GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025033115mt46iz5hvvwc7ok1ll3x3u
URL:https://github.com/static-web-apps-testing-org/swa2025033115mt46iz5hvvwc7ok1ll3x3u
标签:#hvv
更新了:hvv
描述:swa2025033115mt46iz5hvvwc7ok1ll3x3u
URL:https://github.com/static-web-apps-testing-org/swa2025033115mt46iz5hvvwc7ok1ll3x3u
标签:#hvv
👍1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:The first publicly available exploit demonstration for CVE-2025-0868, to the best of my knowledge.
URL:https://github.com/shreyas-malhotra/PoC_CVE-2025-0868
标签:#CVE-2025
更新了:CVE-2025
描述:The first publicly available exploit demonstration for CVE-2025-0868, to the best of my knowledge.
URL:https://github.com/shreyas-malhotra/PoC_CVE-2025-0868
标签:#CVE-2025
GitHub
GitHub - shreyas-malhotra/PoC_CVE-2025-0868: The first publicly available exploit demonstration for CVE-2025-0868, to the best…
The first publicly available exploit demonstration for CVE-2025-0868, to the best of my knowledge. - shreyas-malhotra/PoC_CVE-2025-0868
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: CVE-2025-29927 Bypass Authorization Next.js
URL:https://github.com/a9v8i/CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述: CVE-2025-29927 Bypass Authorization Next.js
URL:https://github.com/a9v8i/CVE-2025-29927
标签:#CVE-2025
👍1
GitHub监控消息提醒!!!
更新了:代码审计
描述:一款代码审计辅助插件
URL:https://github.com/SpringKill-team/CodeAuditAssistant
标签:#代码审计
更新了:代码审计
描述:一款代码审计辅助插件
URL:https://github.com/SpringKill-team/CodeAuditAssistant
标签:#代码审计
GitHub
GitHub - SpringKill-team/CodeAuditAssistant: 🔍 CodeAuditAssistant - IDEA代码审计插件(公测中) ⚡ 精准追踪复杂调用链 | 🚀 毫秒级方法搜索 | 🔥 内置高危漏洞检测 原生集成 |…
🔍 CodeAuditAssistant - IDEA代码审计插件(公测中) ⚡ 精准追踪复杂调用链 | 🚀 毫秒级方法搜索 | 🔥 内置高危漏洞检测 原生集成 | 反编译/路径分析 | 内存优化 | 安全审计利器 🔍 CodeAuditAssistant - JetBrains Code Audit Plugin (Beta) ⚡ Deep C...
GitHub监控消息提醒!!!
更新了:RCE
描述:Authenticated RCE exploit for LimeSurvey 6.6.4 using a malicious plugin upload. Python script for ethical security testing.
URL:https://github.com/TheRedP4nther/limesurvey-6.6.4-authenticated-rce
标签:#RCE
更新了:RCE
描述:Authenticated RCE exploit for LimeSurvey 6.6.4 using a malicious plugin upload. Python script for ethical security testing.
URL:https://github.com/TheRedP4nther/limesurvey-6.6.4-authenticated-rce
标签:#RCE
GitHub
GitHub - TheRedP4nther/limesurvey-6.6.4-authenticated-rce: Authenticated RCE exploit for LimeSurvey 6.6.4 using a malicious plugin…
Authenticated RCE exploit for LimeSurvey 6.6.4 using a malicious plugin upload. Python script for ethical security testing. - TheRedP4nther/limesurvey-6.6.4-authenticated-rce
GitHub监控消息提醒!!!
更新了:信息收集
描述:基于Go语言的项目基础框架。包含:日志信息收集、Mysql自动建表、Casbin访问控制、菜单配置文件、在线API文档、i18n国际化、用户权限(基于RBAC3.0)
URL:https://github.com/LizardYx/basic-frame
标签:#信息收集
更新了:信息收集
描述:基于Go语言的项目基础框架。包含:日志信息收集、Mysql自动建表、Casbin访问控制、菜单配置文件、在线API文档、i18n国际化、用户权限(基于RBAC3.0)
URL:https://github.com/LizardYx/basic-frame
标签:#信息收集
GitHub
GitHub - LizardYx/basic-frame: 基于Go语言的项目基础框架。包含:日志信息收集、Mysql自动建表、Casbin访问控制、菜单配置文件、在线API文档、i18n国际化、用户权限(基于RBAC3.0)
基于Go语言的项目基础框架。包含:日志信息收集、Mysql自动建表、Casbin访问控制、菜单配置文件、在线API文档、i18n国际化、用户权限(基于RBAC3.0) - LizardYx/basic-frame
GitHub监控消息提醒!!!
更新了:绕过
描述:7-Zip Mark-of-the-Web绕过漏洞PoC(CVE-2025-0411)
URL:https://github.com/dongdongcan/transformer_learning
标签:#绕过
更新了:绕过
描述:7-Zip Mark-of-the-Web绕过漏洞PoC(CVE-2025-0411)
URL:https://github.com/dongdongcan/transformer_learning
标签:#绕过
GitHub
GitHub - dongdongcan/transformer_learning: Transformer 架构是目前主流 AI 大模型的核心。 本仓库是《Transformer通关秘籍》专栏的配套代码仓库。专栏围绕着 Transformer 这一架构,来拆解自然语言处理和…
Transformer 架构是目前主流 AI 大模型的核心。 本仓库是《Transformer通关秘籍》专栏的配套代码仓库。专栏围绕着 Transformer 这一架构,来拆解自然语言处理和 AI 大模型有关的背景、底层技术和算法原理。 在拆解的过程中,会有很多相关背景知识的介绍。阅读专栏,不仅可以对以 Transformer 架构为核心的大模型有一定的了解,还可以对大模型的底层细节和技...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Vite 任意文件读取漏洞POC
URL:https://github.com/sunhuiHi666/CVE-2025-31125
标签:#CVE-2025
更新了:CVE-2025
描述:Vite 任意文件读取漏洞POC
URL:https://github.com/sunhuiHi666/CVE-2025-31125
标签:#CVE-2025
GitHub
GitHub - sunhuiHi666/CVE-2025-31125: Vite 任意文件读取漏洞POC
Vite 任意文件读取漏洞POC. Contribute to sunhuiHi666/CVE-2025-31125 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:hvv
描述:swa20250401147lz9qhfmtp0umd7hvvx72v
URL:https://github.com/static-web-apps-testing-org/swa20250401147lz9qhfmtp0umd7hvvx72v
标签:#hvv
更新了:hvv
描述:swa20250401147lz9qhfmtp0umd7hvvx72v
URL:https://github.com/static-web-apps-testing-org/swa20250401147lz9qhfmtp0umd7hvvx72v
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa20250401147lz9qhfmtp0umd7hvvx72v: swa20250401147lz9qhfmtp0umd7hvvx72v
swa20250401147lz9qhfmtp0umd7hvvx72v. Contribute to static-web-apps-testing-org/swa20250401147lz9qhfmtp0umd7hvvx72v development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Next.js CVE-2025-29927 güvenlik açığı hakkında
URL:https://github.com/BilalGns/CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:Next.js CVE-2025-29927 güvenlik açığı hakkında
URL:https://github.com/BilalGns/CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - BilalGns/CVE-2025-29927: Next.js CVE-2025-29927 güvenlik açığı hakkında
Next.js CVE-2025-29927 güvenlik açığı hakkında. Contribute to BilalGns/CVE-2025-29927 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Leveraging arbitrary file read to RCE on Oracle PeopleSoft
URL:https://github.com/tuo4n8/CVE-2023-22047
标签:#RCE
更新了:RCE
描述:Leveraging arbitrary file read to RCE on Oracle PeopleSoft
URL:https://github.com/tuo4n8/CVE-2023-22047
标签:#RCE
GitHub
GitHub - tuo4n8/CVE-2023-22047: Leveraging arbitrary file read to RCE on Oracle PeopleSoft
Leveraging arbitrary file read to RCE on Oracle PeopleSoft - tuo4n8/CVE-2023-22047
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A basic proof of concept of the CVE-2025-29927 vulnerability that allows to bypass the middleware scripts.
URL:https://github.com/Naveen-005/Next.Js-middleware-bypass-vulnerability-CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:A basic proof of concept of the CVE-2025-29927 vulnerability that allows to bypass the middleware scripts.
URL:https://github.com/Naveen-005/Next.Js-middleware-bypass-vulnerability-CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - Naveen-005/Next.Js-middleware-bypass-vulnerability-CVE-2025-29927: A basic proof of concept of the CVE-2025-29927 vulnerability…
A basic proof of concept of the CVE-2025-29927 vulnerability that allows to bypass the middleware scripts. - Naveen-005/Next.Js-middleware-bypass-vulnerability-CVE-2025-29927
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:mass scan for CVE-2025-30208
URL:https://github.com/sumeet-darekar/CVE-2025-30208
标签:#CVE-2025
更新了:CVE-2025
描述:mass scan for CVE-2025-30208
URL:https://github.com/sumeet-darekar/CVE-2025-30208
标签:#CVE-2025
GitHub
GitHub - sumeet-darekar/CVE-2025-30208: mass scan for CVE-2025-30208
mass scan for CVE-2025-30208. Contribute to sumeet-darekar/CVE-2025-30208 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains a shell script based POC on Apache Tomcat CVE-2025-24813. It allow you to easily test the vulnerability on any version of Apache Tomcat
URL:https://github.com/manjula-aw/CVE-2025-24813
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains a shell script based POC on Apache Tomcat CVE-2025-24813. It allow you to easily test the vulnerability on any version of Apache Tomcat
URL:https://github.com/manjula-aw/CVE-2025-24813
标签:#CVE-2025
GitHub
GitHub - manjula-aw/CVE-2025-24813
Contribute to manjula-aw/CVE-2025-24813 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:针对CVE-2025-30208的简单漏洞利用
URL:https://github.com/jackieya/CVE-2025-30208-and-CVE-2025-31125
标签:#CVE-2025
更新了:CVE-2025
描述:针对CVE-2025-30208的简单漏洞利用
URL:https://github.com/jackieya/CVE-2025-30208-and-CVE-2025-31125
标签:#CVE-2025
GitHub
GitHub - jackieya/ViteVulScan: 针对CVE-2025-30208和CVE-2025-31125的漏洞利用
针对CVE-2025-30208和CVE-2025-31125的漏洞利用. Contribute to jackieya/ViteVulScan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:关于 CVE-2025-2825的一些后利用研究
URL:https://github.com/h0ld1rs/CVE-2025-2825
标签:#CVE-2025
更新了:CVE-2025
描述:关于 CVE-2025-2825的一些后利用研究
URL:https://github.com/h0ld1rs/CVE-2025-2825
标签:#CVE-2025
GitHub
GitHub - h0ld1rs/CVE-2025-2825: 关于 CVE-2025-2825的一些后利用研究
关于 CVE-2025-2825的一些后利用研究. Contribute to h0ld1rs/CVE-2025-2825 development by creating an account on GitHub.