GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory default enabled feature once you register any FortiGate/FortiManager/FortiAnalyzer contains a critical authentication bypass flaw.
URL:https://github.com/absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory default enabled feature once you register any FortiGate/FortiManager/FortiAnalyzer contains a critical authentication bypass flaw.
URL:https://github.com/absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass
标签:#CVE-2026
GitHub
GitHub - absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass: CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory…
CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory default enabled feature once you register any FortiGate/FortiManager/FortiAnalyzer contains a critical authentication bypass flaw. - absho...
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE).
URL:https://github.com/ii4gsp/CVE-2026-1457-TP-Link-VIGI-C385-Authenticated-Remote-Code-Execution
标签:#RCE
更新了:RCE
描述:CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE).
URL:https://github.com/ii4gsp/CVE-2026-1457-TP-Link-VIGI-C385-Authenticated-Remote-Code-Execution
标签:#RCE
GitHub
GitHub - ii4gsp/CVE-2026-1457-TP-Link-VIGI-C385-Authenticated-Remote-Code-Execution: CVE-2026-1457 is an authenticated buffer overflow…
CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE). - i...
GitHub监控消息提醒!!!
更新了:信息收集
描述:本仓库用于记录和分享本人 Hack The Box(HTB)靶场实战笔记, 围绕信息收集、漏洞利用、权限提升及攻击路径构建等环节, 系统化总结攻防思路与技术要点。
URL:https://github.com/joohnny157/HackTheBox-notes
标签:#信息收集
更新了:信息收集
描述:本仓库用于记录和分享本人 Hack The Box(HTB)靶场实战笔记, 围绕信息收集、漏洞利用、权限提升及攻击路径构建等环节, 系统化总结攻防思路与技术要点。
URL:https://github.com/joohnny157/HackTheBox-notes
标签:#信息收集
GitHub
joohnny157/HackTheBox-notes
本仓库用于记录和分享本人 Hack The Box(HTB)靶场实战笔记, 围绕信息收集、漏洞利用、权限提升及攻击路径构建等环节, 系统化总结攻防思路与技术要点。 - joohnny157/HackTheBox-notes
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory default enabled feature once you register any FortiGate/FortiManager/FortiAnalyzer contains a critical authentication bypass flaw.
URL:https://github.com/SimoesCTT/CTT-Kernel-Resonance-io_uring-Temporal-Phase-Transition
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory default enabled feature once you register any FortiGate/FortiManager/FortiAnalyzer contains a critical authentication bypass flaw.
URL:https://github.com/SimoesCTT/CTT-Kernel-Resonance-io_uring-Temporal-Phase-Transition
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/CTT-Kernel-Resonance-io_uring-Temporal-Phase-Transition: CVE-2026-24102 is a Use-After-Free (UAF) vulnerability…
CVE-2026-24102 is a Use-After-Free (UAF) vulnerability within the Linux Kernel io_uring subsystem. While traditional exploits attempt to win a race condition through brute-force CPU pinning, Simoes...
👍1
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE).
URL:https://github.com/ii4gsp/CVE-2026-1457
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE).
URL:https://github.com/ii4gsp/CVE-2026-1457
标签:#CVE-2026
GitHub
GitHub - ii4gsp/CVE-2026-1457: CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385…
CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE). - i...
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:该系统是一款面向安全开发流程的漏洞扫描器,用于自动识别软件中的安全漏洞。系统具备代码分析、漏洞匹配、风险评估等功能模块,采用深度学习技术,可高效识别和报告安全风险。支持多种编程语言和框架,辅助开发者提升软件安全性。
URL:https://github.com/3886370410/JtpUaUovFg
标签:#漏洞扫描
更新了:漏洞扫描
描述:该系统是一款面向安全开发流程的漏洞扫描器,用于自动识别软件中的安全漏洞。系统具备代码分析、漏洞匹配、风险评估等功能模块,采用深度学习技术,可高效识别和报告安全风险。支持多种编程语言和框架,辅助开发者提升软件安全性。
URL:https://github.com/3886370410/JtpUaUovFg
标签:#漏洞扫描
GitHub
GitHub - 3886370410/JtpUaUovFg: 该系统是一款面向安全开发流程的漏洞扫描器,用于自动识别软件中的安全漏洞。系统具备代码分析、漏洞匹配、风险评估等功能模块,采用深度学习技术,可高效识别和报告安全风险。支持多种编程语言和框架,辅助开发者提升软件安全性。
该系统是一款面向安全开发流程的漏洞扫描器,用于自动识别软件中的安全漏洞。系统具备代码分析、漏洞匹配、风险评估等功能模块,采用深度学习技术,可高效识别和报告安全风险。支持多种编程语言和框架,辅助开发者提升软件安全性。 - 3886370410/JtpUaUovFg
GitHub监控消息提醒!!!
更新了:CVE-2026
描述: AsyncIO Scanner & Exploitation Framework for CVE-2026-24061 (Telnet NEW_ENVIRON Auth Bypass). Features high-concurrency discovery, passive fingerprinting, and authorized root shell escalation
URL:https://github.com/ridpath/Terrminus-CVE-2026-2406
标签:#CVE-2026
更新了:CVE-2026
描述: AsyncIO Scanner & Exploitation Framework for CVE-2026-24061 (Telnet NEW_ENVIRON Auth Bypass). Features high-concurrency discovery, passive fingerprinting, and authorized root shell escalation
URL:https://github.com/ridpath/Terrminus-CVE-2026-2406
标签:#CVE-2026
GitHub
GitHub - ridpath/Terrminus-CVE-2026-2406
Contribute to ridpath/Terrminus-CVE-2026-2406 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CTT-Terrminus-Vortex (CVE-2026-2406)
URL:https://github.com/SimoesCTT/CTT-Sovereign-Vortex
标签:#CVE-2026
更新了:CVE-2026
描述:CTT-Terrminus-Vortex (CVE-2026-2406)
URL:https://github.com/SimoesCTT/CTT-Sovereign-Vortex
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/CTT-Sovereign-Vortex: CTT-Terrminus-Vortex (CVE-2026-2406)
CTT-Terrminus-Vortex (CVE-2026-2406). Contribute to SimoesCTT/CTT-Sovereign-Vortex development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare Turnstile 验证码
URL:https://github.com/XCQ0607/katabump
标签:#绕过
更新了:绕过
描述:用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare Turnstile 验证码
URL:https://github.com/XCQ0607/katabump
标签:#绕过
GitHub
GitHub - XCQ0607/katabump: 用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare…
用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare Turnstile 验证码 - XCQ0607/katabump
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CTT-Refraction-Vortex-CVE-2026-7731-
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CTT-Refraction-Vortex-CVE-2026-7731-
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/CTT-Refraction-Vortex-CVE-2026-7731-: Under CTT, we see it as a Temporal Synchronization Mismatch between the…
Under CTT, we see it as a Temporal Synchronization Mismatch between the Identity Provider and the Service Provider. By injecting a pulse at the \alpha=0.0302011 frequency, we don't bypass t...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and malspam Evidence
URL:https://github.com/ryan-har-plymouth/comp3010hk-set-exercise
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and malspam Evidence
URL:https://github.com/ryan-har-plymouth/comp3010hk-set-exercise
标签:#Cobalt Strike
GitHub
GitHub - ryan-har-plymouth/comp3010hk-set-exercise: Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and…
Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and malspam Evidence - ryan-har-plymouth/comp3010hk-set-exercise
GitHub监控消息提醒!!!
更新了:RCE
描述:Laravel < 8.4.2 RCE exploit
URL:https://github.com/crypt0lith/laravel-rce
标签:#RCE
更新了:RCE
描述:Laravel < 8.4.2 RCE exploit
URL:https://github.com/crypt0lith/laravel-rce
标签:#RCE
GitHub
GitHub - crypt0lith/laravel-rce: Laravel < 8.4.2 RCE exploit
Laravel < 8.4.2 RCE exploit. Contribute to crypt0lith/laravel-rce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:深度学习目标检测算法YOLOV8如何训练无人机搜救人员数据集 如何应用与灾害应急响应、AI智能搜救、无人机自主识别人员检测 无人机航拍行人检测数据集
URL:https://github.com/QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas
标签:#应急响应
更新了:应急响应
描述:深度学习目标检测算法YOLOV8如何训练无人机搜救人员数据集 如何应用与灾害应急响应、AI智能搜救、无人机自主识别人员检测 无人机航拍行人检测数据集
URL:https://github.com/QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas
标签:#应急响应
GitHub
GitHub - QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas: 深度学…
深度学习目标检测算法YOLOV8如何训练无人机搜救人员数据集 如何应用与灾害应急响应、AI智能搜救、无人机自主识别人员检测 无人机航拍行人检测数据集 - QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:POC in python for CVE-2026-2461
URL:https://github.com/destiny-creates/CVE-2026-2461-poc
标签:#CVE-2026
更新了:CVE-2026
描述:POC in python for CVE-2026-2461
URL:https://github.com/destiny-creates/CVE-2026-2461-poc
标签:#CVE-2026
GitHub
GitHub - destiny-creates/CVE-2026-2461-poc: POC in python for CVE-2026-2461
POC in python for CVE-2026-2461. Contribute to destiny-creates/CVE-2026-2461-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Scanner for CVE-2026-24061
URL:https://github.com/buzz075/CVE-2026-24061
标签:#CVE-2026
更新了:CVE-2026
描述:Scanner for CVE-2026-24061
URL:https://github.com/buzz075/CVE-2026-24061
标签:#CVE-2026
GitHub
GitHub - buzz075/CVE-2026-24061: Scanner for CVE-2026-24061
Scanner for CVE-2026-24061. Contribute to buzz075/CVE-2026-24061 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
URL:https://github.com/otakuliu/CVE-2026-24841_Range
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
URL:https://github.com/otakuliu/CVE-2026-24841_Range
标签:#CVE-2026
GitHub
GitHub - otakuliu/CVE-2026-24841_Range: CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的. Contribute to otakuliu/CVE-2026-24841_Range development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`).
URL:https://github.com/SimoesCTT/CTT-NFS-Vortex-RCE
标签:#CVE-2026
更新了:CVE-2026
描述:New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`).
URL:https://github.com/SimoesCTT/CTT-NFS-Vortex-RCE
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/CTT-NFS-Vortex-RCE: New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026…
New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`). - GitHub - ...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity: ### 📡 Theoretical Classification **ID:** SCTT-2026-33-0002…
### 📡 Theoretical Classification **ID:** SCTT-2026-33-0002 **Researcher:** Americo Simoes (SimoesCTT) **Physics:** Theorem 4.2 - Turbulent Phase Transition (TPT) **Constant:** α = 0.0302011 ...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity: Microsoft just patched CVE-2026-20805 and CVE-2026-20871 in…
Microsoft just patched CVE-2026-20805 and CVE-2026-20871 in January 2026 to stop "Information Disclosure" and "Use-After-Free" bugs in DWM. They think they&#...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/Jvr2022/CVE-2026-25126
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/Jvr2022/CVE-2026-25126
标签:#CVE-2026
GitHub
GitHub - Jvr2022/CVE-2026-25126: CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper…
CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release....
Forwarded from Channel Help
神秘悍匪爆庄·3 天爆提1086 万USDT
爆庄王者 首充1000,6天狂赚120万U
爆奖接力 玩家500一拉爆奖133万U
官方同步 · 实时开奖 · 公平透明
Please open Telegram to view this post
VIEW IN TELEGRAM