GitHub监控消息提醒!!!
更新了:CVE-2026
描述: AsyncIO Scanner & Exploitation Framework for CVE-2026-24061 (Telnet NEW_ENVIRON Auth Bypass). Features high-concurrency discovery, passive fingerprinting, and authorized root shell escalation
URL:https://github.com/ridpath/Terrminus-CVE-2026-2406
标签:#CVE-2026
更新了:CVE-2026
描述: AsyncIO Scanner & Exploitation Framework for CVE-2026-24061 (Telnet NEW_ENVIRON Auth Bypass). Features high-concurrency discovery, passive fingerprinting, and authorized root shell escalation
URL:https://github.com/ridpath/Terrminus-CVE-2026-2406
标签:#CVE-2026
GitHub
GitHub - ridpath/Terrminus-CVE-2026-2406
Contribute to ridpath/Terrminus-CVE-2026-2406 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CTT-Terrminus-Vortex (CVE-2026-2406)
URL:https://github.com/SimoesCTT/CTT-Sovereign-Vortex
标签:#CVE-2026
更新了:CVE-2026
描述:CTT-Terrminus-Vortex (CVE-2026-2406)
URL:https://github.com/SimoesCTT/CTT-Sovereign-Vortex
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/CTT-Sovereign-Vortex: CTT-Terrminus-Vortex (CVE-2026-2406)
CTT-Terrminus-Vortex (CVE-2026-2406). Contribute to SimoesCTT/CTT-Sovereign-Vortex development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare Turnstile 验证码
URL:https://github.com/XCQ0607/katabump
标签:#绕过
更新了:绕过
描述:用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare Turnstile 验证码
URL:https://github.com/XCQ0607/katabump
标签:#绕过
GitHub
GitHub - XCQ0607/katabump: 用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare…
用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare Turnstile 验证码 - XCQ0607/katabump
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CTT-Refraction-Vortex-CVE-2026-7731-
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CTT-Refraction-Vortex-CVE-2026-7731-
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/CTT-Refraction-Vortex-CVE-2026-7731-: Under CTT, we see it as a Temporal Synchronization Mismatch between the…
Under CTT, we see it as a Temporal Synchronization Mismatch between the Identity Provider and the Service Provider. By injecting a pulse at the \alpha=0.0302011 frequency, we don't bypass t...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and malspam Evidence
URL:https://github.com/ryan-har-plymouth/comp3010hk-set-exercise
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and malspam Evidence
URL:https://github.com/ryan-har-plymouth/comp3010hk-set-exercise
标签:#Cobalt Strike
GitHub
GitHub - ryan-har-plymouth/comp3010hk-set-exercise: Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and…
Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and malspam Evidence - ryan-har-plymouth/comp3010hk-set-exercise
GitHub监控消息提醒!!!
更新了:RCE
描述:Laravel < 8.4.2 RCE exploit
URL:https://github.com/crypt0lith/laravel-rce
标签:#RCE
更新了:RCE
描述:Laravel < 8.4.2 RCE exploit
URL:https://github.com/crypt0lith/laravel-rce
标签:#RCE
GitHub
GitHub - crypt0lith/laravel-rce: Laravel < 8.4.2 RCE exploit
Laravel < 8.4.2 RCE exploit. Contribute to crypt0lith/laravel-rce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:深度学习目标检测算法YOLOV8如何训练无人机搜救人员数据集 如何应用与灾害应急响应、AI智能搜救、无人机自主识别人员检测 无人机航拍行人检测数据集
URL:https://github.com/QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas
标签:#应急响应
更新了:应急响应
描述:深度学习目标检测算法YOLOV8如何训练无人机搜救人员数据集 如何应用与灾害应急响应、AI智能搜救、无人机自主识别人员检测 无人机航拍行人检测数据集
URL:https://github.com/QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas
标签:#应急响应
GitHub
GitHub - QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas: 深度学…
深度学习目标检测算法YOLOV8如何训练无人机搜救人员数据集 如何应用与灾害应急响应、AI智能搜救、无人机自主识别人员检测 无人机航拍行人检测数据集 - QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:POC in python for CVE-2026-2461
URL:https://github.com/destiny-creates/CVE-2026-2461-poc
标签:#CVE-2026
更新了:CVE-2026
描述:POC in python for CVE-2026-2461
URL:https://github.com/destiny-creates/CVE-2026-2461-poc
标签:#CVE-2026
GitHub
GitHub - destiny-creates/CVE-2026-2461-poc: POC in python for CVE-2026-2461
POC in python for CVE-2026-2461. Contribute to destiny-creates/CVE-2026-2461-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Scanner for CVE-2026-24061
URL:https://github.com/buzz075/CVE-2026-24061
标签:#CVE-2026
更新了:CVE-2026
描述:Scanner for CVE-2026-24061
URL:https://github.com/buzz075/CVE-2026-24061
标签:#CVE-2026
GitHub
GitHub - buzz075/CVE-2026-24061: Scanner for CVE-2026-24061
Scanner for CVE-2026-24061. Contribute to buzz075/CVE-2026-24061 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
URL:https://github.com/otakuliu/CVE-2026-24841_Range
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
URL:https://github.com/otakuliu/CVE-2026-24841_Range
标签:#CVE-2026
GitHub
GitHub - otakuliu/CVE-2026-24841_Range: CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的. Contribute to otakuliu/CVE-2026-24841_Range development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`).
URL:https://github.com/SimoesCTT/CTT-NFS-Vortex-RCE
标签:#CVE-2026
更新了:CVE-2026
描述:New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`).
URL:https://github.com/SimoesCTT/CTT-NFS-Vortex-RCE
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/CTT-NFS-Vortex-RCE: New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026…
New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`). - GitHub - ...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity: ### 📡 Theoretical Classification **ID:** SCTT-2026-33-0002…
### 📡 Theoretical Classification **ID:** SCTT-2026-33-0002 **Researcher:** Americo Simoes (SimoesCTT) **Physics:** Theorem 4.2 - Turbulent Phase Transition (TPT) **Constant:** α = 0.0302011 ...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity: Microsoft just patched CVE-2026-20805 and CVE-2026-20871 in…
Microsoft just patched CVE-2026-20805 and CVE-2026-20871 in January 2026 to stop "Information Disclosure" and "Use-After-Free" bugs in DWM. They think they&#...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/Jvr2022/CVE-2026-25126
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/Jvr2022/CVE-2026-25126
标签:#CVE-2026
GitHub
GitHub - Jvr2022/CVE-2026-25126: CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper…
CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release....
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity: While Fortinet's January 27, 2026 mitigation for **CVE…
While Fortinet's January 27, 2026 mitigation for **CVE-2026-24858** focuses on blocking specific accounts like `cloud-noc@mail.io`, it fails to address the **Temporal Vulnerability** of the...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass-
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass-
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass-: Microsoft just released emergency patches for CVE-2026-21509…
Microsoft just released emergency patches for CVE-2026-21509, a zero-day in the Office Suite that bypasses OLE/COM mitigations when a user simply opens a file. They think their "Service-si...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-22807的靶场
URL:https://github.com/otakuliu/CVE-2026-22807_Range
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-22807的靶场
URL:https://github.com/otakuliu/CVE-2026-22807_Range
标签:#CVE-2026
GitHub
otakuliu/CVE-2026-22807_Range
CVE-2026-22807的靶场. Contribute to otakuliu/CVE-2026-22807_Range development by creating an account on GitHub.
Forwarded from Channel Help
Media is too big
VIEW IN TELEGRAM
球速体育 大会员再创新高:
#u存u提 每日提款无上限,#大额无忧、随便提
#全球不限ip #免实名、无需绑定手机号码和银行卡
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Channel Help
2028体育 😂 😂 😂 😂 😂 😂 ❗️每日发放😍 😍 😍 万神秘彩金❗️
✈️ TG全网最大信誉平台 玩家首选最权威综合台
支持 汇旺 USDT以及 C币 K豆 OKpay等20多种虚拟币钱包存取款👌 微信 👌 支付宝 银行卡存取款
⚡ ⚡ 免实名 暴富网址: 2028vip3.com
优惠🟢 返水🟢 彩金 红包 全网第一
大额出款 零审核🟢 秒到账 最强信誉
首存送 复存送 投注送 豪车嫩模等你来拿 !
电子黄金周 周一至周日福利天天拿不停!
大额单笔出款奖励最高⚡ 😍 😍 😍 😍 😍
电子大水 PG麻将胡了 2万一拉进关 爆1600万💥
以小博大 PP电子极速糖果1000爆出12103倍💥
气运之子 PP麻将大胜100元爆25000倍250万💥
2028 体育PG电子单注可拉2万一注
#PG电子单注最高爆奖可赢千万大奖
U存U提 每日提款不限额 欢迎各位大佬娱乐体验❗️
🌐 官方网址: 2028vip3.com
✈️ 官方客服: @ganfanxi2028
✈️ 活动频道:@pg2028ganfanxi
支持 汇旺 USDT以及 C币 K豆 OKpay等20多种虚拟币钱包存取款
优惠
大额出款 零审核
首存送 复存送 投注送 豪车嫩模等你来拿 !
电子黄金周 周一至周日福利天天拿不停!
大额单笔出款奖励最高
电子大水 PG麻将胡了 2万一拉进关 爆1600万
以小博大 PP电子极速糖果1000爆出12103倍
气运之子 PP麻将大胜100元爆25000倍250万
2028 体育PG电子单注可拉2万一注
#PG电子单注最高爆奖可赢千万大奖
U存U提 每日提款不限额 欢迎各位大佬娱乐体验❗️
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Channel Help
Media is too big
VIEW IN TELEGRAM
182体育 封神榜
12月14号神秘盘总pp电子极速糖果直接炸150万成功提款142万
12月26日实力大哥PA真人豪赢170万成功提款163万
1月7号神秘大哥PG麻将胡了直接爆120万成功提款117万
#公平、公正、公开、 #信誉第一、服务第一
#u存u提 每日提款无上限,#大额无忧、随便提
#全球不限ip #免实名、无需绑定手机号码和银行卡
Please open Telegram to view this post
VIEW IN TELEGRAM