GitHub监控消息提醒!!!
更新了:webshell
描述:🛠 Manage and deploy webshell tools for Linux using Vue 3 and Python, featuring custom traffic formats for stealthy operation.
URL:https://github.com/Richietoreck/MatouWebshell
标签:#webshell
更新了:webshell
描述:🛠 Manage and deploy webshell tools for Linux using Vue 3 and Python, featuring custom traffic formats for stealthy operation.
URL:https://github.com/Richietoreck/MatouWebshell
标签:#webshell
GitHub
GitHub - Richietoreck/MatouWebshell: 🛠 Manage and deploy webshell tools for Linux using Vue 3 and Python, featuring custom traffic…
🛠 Manage and deploy webshell tools for Linux using Vue 3 and Python, featuring custom traffic formats for stealthy operation. - Richietoreck/MatouWebshell
GitHub监控消息提醒!!!
更新了:RCE
描述:Command Injection / Remote Code Execution (RCE) via Insecure Deserialization in _load_ccd_pickle_cached() of chemical_components.py in AlphaFold 3 (v3.0.1) - (github.com/google-deepmind/alphafold3)
URL:https://github.com/JoshuaProvoste/Command-Injection-RCE-AlphaFold-v3.0.1
标签:#RCE
更新了:RCE
描述:Command Injection / Remote Code Execution (RCE) via Insecure Deserialization in _load_ccd_pickle_cached() of chemical_components.py in AlphaFold 3 (v3.0.1) - (github.com/google-deepmind/alphafold3)
URL:https://github.com/JoshuaProvoste/Command-Injection-RCE-AlphaFold-v3.0.1
标签:#RCE
GitHub
GitHub - google-deepmind/alphafold3: AlphaFold 3 inference pipeline.
AlphaFold 3 inference pipeline. Contribute to google-deepmind/alphafold3 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:GNU InetUtils telnetd 远程身份认证绕过漏洞(CVE-2026-24061),此漏洞主要影响 telnetd 在调用系统 /usr/bin/login 程序时,未对从客户端 USER 环境变量传入的用户名做过滤,直接拼接到 login 命令行。未经授权的远程攻击者可利用该缺陷,在无需任何口令的情况下直接获取目标主机的 root shell。
URL:https://github.com/yanxinwu946/CVE-2026-24061--telnetd
标签:#CVE-2026
更新了:CVE-2026
描述:GNU InetUtils telnetd 远程身份认证绕过漏洞(CVE-2026-24061),此漏洞主要影响 telnetd 在调用系统 /usr/bin/login 程序时,未对从客户端 USER 环境变量传入的用户名做过滤,直接拼接到 login 命令行。未经授权的远程攻击者可利用该缺陷,在无需任何口令的情况下直接获取目标主机的 root shell。
URL:https://github.com/yanxinwu946/CVE-2026-24061--telnetd
标签:#CVE-2026
GitHub
GitHub - yanxinwu946/CVE-2026-24061--telnetd: GNU InetUtils telnetd 远程身份认证绕过漏洞(CVE-2026-24061),此漏洞主要影响 telnetd 在调用系统 /usr/bin/login…
GNU InetUtils telnetd 远程身份认证绕过漏洞(CVE-2026-24061),此漏洞主要影响 telnetd 在调用系统 /usr/bin/login 程序时,未对从客户端 USER 环境变量传入的用户名做过滤,直接拼接到 login 命令行。未经授权的远程攻击者可利用该缺陷,在无需任何口令的情况下直接获取目标主机的 root shell。 - yanxinwu946/C...
GitHub监控消息提醒!!!
更新了:RCE
描述:Repositorio para la aplicación de ingesta del RCE
URL:https://github.com/emailesc/ASIGH_IW
标签:#RCE
更新了:RCE
描述:Repositorio para la aplicación de ingesta del RCE
URL:https://github.com/emailesc/ASIGH_IW
标签:#RCE
GitHub
emailesc/ASIGH_IW
Repositorio para la aplicación de ingesta del RCE - emailesc/ASIGH_IW
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/LeirBaGMC/RUCKUS-Security-Research
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/LeirBaGMC/RUCKUS-Security-Research
标签:#RCE
GitHub
GitHub - LeirBaGMC/RUCKUS-Security-Research: Academic research on critical RUCKUS wireless vulnerabilities (RCE & Auth Bypass)…
Academic research on critical RUCKUS wireless vulnerabilities (RCE & Auth Bypass) in university networks. Features a strategic mitigation roadmap and a data-driven CISO Dashboard for risk m...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:PoC for CVE-2026-22444: Apache Solr 8.6-9.10.0 Windows standalone mode RCE/NTLM hash disclosure
URL:https://github.com/dptsec/CVE-2026-22444
标签:#CVE-2026
更新了:CVE-2026
描述:PoC for CVE-2026-22444: Apache Solr 8.6-9.10.0 Windows standalone mode RCE/NTLM hash disclosure
URL:https://github.com/dptsec/CVE-2026-22444
标签:#CVE-2026
GitHub
GitHub - dptsec/CVE-2026-22444: PoC for CVE-2026-22444: Apache Solr 8.6-9.10.0 Windows standalone mode RCE/NTLM hash disclosure
PoC for CVE-2026-22444: Apache Solr 8.6-9.10.0 Windows standalone mode RCE/NTLM hash disclosure - dptsec/CVE-2026-22444
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-51793
标签:#RCE
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-51793
标签:#RCE
GitHub
JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-51793
Unauthenticated 0-click RCE exploit for CVE-2024-51793. Exploits an arbitrary file upload vulnerability via admin-ajax.php to upload a PHP payload and achieve remote command execution on vulnerable...
GitHub监控消息提醒!!!
更新了:RCE
描述:Mirage uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50526
标签:#RCE
更新了:RCE
描述:Mirage uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50526
标签:#RCE
GitHub
JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50526
Unauthenticated 0-click RCE exploit for CVE-2024-50526. Exploits an arbitrary file upload vulnerability in a vulnerable WordPress form plugin to upload a PHP payload, verify its location, detect th...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Exploitation of CVE-2026-24061
URL:https://github.com/SafeBreach-Labs/CVE-2026-24061
标签:#CVE-2026
更新了:CVE-2026
描述:Exploitation of CVE-2026-24061
URL:https://github.com/SafeBreach-Labs/CVE-2026-24061
标签:#CVE-2026
GitHub
GitHub - SafeBreach-Labs/CVE-2026-24061: Exploitation of CVE-2026-24061
Exploitation of CVE-2026-24061. Contribute to SafeBreach-Labs/CVE-2026-24061 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-10924
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-10924
标签:#RCE
GitHub
JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-10924
Unauthenticated authentication bypass to RCE exploit for CVE-2024-10924. Abuses an authentication and 2FA bypass in the Really Simple Security WordPress plugin to impersonate an admin user, upload ...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-0594 List Site Contributors Plugin Exploit
URL:https://github.com/m4sh-wacker/CVE-2026-0594-ListSiteContributors-Plugin-Exploit
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-0594 List Site Contributors Plugin Exploit
URL:https://github.com/m4sh-wacker/CVE-2026-0594-ListSiteContributors-Plugin-Exploit
标签:#CVE-2026
GitHub
GitHub - m4sh-wacker/CVE-2026-0594-ListSiteContributors-Plugin-Exploit: CVE-2026-0594 List Site Contributors Plugin Exploit
CVE-2026-0594 List Site Contributors Plugin Exploit - m4sh-wacker/CVE-2026-0594-ListSiteContributors-Plugin-Exploit
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24061 - Exploit
URL:https://github.com/h3athen/CVE-2026-24061
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24061 - Exploit
URL:https://github.com/h3athen/CVE-2026-24061
标签:#CVE-2026
GitHub
GitHub - h3athen/CVE-2026-24061: CVE-2026-24061 - Exploit
CVE-2026-24061 - Exploit. Contribute to h3athen/CVE-2026-24061 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50498
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50498
标签:#RCE
GitHub
JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50498
Unauthenticated 0-click RCE exploit for CVE-2024-50498. Exploits a code injection vulnerability in the LUBUS WP Query Console plugin to execute arbitrary PHP code, write a web shell to the uploads ...
GitHub监控消息提醒!!!
更新了:RCE
描述:php-in-jpg is a simple yet flexible tool that generates .jpg image files embedding PHP payloads, designed to support PHP RCE polyglot techniques.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-9932
标签:#RCE
更新了:RCE
描述:php-in-jpg is a simple yet flexible tool that generates .jpg image files embedding PHP payloads, designed to support PHP RCE polyglot techniques.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-9932
标签:#RCE
GitHub
JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-9932
Unauthenticated 0-click RCE exploit for CVE-2024-9932. Exploits an arbitrary file upload vulnerability in the Wux Blog Editor WordPress plugin to upload a remote PHP payload, detect the target oper...
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI Security Platform: Defense (217 engines) + Offense (39K+ payloads) | RLM-Toolkit: LangChain alternative with infinite context | OWASP LLM Top 10 | Red Team toolkit for AI
URL:https://github.com/DmitrL-dev/AISecurity
标签:#Red Team
更新了:Red Team
描述:AI Security Platform: Defense (217 engines) + Offense (39K+ payloads) | RLM-Toolkit: LangChain alternative with infinite context | OWASP LLM Top 10 | Red Team toolkit for AI
URL:https://github.com/DmitrL-dev/AISecurity
标签:#Red Team
GitHub
GitHub - DmitrL-dev/AISecurity: AI Security Platform: Defense (217 engines) + Offense (39K+ payloads) | RLM-Toolkit: LangChain…
AI Security Platform: Defense (217 engines) + Offense (39K+ payloads) | RLM-Toolkit: LangChain alternative with infinite context | OWASP LLM Top 10 | Red Team toolkit for AI - DmitrL-dev/AISecurity
GitHub监控消息提醒!!!
更新了:钓鱼
描述:跨平台钓鱼防护工具,检测并隔离CamPhish等恶意工具
URL:https://github.com/Admintt73/PhishingGuard
标签:#钓鱼
更新了:钓鱼
描述:跨平台钓鱼防护工具,检测并隔离CamPhish等恶意工具
URL:https://github.com/Admintt73/PhishingGuard
标签:#钓鱼
GitHub
GitHub - Admintt73/PhishingGuard: 跨平台钓鱼防护工具,检测并隔离CamPhish等恶意工具
跨平台钓鱼防护工具,检测并隔离CamPhish等恶意工具. Contribute to Admintt73/PhishingGuard development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:CVE-2026-24061 漏洞检测工具
URL:https://github.com/monstertsl/CVE-2026-24061
标签:#漏洞检测
更新了:漏洞检测
描述:CVE-2026-24061 漏洞检测工具
URL:https://github.com/monstertsl/CVE-2026-24061
标签:#漏洞检测
GitHub
GitHub - monstertsl/CVE-2026-24061: CVE-2026-24061 漏洞检测工具
CVE-2026-24061 漏洞检测工具. Contribute to monstertsl/CVE-2026-24061 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞验证
描述:渗透测试与 CTF 攻防相关的 Python 脚本集合,包含 Web 漏洞 POC、编码绕过工具、数据处理脚本等,用于实战场景中的漏洞验证与辅助测试。
URL:https://github.com/bfdfhdsfdd-crypto/CVE-2026-22444
标签:#漏洞验证
更新了:漏洞验证
描述:渗透测试与 CTF 攻防相关的 Python 脚本集合,包含 Web 漏洞 POC、编码绕过工具、数据处理脚本等,用于实战场景中的漏洞验证与辅助测试。
URL:https://github.com/bfdfhdsfdd-crypto/CVE-2026-22444
标签:#漏洞验证
GitHub
GitHub - bfdfhdsfdd-crypto/CVE-2026-22444: CVE-2026-22444 是一个影响 Apache Solr 的安全漏洞,于 2026 年 1 月 20 日左右公开披露。该漏洞源于 Apache Solr 的 "create…
CVE-2026-22444 是一个影响 Apache Solr 的安全漏洞,于 2026 年 1 月 20 日左右公开披露。该漏洞源于 Apache Solr 的 "create core" API 在某些 API 参数上的输入验证不足(CWE-20: Improper Input Validation),允许攻击者在 Solr 运行于 &quo...