GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/Jvr2022/CVE-2026-25126
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/Jvr2022/CVE-2026-25126
标签:#CVE-2026
GitHub
GitHub - Jvr2022/CVE-2026-25126: CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper…
CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release....
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity: While Fortinet's January 27, 2026 mitigation for **CVE…
While Fortinet's January 27, 2026 mitigation for **CVE-2026-24858** focuses on blocking specific accounts like `cloud-noc@mail.io`, it fails to address the **Temporal Vulnerability** of the...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass-
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass-
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass-: Microsoft just released emergency patches for CVE-2026-21509…
Microsoft just released emergency patches for CVE-2026-21509, a zero-day in the Office Suite that bypasses OLE/COM mitigations when a user simply opens a file. They think their "Service-si...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-22807的靶场
URL:https://github.com/otakuliu/CVE-2026-22807_Range
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-22807的靶场
URL:https://github.com/otakuliu/CVE-2026-22807_Range
标签:#CVE-2026
GitHub
otakuliu/CVE-2026-22807_Range
CVE-2026-22807的靶场. Contribute to otakuliu/CVE-2026-22807_Range development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/sastraadiwiguna-purpleeliteteaming/Dissecting-CVE-2026-0628-Chromium-Extension-Privilege-Escalation
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/sastraadiwiguna-purpleeliteteaming/Dissecting-CVE-2026-0628-Chromium-Extension-Privilege-Escalation
标签:#CVE-2026
GitHub
GitHub - sastraadiwiguna-purpleeliteteaming/Dissecting-CVE-2026-0628-Chromium-Extension-Privilege-Escalation: Origin CyberAnatomy…
Origin CyberAnatomy Spoofing via Malicious WebView - Dissecting CVE-2026-0628 Chromium Extension Privilege Escalation This research provides a comprehensive technical dissection of CVE-2026-0628, a...
GitHub监控消息提醒!!!
更新了:RCE
描述:Advanced WordPress vulnerability scanner targeting 30+ critical RCE vulnerabilities (2019-2025). Supports both single-target and mass scanning with multi-threading.
URL:https://github.com/xKRD/WP-RCE
标签:#RCE
更新了:RCE
描述:Advanced WordPress vulnerability scanner targeting 30+ critical RCE vulnerabilities (2019-2025). Supports both single-target and mass scanning with multi-threading.
URL:https://github.com/xKRD/WP-RCE
标签:#RCE
GitHub
GitHub - xKRD/WP-RCE: Advanced WordPress vulnerability scanner targeting 30+ critical RCE vulnerabilities (2019-2025). Supports…
Advanced WordPress vulnerability scanner targeting 30+ critical RCE vulnerabilities (2019-2025). Supports both single-target and mass scanning with multi-threading. - xKRD/WP-RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Validating DNS Exfiltration and Python Pickle RCE Attack Chains in AI Code Execution Sandboxes
URL:https://github.com/SnailSploit/chatgpt-rce-dns
标签:#RCE
更新了:RCE
描述:Validating DNS Exfiltration and Python Pickle RCE Attack Chains in AI Code Execution Sandboxes
URL:https://github.com/SnailSploit/chatgpt-rce-dns
标签:#RCE
GitHub
SnailSploit/chatgpt-rce-dns
Validating DNS Exfiltration and Python Pickle RCE Attack Chains in AI Code Execution Sandboxes - SnailSploit/chatgpt-rce-dns
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Elias966/edex-ui-fixed
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Elias966/edex-ui-fixed
标签:#RCE
GitHub
GitHub - Elias966/edex-ui-fixed: this is just an updated version of the latest version of edex-ui that fixes the vulnarabilty Cross…
this is just an updated version of the latest version of edex-ui that fixes the vulnarabilty Cross-site websocket hijacking enables remote command execution (RCE), i also implemented a test to see ...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Web 安全渗透测试工具,包含端点发现、跨域消息追踪、原型污染检测、词表生成和 DOM XSS 检测
URL:https://github.com/Zacarx/VulnRadar
标签:#渗透测试
更新了:渗透测试
描述:Web 安全渗透测试工具,包含端点发现、跨域消息追踪、原型污染检测、词表生成和 DOM XSS 检测
URL:https://github.com/Zacarx/VulnRadar
标签:#渗透测试
GitHub
Zacarx/VulnRadar
Web 安全渗透测试工具,包含端点发现、跨域消息追踪、原型污染检测、词表生成和 DOM XSS 检测 - Zacarx/VulnRadar
GitHub监控消息提醒!!!
更新了:RCE
描述:A high-performance C++ Web Application Firewall (WAF) protecting against SQLi, XSS, and RCE.
URL:https://github.com/Asttr0/SentiLight
标签:#RCE
更新了:RCE
描述:A high-performance C++ Web Application Firewall (WAF) protecting against SQLi, XSS, and RCE.
URL:https://github.com/Asttr0/SentiLight
标签:#RCE
GitHub
GitHub - Asttr0/SentiLight: A high-performance C++ Web Application Firewall (WAF) protecting against SQLi, XSS, and RCE.
A high-performance C++ Web Application Firewall (WAF) protecting against SQLi, XSS, and RCE. - Asttr0/SentiLight
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CVE-2026-21509-Microsoft-Office-OLE-Manifold-Bypass
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CVE-2026-21509-Microsoft-Office-OLE-Manifold-Bypass
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/CVE-2026-21509-Microsoft-Office-OLE-Manifold-Bypass: CVE-2026-21509 is a critical bypass in the Microsoft Office…
CVE-2026-21509 is a critical bypass in the Microsoft Office OLE (Object Linking and Embedding) validation engine. While standard "laminar" exploits attempt to manipulate static CO...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CTT-MICROSOFT-OFFICE-OLE-MANIFOLD-BYPASS-CVE-2026-21509
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CTT-MICROSOFT-OFFICE-OLE-MANIFOLD-BYPASS-CVE-2026-21509
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/CTT-MICROSOFT-OFFICE-OLE-MANIFOLD-BYPASS-CVE-2026-21509: CVE-2026-21509 is a critical bypass in the Microsoft…
CVE-2026-21509 is a critical bypass in the Microsoft Office OLE (Object Linking and Embedding) validation engine. While standard "laminar" exploits attempt to manipulate static CO...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:POC Script for CVE-2026-24061 (GNU Telnetd Exploit)
URL:https://github.com/X-croot/CVE-2026-24061_POC
标签:#CVE-2026
更新了:CVE-2026
描述:POC Script for CVE-2026-24061 (GNU Telnetd Exploit)
URL:https://github.com/X-croot/CVE-2026-24061_POC
标签:#CVE-2026
GitHub
X-croot/CVE-2026-24061_POC
POC Script for CVE-2026-24061 (GNU Telnetd Exploit) - X-croot/CVE-2026-24061_POC
GitHub监控消息提醒!!!
更新了:RCE
描述:OSCP-style penetration test walkthrough of the VulnHub DC-1 machine (Drupal 7 → RCE → root).
URL:https://github.com/Nevtech05/DC-1_VulnHub.com_WriteUp
标签:#RCE
更新了:RCE
描述:OSCP-style penetration test walkthrough of the VulnHub DC-1 machine (Drupal 7 → RCE → root).
URL:https://github.com/Nevtech05/DC-1_VulnHub.com_WriteUp
标签:#RCE
GitHub
GitHub - Nevtech05/DC-1_VulnHub.com_WriteUp: OSCP-style penetration test walkthrough of the VulnHub DC-1 machine (Drupal 7 → RCE…
OSCP-style penetration test walkthrough of the VulnHub DC-1 machine (Drupal 7 → RCE → root). - Nevtech05/DC-1_VulnHub.com_WriteUp
GitHub监控消息提醒!!!
更新了:RCE
描述:우리FISA 기술세미나 3팀: React Server Component의 RCE 취약점인 'React2Shell (CVE-2025-55182)' 분석 및 연구
URL:https://github.com/woorifisa-service-dev-6th/tech-seminar-React2Shell
标签:#RCE
更新了:RCE
描述:우리FISA 기술세미나 3팀: React Server Component의 RCE 취약점인 'React2Shell (CVE-2025-55182)' 분석 및 연구
URL:https://github.com/woorifisa-service-dev-6th/tech-seminar-React2Shell
标签:#RCE
GitHub
GitHub - woorifisa-service-dev-6th/tech-seminar-React2Shell: 우리FISA 기술세미나 3팀: React Server Component의 RCE 취약점인 'React2Shell (CVE…
우리FISA 기술세미나 3팀: React Server Component의 RCE 취약점인 'React2Shell (CVE-2025-55182)' 분석 및 연구 - woorifisa-service-dev-6th/tech-seminar-React2Shell
GitHub监控消息提醒!!!
更新了:信息收集
描述:一款红队在信息收集时规避IP封禁的傻瓜式一键代理池,通过大量代理节点轮询的代理池工具
URL:https://github.com/Yn8rt/Befree
标签:#信息收集
更新了:信息收集
描述:一款红队在信息收集时规避IP封禁的傻瓜式一键代理池,通过大量代理节点轮询的代理池工具
URL:https://github.com/Yn8rt/Befree
标签:#信息收集
GitHub
GitHub - Yn8rt/Befree: 一款红队在信息收集时规避IP封禁的傻瓜式一键代理池,通过大量代理节点轮询的代理池工具
一款红队在信息收集时规避IP封禁的傻瓜式一键代理池,通过大量代理节点轮询的代理池工具. Contribute to Yn8rt/Befree development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:护网
描述:一款用于检测网站安全的软件,底层逻辑为漏洞检测,可以检测XSS,CSRF等多项漏洞,底层还设有SM3的国密算法,可以保护用户数据,除此之外,包含有优化算法,强化学习,边缘算法以及优化推荐策略。
URL:https://github.com/17-debryne/-
标签:#护网
更新了:护网
描述:一款用于检测网站安全的软件,底层逻辑为漏洞检测,可以检测XSS,CSRF等多项漏洞,底层还设有SM3的国密算法,可以保护用户数据,除此之外,包含有优化算法,强化学习,边缘算法以及优化推荐策略。
URL:https://github.com/17-debryne/-
标签:#护网
GitHub
GitHub - 17-debryne/-: 一款用于检测网站安全的软件,底层逻辑为漏洞检测,可以检测XSS,CSRF等多项漏洞,底层还设有SM3的国密算法,可以保护用户数据,除此之外,包含有优化算法,强化学习,边缘算法以及优化推荐策略。
一款用于检测网站安全的软件,底层逻辑为漏洞检测,可以检测XSS,CSRF等多项漏洞,底层还设有SM3的国密算法,可以保护用户数据,除此之外,包含有优化算法,强化学习,边缘算法以及优化推荐策略。 - 17-debryne/-