GitHub监控消息提醒!!!
更新了:代码审计
描述:oh-my-code-opencode 代码审计扩展
URL:https://github.com/likaiyang2003/oh-my-code-opencode
标签:#代码审计
更新了:代码审计
描述:oh-my-code-opencode 代码审计扩展
URL:https://github.com/likaiyang2003/oh-my-code-opencode
标签:#代码审计
GitHub
likaiyang2003/oh-my-code-opencode
oh-my-code-opencode 代码审计扩展. Contribute to likaiyang2003/oh-my-code-opencode development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Nuclei template for CVE-2026-24061
URL:https://github.com/Mr-Zapi/CVE-2026-24061
标签:#CVE-2026
更新了:CVE-2026
描述:Nuclei template for CVE-2026-24061
URL:https://github.com/Mr-Zapi/CVE-2026-24061
标签:#CVE-2026
GitHub
GitHub - Mr-Zapi/CVE-2026-24061: Nuclei template for CVE-2026-24061
Nuclei template for CVE-2026-24061. Contribute to Mr-Zapi/CVE-2026-24061 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Target Acquired. The Ultimate Web Scanner & Auto-Exploitation Tool. From Recon to RCE in a single strike.
URL:https://github.com/Meow-011/LOCKON-ORBITAL-STRIKE
标签:#RCE
更新了:RCE
描述:Target Acquired. The Ultimate Web Scanner & Auto-Exploitation Tool. From Recon to RCE in a single strike.
URL:https://github.com/Meow-011/LOCKON-ORBITAL-STRIKE
标签:#RCE
GitHub
GitHub - Meow-011/LOCKON-ORBITAL-STRIKE: Target Acquired. The Ultimate Web Scanner & Auto-Exploitation Tool. From Recon to RCE…
Target Acquired. The Ultimate Web Scanner & Auto-Exploitation Tool. From Recon to RCE in a single strike. - Meow-011/LOCKON-ORBITAL-STRIKE
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE_2023_27532 RCE only
URL:https://github.com/W1ngLess/CVE_2023_27532
标签:#RCE
更新了:RCE
描述:CVE_2023_27532 RCE only
URL:https://github.com/W1ngLess/CVE_2023_27532
标签:#RCE
GitHub
W1ngLess/CVE_2023_27532
CVE_2023_27532 RCE only. Contribute to W1ngLess/CVE_2023_27532 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:基于 oh-my-opencode 扩展代码审计agent
URL:https://github.com/likaiyang2003/oh-my-audit
标签:#代码审计
更新了:代码审计
描述:基于 oh-my-opencode 扩展代码审计agent
URL:https://github.com/likaiyang2003/oh-my-audit
标签:#代码审计
GitHub
GitHub - likaiyang2003/oh-my-audit: 基于 oh-my-opencode 扩展代码审计agent
基于 oh-my-opencode 扩展代码审计agent. Contribute to likaiyang2003/oh-my-audit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞挖掘
描述:一个基于LLM的多Agent全流程漏洞挖掘项目,支持PHP、Java、Python、Go、Node.js等多种语言项目环境搭建、漏洞分析、漏洞验证、报告产出。支持多Agent并发高效率完成漏洞挖掘任务。
URL:https://github.com/m4xxxxx/AIxVuln
标签:#漏洞挖掘
更新了:漏洞挖掘
描述:一个基于LLM的多Agent全流程漏洞挖掘项目,支持PHP、Java、Python、Go、Node.js等多种语言项目环境搭建、漏洞分析、漏洞验证、报告产出。支持多Agent并发高效率完成漏洞挖掘任务。
URL:https://github.com/m4xxxxx/AIxVuln
标签:#漏洞挖掘
GitHub
GitHub - m4xxxxx/AIxVuln: 一个基于LLM的多Agent全流程漏洞挖掘项目,支持PHP、Java、Python、Go、Node.js等多种语言项目环境搭建、漏洞分析、漏洞验证、报告产出。支持多Agent并发高效率完成漏洞挖掘任务。
一个基于LLM的多Agent全流程漏洞挖掘项目,支持PHP、Java、Python、Go、Node.js等多种语言项目环境搭建、漏洞分析、漏洞验证、报告产出。支持多Agent并发高效率完成漏洞挖掘任务。 - m4xxxxx/AIxVuln
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Sawarm/AV-skip-Builder
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Sawarm/AV-skip-Builder
标签:#bypass AntiVirus
GitHub
GitHub - Sawarm/AV-skip-Builder: Trojan-Malware-undetected builder-Generator, 360,Eset,Kaspersky Topics: crypter, crypter-fud,…
Trojan-Malware-undetected builder-Generator, 360,Eset,Kaspersky Topics: crypter, crypter-fud, crypter-rat, crypter-defender, crypter-bypass-wd, fud, fud-rat, fud-crypter, fud-stealer, obfuscation, ...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Docker setup for CVE-2026-24061
URL:https://github.com/DeadlyHollows/CVE-2026-24061-setup
标签:#CVE-2026
更新了:CVE-2026
描述:Docker setup for CVE-2026-24061
URL:https://github.com/DeadlyHollows/CVE-2026-24061-setup
标签:#CVE-2026
GitHub
GitHub - DeadlyHollows/CVE-2026-24061-setup: Docker setup for CVE-2026-24061
Docker setup for CVE-2026-24061. Contribute to DeadlyHollows/CVE-2026-24061-setup development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24061's poc : a critical authentication bypass in telnetd leading to RCE as root Affects systems with telnetd versions containing the vulnerability from 2015 onwards.
URL:https://github.com/cyberpoul/CVE-2026-24061-POC
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24061's poc : a critical authentication bypass in telnetd leading to RCE as root Affects systems with telnetd versions containing the vulnerability from 2015 onwards.
URL:https://github.com/cyberpoul/CVE-2026-24061-POC
标签:#CVE-2026
GitHub
GitHub - cyberpoul/CVE-2026-24061-POC: CVE-2026-24061's poc : a critical authentication bypass in telnetd leading to RCE as root…
CVE-2026-24061's poc : a critical authentication bypass in telnetd leading to RCE as root Affects systems with telnetd versions containing the vulnerability from 2015 onwards. - cyberpoul/C...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24061 - GNU InetUtils Telnetd Authentication Bypass
URL:https://github.com/madfxr/Twenty-Three-Scanner
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24061 - GNU InetUtils Telnetd Authentication Bypass
URL:https://github.com/madfxr/Twenty-Three-Scanner
标签:#CVE-2026
GitHub
GitHub - madfxr/Twenty-Three-Scanner: CVE-2026-24061 - GNU InetUtils Telnetd Authentication Bypass
CVE-2026-24061 - GNU InetUtils Telnetd Authentication Bypass - madfxr/Twenty-Three-Scanner
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24061 - GNU InetUtils telnetd authentication bypass POC + Docker lab environment for testing
URL:https://github.com/Alter-N0X/CVE-2026-24061-PoC
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24061 - GNU InetUtils telnetd authentication bypass POC + Docker lab environment for testing
URL:https://github.com/Alter-N0X/CVE-2026-24061-PoC
标签:#CVE-2026
GitHub
GitHub - Alter-N0X/CVE-2026-24061-PoC: CVE-2026-24061 - GNU InetUtils telnetd authentication bypass POC + Docker lab environment…
CVE-2026-24061 - GNU InetUtils telnetd authentication bypass POC + Docker lab environment for testing - GitHub - Alter-N0X/CVE-2026-24061-PoC: CVE-2026-24061 - GNU InetUtils telnetd authentication...
GitHub监控消息提醒!!!
更新了:代码注入
描述:本项目是一个综合性的 Java 安全漏洞研究资源库,涵盖了多个知名组件和框架的安全漏洞研究、POC 代码和利用技术。项目内容包括但不限于: RCE (远程代码执行): 反序列化、表达式注入、模板注入等 SSRF (服务端请求伪造): XXE、URL 重定向等 信息泄露: 配置泄露、路径遍历等 认证绕过: 权限控制缺陷、会话管理问题等
URL:https://github.com/XiaomingX/Java-Security-Research-Notes
标签:#代码注入
更新了:代码注入
描述:本项目是一个综合性的 Java 安全漏洞研究资源库,涵盖了多个知名组件和框架的安全漏洞研究、POC 代码和利用技术。项目内容包括但不限于: RCE (远程代码执行): 反序列化、表达式注入、模板注入等 SSRF (服务端请求伪造): XXE、URL 重定向等 信息泄露: 配置泄露、路径遍历等 认证绕过: 权限控制缺陷、会话管理问题等
URL:https://github.com/XiaomingX/Java-Security-Research-Notes
标签:#代码注入
GitHub
GitHub - XiaomingX/Java-Security-Research-Notes: 本项目是一个综合性的 Java 安全漏洞研究资源库,涵盖了多个知名组件和框架的安全漏洞研究、POC 代码和利用技术。项目内容包括但不限于: RCE (远程代码执行):…
本项目是一个综合性的 Java 安全漏洞研究资源库,涵盖了多个知名组件和框架的安全漏洞研究、POC 代码和利用技术。项目内容包括但不限于: RCE (远程代码执行): 反序列化、表达式注入、模板注入等 SSRF (服务端请求伪造): XXE、URL 重定向等 信息泄露: 配置泄露、路径遍历等 认证绕过: 权限控制缺陷、会话管理问题等 - XiaomingX/Java-Security-Re...
GitHub监控消息提醒!!!
更新了:RCE
描述:This repo contains RCE exploit for Imagery htb machine
URL:https://github.com/symphony2colour/htb-imagery-rce
标签:#RCE
更新了:RCE
描述:This repo contains RCE exploit for Imagery htb machine
URL:https://github.com/symphony2colour/htb-imagery-rce
标签:#RCE
GitHub
GitHub - symphony2colour/htb-imagery-rce: This repo contains RCE exploit for Imagery htb machine
This repo contains RCE exploit for Imagery htb machine - symphony2colour/htb-imagery-rce
GitHub监控消息提醒!!!
更新了:RCE
描述:This repo contains RCE exploit for Imagery htb machine
URL:https://github.com/symphony2colour/htb-imagery-rce-poc
标签:#RCE
更新了:RCE
描述:This repo contains RCE exploit for Imagery htb machine
URL:https://github.com/symphony2colour/htb-imagery-rce-poc
标签:#RCE
GitHub
GitHub - symphony2colour/htb-imagery-rce-poc: This repo contains RCE exploit for Imagery htb machine
This repo contains RCE exploit for Imagery htb machine - symphony2colour/htb-imagery-rce-poc
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24061 PoC
URL:https://github.com/infat0x/CVE-2026-24061
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24061 PoC
URL:https://github.com/infat0x/CVE-2026-24061
标签:#CVE-2026
GitHub
GitHub - infat0x/CVE-2026-24061
Contribute to infat0x/CVE-2026-24061 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Demonstration of escalating Local File Inclusion (LFI) to Remote Code Execution (RCE) using log poisoning.
URL:https://github.com/VVVI5HNU/LFI-RCE-log-poisoning
标签:#RCE
更新了:RCE
描述:Demonstration of escalating Local File Inclusion (LFI) to Remote Code Execution (RCE) using log poisoning.
URL:https://github.com/VVVI5HNU/LFI-RCE-log-poisoning
标签:#RCE
GitHub
GitHub - VVVI5HNU/LFI-RCE-log-poisoning: Demonstration of escalating Local File Inclusion (LFI) to Remote Code Execution (RCE)…
Demonstration of escalating Local File Inclusion (LFI) to Remote Code Execution (RCE) using log poisoning. - VVVI5HNU/LFI-RCE-log-poisoning
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/O99099O/By-Poloss..-..CVE-2026-0920
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/O99099O/By-Poloss..-..CVE-2026-0920
标签:#CVE-2026
GitHub
GitHub - O99099O/By-Poloss..-..CVE-2026-0920: CVE-2026-0920 — Unauthenticated privilege escalation vulnerability in the LA-Studio…
CVE-2026-0920 — Unauthenticated privilege escalation vulnerability in the LA-Studio Element Kit for Elementor WordPress plugin (≤ 1.5.6.3). The ajax_register_handle function fails to restrict user ...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-1522 — Unauthenticated arbitrary file upload vulnerability in a WordPress plugin allowing attackers to upload executable files and achieve remote code execution (RCE).
URL:https://github.com/O99099O/By-Poloss..-..CVE-2026-1522
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-1522 — Unauthenticated arbitrary file upload vulnerability in a WordPress plugin allowing attackers to upload executable files and achieve remote code execution (RCE).
URL:https://github.com/O99099O/By-Poloss..-..CVE-2026-1522
标签:#CVE-2026
GitHub
GitHub - O99099O/By-Poloss..-..CVE-2026-1522: CVE-2026-1522 — Unauthenticated arbitrary file upload vulnerability in a WordPress…
CVE-2026-1522 — Unauthenticated arbitrary file upload vulnerability in a WordPress plugin allowing attackers to upload executable files and achieve remote code execution (RCE). - O99099O/By-Poloss....
GitHub监控消息提醒!!!
更新了:信息收集
描述:本系统是一款基于Java和MySQL的校园疫情防控信息管理系统,主要用途是对学生和教职工的健康信息进行管理,为校园防疫提供数据支持。核心功能包括健康信息收集、数据管理和分析,助力校园疫情防控工作高效、精准地进行。通过此系统,可实现对健康信息的实时监控和管理,为校园安全提供有力保障。
URL:https://github.com/kevinyang11103/VPAKAOEUTs
标签:#信息收集
更新了:信息收集
描述:本系统是一款基于Java和MySQL的校园疫情防控信息管理系统,主要用途是对学生和教职工的健康信息进行管理,为校园防疫提供数据支持。核心功能包括健康信息收集、数据管理和分析,助力校园疫情防控工作高效、精准地进行。通过此系统,可实现对健康信息的实时监控和管理,为校园安全提供有力保障。
URL:https://github.com/kevinyang11103/VPAKAOEUTs
标签:#信息收集
GitHub
GitHub - kevinyang11103/VPAKAOEUTs: 本系统是一款基于Java和MySQL的校园疫情防控信息管理系统,主要用途是对学生和教职工的健康信息进行管理,为校园防疫提供数据支持。核心功能包括健康信息收集、数据管理和分析,助力校…
本系统是一款基于Java和MySQL的校园疫情防控信息管理系统,主要用途是对学生和教职工的健康信息进行管理,为校园防疫提供数据支持。核心功能包括健康信息收集、数据管理和分析,助力校园疫情防控工作高效、精准地进行。通过此系统,可实现对健康信息的实时监控和管理,为校园安全提供有力保障。 - kevinyang11103/VPAKAOEUTs
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC Dawn Client v2 RCE
URL:https://github.com/bodeneinheit/dawn-v2-rce
标签:#RCE
更新了:RCE
描述:PoC Dawn Client v2 RCE
URL:https://github.com/bodeneinheit/dawn-v2-rce
标签:#RCE
GitHub
GitHub - bodeneinheit/dawn-v2-rce: PoC Dawn Client v2 RCE
PoC Dawn Client v2 RCE. Contribute to bodeneinheit/dawn-v2-rce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:在 Web 应用程序中,文件上传功能如果未对上传文件的后缀名、MIME 类型及内容进行严格校验,攻击者可以上传恶意的脚本文件(如 PHP、ASP、JSP 等)。一旦这些脚本被服务器解析并执行,攻击者即可获得服务器的远程执行代码(RCE)权限,从而控制服务器。
URL:https://github.com/1766377729-lang/Fileupload_vul
标签:#RCE
更新了:RCE
描述:在 Web 应用程序中,文件上传功能如果未对上传文件的后缀名、MIME 类型及内容进行严格校验,攻击者可以上传恶意的脚本文件(如 PHP、ASP、JSP 等)。一旦这些脚本被服务器解析并执行,攻击者即可获得服务器的远程执行代码(RCE)权限,从而控制服务器。
URL:https://github.com/1766377729-lang/Fileupload_vul
标签:#RCE
GitHub
GitHub - 1766377729-lang/Fileupload_vul: 在 Web 应用程序中,文件上传功能如果未对上传文件的后缀名、MIME 类型及内容进行严格校验,攻击者可以上传恶意的脚本文件(如 PHP、ASP、JSP 等)。一旦这些脚…
在 Web 应用程序中,文件上传功能如果未对上传文件的后缀名、MIME 类型及内容进行严格校验,攻击者可以上传恶意的脚本文件(如 PHP、ASP、JSP 等)。一旦这些脚本被服务器解析并执行,攻击者即可获得服务器的远程执行代码(RCE)权限,从而控制服务器。 - 1766377729-lang/Fileupload_vul