GitHub监控消息提醒!!!
更新了:hvv
描述:swa20250330177hvvdikc5bqdiuc0zpqq20
URL:https://github.com/static-web-apps-testing-org/swa20250330177hvvdikc5bqdiuc0zpqq20
标签:#hvv
更新了:hvv
描述:swa20250330177hvvdikc5bqdiuc0zpqq20
URL:https://github.com/static-web-apps-testing-org/swa20250330177hvvdikc5bqdiuc0zpqq20
标签:#hvv
GitHub监控消息提醒!!!
更新了:RCE
描述:This script chains and automates Arbitrary File Write to RCE on Gibbon LMS through CVE-2023-45878 exploitation.
URL:https://github.com/0xyy66/CVE-2023-45878_to_RCE
标签:#RCE
更新了:RCE
描述:This script chains and automates Arbitrary File Write to RCE on Gibbon LMS through CVE-2023-45878 exploitation.
URL:https://github.com/0xyy66/CVE-2023-45878_to_RCE
标签:#RCE
GitHub
GitHub - 0xyy66/CVE-2023-45878_to_RCE: This script chains and automates Arbitrary File Write to RCE on Gibbon LMS through CVE-2023…
This script chains and automates Arbitrary File Write to RCE on Gibbon LMS through CVE-2023-45878 exploitation. - 0xyy66/CVE-2023-45878_to_RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-1974 PoC 코드
URL:https://github.com/zulloper/CVE-2025-1974
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-1974 PoC 코드
URL:https://github.com/zulloper/CVE-2025-1974
标签:#CVE-2025
GitHub
GitHub - zulloper/CVE-2025-1974: CVE-2025-1974 PoC 코드
CVE-2025-1974 PoC 코드. Contribute to zulloper/CVE-2025-1974 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)(python3)
URL:https://github.com/so1icitx/CVE-2024-25600
标签:#RCE
更新了:RCE
描述:A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)(python3)
URL:https://github.com/so1icitx/CVE-2024-25600
标签:#RCE
GitHub
GitHub - so1icitx/CVE-2024-25600: Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes…
Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely. - so1icitx/CVE-2024-25600
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025033112vc8voxjug7u5sa8hvv5jbe
URL:https://github.com/static-web-apps-testing-org/swa2025033112vc8voxjug7u5sa8hvv5jbe
标签:#hvv
更新了:hvv
描述:swa2025033112vc8voxjug7u5sa8hvv5jbe
URL:https://github.com/static-web-apps-testing-org/swa2025033112vc8voxjug7u5sa8hvv5jbe
标签:#hvv
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:针对CVE-2025-30208的简单漏洞利用
URL:https://github.com/jackieya/CVE-2025-30208
标签:#CVE-2025
更新了:CVE-2025
描述:针对CVE-2025-30208的简单漏洞利用
URL:https://github.com/jackieya/CVE-2025-30208
标签:#CVE-2025
GitHub
GitHub - jackieya/ViteVulScan: 针对CVE-2025-30208和CVE-2025-31125的漏洞利用
针对CVE-2025-30208和CVE-2025-31125的漏洞利用. Contribute to jackieya/ViteVulScan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025033115mt46iz5hvvwc7ok1ll3x3u
URL:https://github.com/static-web-apps-testing-org/swa2025033115mt46iz5hvvwc7ok1ll3x3u
标签:#hvv
更新了:hvv
描述:swa2025033115mt46iz5hvvwc7ok1ll3x3u
URL:https://github.com/static-web-apps-testing-org/swa2025033115mt46iz5hvvwc7ok1ll3x3u
标签:#hvv
👍1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:The first publicly available exploit demonstration for CVE-2025-0868, to the best of my knowledge.
URL:https://github.com/shreyas-malhotra/PoC_CVE-2025-0868
标签:#CVE-2025
更新了:CVE-2025
描述:The first publicly available exploit demonstration for CVE-2025-0868, to the best of my knowledge.
URL:https://github.com/shreyas-malhotra/PoC_CVE-2025-0868
标签:#CVE-2025
GitHub
GitHub - shreyas-malhotra/PoC_CVE-2025-0868: The first publicly available exploit demonstration for CVE-2025-0868, to the best…
The first publicly available exploit demonstration for CVE-2025-0868, to the best of my knowledge. - shreyas-malhotra/PoC_CVE-2025-0868
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: CVE-2025-29927 Bypass Authorization Next.js
URL:https://github.com/a9v8i/CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述: CVE-2025-29927 Bypass Authorization Next.js
URL:https://github.com/a9v8i/CVE-2025-29927
标签:#CVE-2025
👍1
GitHub监控消息提醒!!!
更新了:代码审计
描述:一款代码审计辅助插件
URL:https://github.com/SpringKill-team/CodeAuditAssistant
标签:#代码审计
更新了:代码审计
描述:一款代码审计辅助插件
URL:https://github.com/SpringKill-team/CodeAuditAssistant
标签:#代码审计
GitHub
GitHub - SpringKill-team/CodeAuditAssistant: 🔍 CodeAuditAssistant - IDEA代码审计插件(公测中) ⚡ 精准追踪复杂调用链 | 🚀 毫秒级方法搜索 | 🔥 内置高危漏洞检测 原生集成 |…
🔍 CodeAuditAssistant - IDEA代码审计插件(公测中) ⚡ 精准追踪复杂调用链 | 🚀 毫秒级方法搜索 | 🔥 内置高危漏洞检测 原生集成 | 反编译/路径分析 | 内存优化 | 安全审计利器 🔍 CodeAuditAssistant - JetBrains Code Audit Plugin (Beta) ⚡ Deep C...
GitHub监控消息提醒!!!
更新了:RCE
描述:Authenticated RCE exploit for LimeSurvey 6.6.4 using a malicious plugin upload. Python script for ethical security testing.
URL:https://github.com/TheRedP4nther/limesurvey-6.6.4-authenticated-rce
标签:#RCE
更新了:RCE
描述:Authenticated RCE exploit for LimeSurvey 6.6.4 using a malicious plugin upload. Python script for ethical security testing.
URL:https://github.com/TheRedP4nther/limesurvey-6.6.4-authenticated-rce
标签:#RCE
GitHub
GitHub - TheRedP4nther/limesurvey-6.6.4-authenticated-rce: Authenticated RCE exploit for LimeSurvey 6.6.4 using a malicious plugin…
Authenticated RCE exploit for LimeSurvey 6.6.4 using a malicious plugin upload. Python script for ethical security testing. - TheRedP4nther/limesurvey-6.6.4-authenticated-rce
GitHub监控消息提醒!!!
更新了:信息收集
描述:基于Go语言的项目基础框架。包含:日志信息收集、Mysql自动建表、Casbin访问控制、菜单配置文件、在线API文档、i18n国际化、用户权限(基于RBAC3.0)
URL:https://github.com/LizardYx/basic-frame
标签:#信息收集
更新了:信息收集
描述:基于Go语言的项目基础框架。包含:日志信息收集、Mysql自动建表、Casbin访问控制、菜单配置文件、在线API文档、i18n国际化、用户权限(基于RBAC3.0)
URL:https://github.com/LizardYx/basic-frame
标签:#信息收集
GitHub
GitHub - LizardYx/basic-frame: 基于Go语言的项目基础框架。包含:日志信息收集、Mysql自动建表、Casbin访问控制、菜单配置文件、在线API文档、i18n国际化、用户权限(基于RBAC3.0)
基于Go语言的项目基础框架。包含:日志信息收集、Mysql自动建表、Casbin访问控制、菜单配置文件、在线API文档、i18n国际化、用户权限(基于RBAC3.0) - LizardYx/basic-frame
GitHub监控消息提醒!!!
更新了:绕过
描述:7-Zip Mark-of-the-Web绕过漏洞PoC(CVE-2025-0411)
URL:https://github.com/dongdongcan/transformer_learning
标签:#绕过
更新了:绕过
描述:7-Zip Mark-of-the-Web绕过漏洞PoC(CVE-2025-0411)
URL:https://github.com/dongdongcan/transformer_learning
标签:#绕过
GitHub
GitHub - dongdongcan/transformer_learning: Transformer 架构是目前主流 AI 大模型的核心。 本仓库是《Transformer通关秘籍》专栏的配套代码仓库。专栏围绕着 Transformer 这一架构,来拆解自然语言处理和…
Transformer 架构是目前主流 AI 大模型的核心。 本仓库是《Transformer通关秘籍》专栏的配套代码仓库。专栏围绕着 Transformer 这一架构,来拆解自然语言处理和 AI 大模型有关的背景、底层技术和算法原理。 在拆解的过程中,会有很多相关背景知识的介绍。阅读专栏,不仅可以对以 Transformer 架构为核心的大模型有一定的了解,还可以对大模型的底层细节和技...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Vite 任意文件读取漏洞POC
URL:https://github.com/sunhuiHi666/CVE-2025-31125
标签:#CVE-2025
更新了:CVE-2025
描述:Vite 任意文件读取漏洞POC
URL:https://github.com/sunhuiHi666/CVE-2025-31125
标签:#CVE-2025
GitHub
GitHub - sunhuiHi666/CVE-2025-31125: Vite 任意文件读取漏洞POC
Vite 任意文件读取漏洞POC. Contribute to sunhuiHi666/CVE-2025-31125 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:hvv
描述:swa20250401147lz9qhfmtp0umd7hvvx72v
URL:https://github.com/static-web-apps-testing-org/swa20250401147lz9qhfmtp0umd7hvvx72v
标签:#hvv
更新了:hvv
描述:swa20250401147lz9qhfmtp0umd7hvvx72v
URL:https://github.com/static-web-apps-testing-org/swa20250401147lz9qhfmtp0umd7hvvx72v
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa20250401147lz9qhfmtp0umd7hvvx72v: swa20250401147lz9qhfmtp0umd7hvvx72v
swa20250401147lz9qhfmtp0umd7hvvx72v. Contribute to static-web-apps-testing-org/swa20250401147lz9qhfmtp0umd7hvvx72v development by creating an account on GitHub.