2025-14847 "MongoBleed" risks — Zero-Trust Python scanner - 14mb1v45h/CYBERDUDEBIVASH-MONGODB-DETECTOR-v2026
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-14611 CentreStack and Triofox full Poc/Exploit
URL:https://github.com/pl4tyz/CVE-2025-14611-CentreStack-and-Triofox-full-Poc-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-14611 CentreStack and Triofox full Poc/Exploit
URL:https://github.com/pl4tyz/CVE-2025-14611-CentreStack-and-Triofox-full-Poc-Exploit
标签:#CVE-2025
GitHub
GitHub - pl4tyz/CVE-2025-14611-CentreStack-and-Triofox-full-Poc-Exploit: CVE-2025-14611 CentreStack and Triofox full Poc/Exploit
CVE-2025-14611 CentreStack and Triofox full Poc/Exploit - pl4tyz/CVE-2025-14611-CentreStack-and-Triofox-full-Poc-Exploit
GitHub监控消息提醒!!!
更新了:RCE
描述:🛠️ Explore a toolkit to study Remote Code Execution (RCE) vulnerabilities in Next.js applications, focusing on insecure patterns and misconfigurations.
URL:https://github.com/hrefcoder/Nextjs-RCE-exploit-kit
标签:#RCE
更新了:RCE
描述:🛠️ Explore a toolkit to study Remote Code Execution (RCE) vulnerabilities in Next.js applications, focusing on insecure patterns and misconfigurations.
URL:https://github.com/hrefcoder/Nextjs-RCE-exploit-kit
标签:#RCE
GitHub
GitHub - hrefcoder/Nextjs-RCE-exploit-kit: 🛠️ Explore a toolkit to study Remote Code Execution (RCE) vulnerabilities in Next.js…
🛠️ Explore a toolkit to study Remote Code Execution (RCE) vulnerabilities in Next.js applications, focusing on insecure patterns and misconfigurations. - hrefcoder/Nextjs-RCE-exploit-kit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Exploit CVE-2025-55182 with this GUI tool for vulnerability detection, command execution, and shell access on Windows and macOS systems.
URL:https://github.com/vick333-peniel/vick333-peniel.github.io
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Exploit CVE-2025-55182 with this GUI tool for vulnerability detection, command execution, and shell access on Windows and macOS systems.
URL:https://github.com/vick333-peniel/vick333-peniel.github.io
标签:#CVE-2025
GitHub
GitHub - vick333-peniel/vick333-peniel.github.io: 🛠️ Exploit CVE-2025-55182 with this GUI tool for vulnerability detection, command…
🛠️ Exploit CVE-2025-55182 with this GUI tool for vulnerability detection, command execution, and shell access on Windows and macOS systems. - vick333-peniel/vick333-peniel.github.io
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A proof-of-concept exploit for CVE-2025-14847, a critical memory leak vulnerability in MongoDB's OP_COMPRESSED message handler.
URL:https://github.com/ob1sec/mongobleeder
标签:#CVE-2025
更新了:CVE-2025
描述:A proof-of-concept exploit for CVE-2025-14847, a critical memory leak vulnerability in MongoDB's OP_COMPRESSED message handler.
URL:https://github.com/ob1sec/mongobleeder
标签:#CVE-2025
GitHub
GitHub - ob1sec/mongobleeder: A proof-of-concept exploit for CVE-2025-14847, a critical memory leak vulnerability in MongoDB's…
A proof-of-concept exploit for CVE-2025-14847, a critical memory leak vulnerability in MongoDB's OP_COMPRESSED message handler. - ob1sec/mongobleeder
GitHub监控消息提醒!!!
更新了:RCE
描述:🛠️ Exploit critical RCE vulnerabilities in React Server and Next.js with ease using this collection of tests and resources for security professionals.
URL:https://github.com/RITO666/react2shell
标签:#RCE
更新了:RCE
描述:🛠️ Exploit critical RCE vulnerabilities in React Server and Next.js with ease using this collection of tests and resources for security professionals.
URL:https://github.com/RITO666/react2shell
标签:#RCE
GitHub
GitHub - RITO666/react2shell: 🛠️ Exploit critical RCE vulnerabilities in React Server and Next.js with ease using this collection…
🛠️ Exploit critical RCE vulnerabilities in React Server and Next.js with ease using this collection of tests and resources for security professionals. - RITO666/react2shell
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Exploit CVE-2025-55182 effortlessly with this GUI tool for vulnerability detection, command execution, and Shell reverse connections.
URL:https://github.com/vick333-peniel/ReactExploitGUI
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Exploit CVE-2025-55182 effortlessly with this GUI tool for vulnerability detection, command execution, and Shell reverse connections.
URL:https://github.com/vick333-peniel/ReactExploitGUI
标签:#CVE-2025
GitHub
GitHub - vick333-peniel/ReactExploitGUI: 🛠️ Exploit CVE-2025-55182 effortlessly with this GUI tool for vulnerability detection…
🛠️ Exploit CVE-2025-55182 effortlessly with this GUI tool for vulnerability detection, command execution, and Shell reverse connections. - vick333-peniel/ReactExploitGUI
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-14847 (MongoBleed)
URL:https://github.com/joshuavanderpoll/CVE-2025-14847
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-14847 (MongoBleed)
URL:https://github.com/joshuavanderpoll/CVE-2025-14847
标签:#CVE-2025
GitHub
joshuavanderpoll/CVE-2025-14847
CVE-2025-14847 (MongoBleed). Contribute to joshuavanderpoll/CVE-2025-14847 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Context-Aware Memory Leak Scanner & Exploit for CVE-2025-14847.
URL:https://github.com/tunahantekeoglu/MongoDeepDive
标签:#CVE-2025
更新了:CVE-2025
描述:Context-Aware Memory Leak Scanner & Exploit for CVE-2025-14847.
URL:https://github.com/tunahantekeoglu/MongoDeepDive
标签:#CVE-2025
GitHub
GitHub - tunahantekeoglu/MongoDeepDive: Context-Aware Memory Leak Scanner & Exploit for CVE-2025-14847.
Context-Aware Memory Leak Scanner & Exploit for CVE-2025-14847. - tunahantekeoglu/MongoDeepDive
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/kevinyang11101/AIHRmaLNsX
标签:#应急响应
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/kevinyang11101/AIHRmaLNsX
标签:#应急响应
GitHub
GitHub - kevinyang11101/AIHRmaLNsX: 本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况…
本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。 - kevinyang11101/AIHRmaLNsX
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Remake of CVE-2025-14847 MongoDB vulnerability demonstration
URL:https://github.com/vfa-tuannt/CVE-2025-14847
标签:#CVE-2025
更新了:CVE-2025
描述:Remake of CVE-2025-14847 MongoDB vulnerability demonstration
URL:https://github.com/vfa-tuannt/CVE-2025-14847
标签:#CVE-2025
GitHub
vfa-tuannt/CVE-2025-14847
Remake of CVE-2025-14847 MongoDB vulnerability demonstration - vfa-tuannt/CVE-2025-14847
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-27515
URL:https://github.com/joaovicdev/POC-CVE-2025-27515
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-27515
URL:https://github.com/joaovicdev/POC-CVE-2025-27515
标签:#CVE-2025
GitHub
joaovicdev/POC-CVE-2025-27515
PoC of CVE-2025-27515. Contribute to joaovicdev/POC-CVE-2025-27515 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:🛡️ AI Security Platform: Defense (200 engines) + Offense (39K+ payloads) | OWASP LLM Top 10 | Red Team toolkit for AI | Protect & Pentest your LLMs
URL:https://github.com/Iborrareddy/Recon-Enhanced
标签:#Red Team
更新了:Red Team
描述:🛡️ AI Security Platform: Defense (200 engines) + Offense (39K+ payloads) | OWASP LLM Top 10 | Red Team toolkit for AI | Protect & Pentest your LLMs
URL:https://github.com/Iborrareddy/Recon-Enhanced
标签:#Red Team
GitHub
GitHub - Iborrareddy/Recon-Enhanced: A Professional‑grade reconnaissance automation script that basically runs like a mini‑recon…
A Professional‑grade reconnaissance automation script that basically runs like a mini‑recon engine for a target domain. Built for security researchers, Blue/Red team beginners (like you know, the...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-52691
URL:https://github.com/rxerium/CVE-2025-52691
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-52691
URL:https://github.com/rxerium/CVE-2025-52691
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-52691: Detection for CVE-2025-52691
Detection for CVE-2025-52691. Contribute to rxerium/CVE-2025-52691 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:AiYue_Pro 是一款专为 Burp Suite 设计的高级被动扫描插件,旨在自动化检测 越权漏洞 (IDOR / Broken Access Control)。 它结合了多账号并发重放、智能染色和 AI 大模型深度分析技术,能够精准识别低权限或未授权账号是否能访问高敏感接口,极大降低了人工测试的成本和误报率。
URL:https://github.com/JohnLone00/AiYue
标签:#漏洞检测
更新了:漏洞检测
描述:AiYue_Pro 是一款专为 Burp Suite 设计的高级被动扫描插件,旨在自动化检测 越权漏洞 (IDOR / Broken Access Control)。 它结合了多账号并发重放、智能染色和 AI 大模型深度分析技术,能够精准识别低权限或未授权账号是否能访问高敏感接口,极大降低了人工测试的成本和误报率。
URL:https://github.com/JohnLone00/AiYue
标签:#漏洞检测
GitHub
GitHub - JohnLone00/AiYue: AiYue_Pro 是一款专为 Burp Suite 设计的高级被动扫描插件,旨在自动化检测 越权漏洞 (IDOR / Broken Access Control)。 它结合了多账号并发重放、智能染色和…
AiYue_Pro 是一款专为 Burp Suite 设计的高级被动扫描插件,旨在自动化检测 越权漏洞 (IDOR / Broken Access Control)。 它结合了多账号并发重放、智能染色和 AI 大模型深度分析技术,能够精准识别低权限或未授权账号是否能访问高敏感接口,极大降低了人工测试的成本和误报率。 - JohnLone00/AiYue
GitHub监控消息提醒!!!
更新了:红蓝对抗
描述:Rshell是一款开源的golang编写的支持多平台的C2框架,旨在帮助安服人员渗透测试、红蓝对抗。
URL:https://github.com/muddlelife/windfire
标签:#红蓝对抗
更新了:红蓝对抗
描述:Rshell是一款开源的golang编写的支持多平台的C2框架,旨在帮助安服人员渗透测试、红蓝对抗。
URL:https://github.com/muddlelife/windfire
标签:#红蓝对抗
GitHub
GitHub - muddlelife/windfire: Blazing fast, asynchronous URL prober & fingerprinting scanner built in Rust. Optimized for large…
Blazing fast, asynchronous URL prober & fingerprinting scanner built in Rust. Optimized for large-scale OSINT, reconnaissance, and bug bounty hunting. | 基于 Rust 的极速异步 URL 测活与指纹识别工具。专为大规模资产收...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/git0xLai/React2ShellPoC
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/git0xLai/React2ShellPoC
标签:#CVE-2025
GitHub
GitHub - git0xLai/React2ShellPoC: This repository provides a proof-of-concept for CVE-2025-55182 (React2Shell), a remote code execution…
This repository provides a proof-of-concept for CVE-2025-55182 (React2Shell), a remote code execution vulnerability in React Server Components. It demonstrates how the exploit works, including the ...