GitHub监控消息提醒!!!
更新了:CVE-2026
描述:POC in python for CVE-2026-2461
URL:https://github.com/destiny-creates/CVE-2026-2461-poc
标签:#CVE-2026
更新了:CVE-2026
描述:POC in python for CVE-2026-2461
URL:https://github.com/destiny-creates/CVE-2026-2461-poc
标签:#CVE-2026
GitHub
GitHub - destiny-creates/CVE-2026-2461-poc: POC in python for CVE-2026-2461
POC in python for CVE-2026-2461. Contribute to destiny-creates/CVE-2026-2461-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Scanner for CVE-2026-24061
URL:https://github.com/buzz075/CVE-2026-24061
标签:#CVE-2026
更新了:CVE-2026
描述:Scanner for CVE-2026-24061
URL:https://github.com/buzz075/CVE-2026-24061
标签:#CVE-2026
GitHub
GitHub - buzz075/CVE-2026-24061: Scanner for CVE-2026-24061
Scanner for CVE-2026-24061. Contribute to buzz075/CVE-2026-24061 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
URL:https://github.com/otakuliu/CVE-2026-24841_Range
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
URL:https://github.com/otakuliu/CVE-2026-24841_Range
标签:#CVE-2026
GitHub
GitHub - otakuliu/CVE-2026-24841_Range: CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的. Contribute to otakuliu/CVE-2026-24841_Range development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`).
URL:https://github.com/SimoesCTT/CTT-NFS-Vortex-RCE
标签:#CVE-2026
更新了:CVE-2026
描述:New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`).
URL:https://github.com/SimoesCTT/CTT-NFS-Vortex-RCE
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/CTT-NFS-Vortex-RCE: New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026…
New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`). - GitHub - ...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity: ### 📡 Theoretical Classification **ID:** SCTT-2026-33-0002…
### 📡 Theoretical Classification **ID:** SCTT-2026-33-0002 **Researcher:** Americo Simoes (SimoesCTT) **Physics:** Theorem 4.2 - Turbulent Phase Transition (TPT) **Constant:** α = 0.0302011 ...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity: Microsoft just patched CVE-2026-20805 and CVE-2026-20871 in…
Microsoft just patched CVE-2026-20805 and CVE-2026-20871 in January 2026 to stop "Information Disclosure" and "Use-After-Free" bugs in DWM. They think they&#...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/Jvr2022/CVE-2026-25126
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/Jvr2022/CVE-2026-25126
标签:#CVE-2026
GitHub
GitHub - Jvr2022/CVE-2026-25126: CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper…
CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release....
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity: While Fortinet's January 27, 2026 mitigation for **CVE…
While Fortinet's January 27, 2026 mitigation for **CVE-2026-24858** focuses on blocking specific accounts like `cloud-noc@mail.io`, it fails to address the **Temporal Vulnerability** of the...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass-
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass-
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass-: Microsoft just released emergency patches for CVE-2026-21509…
Microsoft just released emergency patches for CVE-2026-21509, a zero-day in the Office Suite that bypasses OLE/COM mitigations when a user simply opens a file. They think their "Service-si...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-22807的靶场
URL:https://github.com/otakuliu/CVE-2026-22807_Range
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-22807的靶场
URL:https://github.com/otakuliu/CVE-2026-22807_Range
标签:#CVE-2026
GitHub
otakuliu/CVE-2026-22807_Range
CVE-2026-22807的靶场. Contribute to otakuliu/CVE-2026-22807_Range development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/sastraadiwiguna-purpleeliteteaming/Dissecting-CVE-2026-0628-Chromium-Extension-Privilege-Escalation
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/sastraadiwiguna-purpleeliteteaming/Dissecting-CVE-2026-0628-Chromium-Extension-Privilege-Escalation
标签:#CVE-2026
GitHub
GitHub - sastraadiwiguna-purpleeliteteaming/Dissecting-CVE-2026-0628-Chromium-Extension-Privilege-Escalation: Origin CyberAnatomy…
Origin CyberAnatomy Spoofing via Malicious WebView - Dissecting CVE-2026-0628 Chromium Extension Privilege Escalation This research provides a comprehensive technical dissection of CVE-2026-0628, a...
GitHub监控消息提醒!!!
更新了:RCE
描述:Advanced WordPress vulnerability scanner targeting 30+ critical RCE vulnerabilities (2019-2025). Supports both single-target and mass scanning with multi-threading.
URL:https://github.com/xKRD/WP-RCE
标签:#RCE
更新了:RCE
描述:Advanced WordPress vulnerability scanner targeting 30+ critical RCE vulnerabilities (2019-2025). Supports both single-target and mass scanning with multi-threading.
URL:https://github.com/xKRD/WP-RCE
标签:#RCE
GitHub
GitHub - xKRD/WP-RCE: Advanced WordPress vulnerability scanner targeting 30+ critical RCE vulnerabilities (2019-2025). Supports…
Advanced WordPress vulnerability scanner targeting 30+ critical RCE vulnerabilities (2019-2025). Supports both single-target and mass scanning with multi-threading. - xKRD/WP-RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Validating DNS Exfiltration and Python Pickle RCE Attack Chains in AI Code Execution Sandboxes
URL:https://github.com/SnailSploit/chatgpt-rce-dns
标签:#RCE
更新了:RCE
描述:Validating DNS Exfiltration and Python Pickle RCE Attack Chains in AI Code Execution Sandboxes
URL:https://github.com/SnailSploit/chatgpt-rce-dns
标签:#RCE
GitHub
SnailSploit/chatgpt-rce-dns
Validating DNS Exfiltration and Python Pickle RCE Attack Chains in AI Code Execution Sandboxes - SnailSploit/chatgpt-rce-dns
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Elias966/edex-ui-fixed
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Elias966/edex-ui-fixed
标签:#RCE
GitHub
GitHub - Elias966/edex-ui-fixed: this is just an updated version of the latest version of edex-ui that fixes the vulnarabilty Cross…
this is just an updated version of the latest version of edex-ui that fixes the vulnarabilty Cross-site websocket hijacking enables remote command execution (RCE), i also implemented a test to see ...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Web 安全渗透测试工具,包含端点发现、跨域消息追踪、原型污染检测、词表生成和 DOM XSS 检测
URL:https://github.com/Zacarx/VulnRadar
标签:#渗透测试
更新了:渗透测试
描述:Web 安全渗透测试工具,包含端点发现、跨域消息追踪、原型污染检测、词表生成和 DOM XSS 检测
URL:https://github.com/Zacarx/VulnRadar
标签:#渗透测试
GitHub
Zacarx/VulnRadar
Web 安全渗透测试工具,包含端点发现、跨域消息追踪、原型污染检测、词表生成和 DOM XSS 检测 - Zacarx/VulnRadar
Forwarded from 🌈盘丝洞防失联|导航|广告|管理✨
Forwarded from Y3-无双
1. #电子真人0审核包出款、#反水无上限
2. #巨额无忧,每日提款不限额度不限次数
3.
4、#不限ip、#免实名,无需绑手机号、信息安全有保障
8月13号 神秘玩家仅用300u爆奖140万u,成功提款1088888u
8月16号 反水1700u仅用80u爆奖54万u,成功提款60万u
10月10号 大哥在PG麻将胡了爆奖260万u,成功提款210万u
12月6号 神秘盘总PA真人豪赢400万u,成功提款370万u
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Channel Help
This media is not supported in your browser
VIEW IN TELEGRAM
【验资:@N9KF】支持5倍验资 担保域名:N9.TOP 点击查看
注:联系彩金客服:@N9CaiJin
【TG小程序|@N9N9】
一键登录,无需注册
🔥欢迎各位老板加入N9国际娱乐城!
🔥关注N9官方频道参与更多优惠活动
Please open Telegram to view this post
VIEW IN TELEGRAM