GitHub监控消息提醒!!!
更新了:护网
描述:这款基于微信小程序的智慧消防系统,搭建起全方位消防守护网。管理人员在小程序上能实时监测消防设备运行状态,像烟感、喷淋等设备是否正常,数据一目了然。发现异常时,系统立即推送预警信息,精准定位隐患位置,助力快速处置。支持远程控制部分消防设备,提高应急响应速度。此外,系统还能记录消防巡检情况,生成报表。借助微信便捷性,突破时间空间限制,全方位提升消防管理效率,守护生命财产安全 。
URL:https://github.com/xunmaw001/Smart-Fire-Protection-System
标签:#护网
更新了:护网
描述:这款基于微信小程序的智慧消防系统,搭建起全方位消防守护网。管理人员在小程序上能实时监测消防设备运行状态,像烟感、喷淋等设备是否正常,数据一目了然。发现异常时,系统立即推送预警信息,精准定位隐患位置,助力快速处置。支持远程控制部分消防设备,提高应急响应速度。此外,系统还能记录消防巡检情况,生成报表。借助微信便捷性,突破时间空间限制,全方位提升消防管理效率,守护生命财产安全 。
URL:https://github.com/xunmaw001/Smart-Fire-Protection-System
标签:#护网
GitHub
GitHub - xunmaw001/Smart-Fire-Protection-System: 这款基于微信小程序的智慧消防系统,搭建起全方位消防守护网。管理人员在小程序上能实时监测消防设备运行状态,像烟感、喷淋等设备是否正常,数据一目了然。发现异常…
这款基于微信小程序的智慧消防系统,搭建起全方位消防守护网。管理人员在小程序上能实时监测消防设备运行状态,像烟感、喷淋等设备是否正常,数据一目了然。发现异常时,系统立即推送预警信息,精准定位隐患位置,助力快速处置。支持远程控制部分消防设备,提高应急响应速度。此外,系统还能记录消防巡检情况,生成报表。借助微信便捷性,突破时间空间限制,全方位提升消防管理效率,守护生命财产安全 。 - xunmaw...
GitHub监控消息提醒!!!
更新了:代码审计
描述:Java 代码审计学习仓库
URL:https://github.com/R7w726fYrfritM7zPJCO/cihna-dictatorshrip-8
标签:#代码审计
更新了:代码审计
描述:Java 代码审计学习仓库
URL:https://github.com/R7w726fYrfritM7zPJCO/cihna-dictatorshrip-8
标签:#代码审计
GitHub
GitHub - R7w726fYrfritM7zPJCO/cihna-dictatorshrip-8: 反中共政治宣传库。Anti Chinese government propaganda. https://github.com/cirosantilli/china…
反中共政治宣传库。Anti Chinese government propaganda. https://github.com/cirosantilli/china-dictatorship 的备份backup. 住在中国真名用户的网友请别给星星,不然你要被警察请喝茶。常见问答集,新闻集和饭店和音乐建议。卐习万岁卐。冠状病毒审查郝海东新疆改造中心六四事件法轮功 996.ICU709大抓捕巴拿...
GitHub监控消息提醒!!!
更新了:RCE
描述:SSRF CVE-2023-27163 + maltrail vuln RCE
URL:https://github.com/G4sp4rCS/htb-sau-automated
标签:#RCE
更新了:RCE
描述:SSRF CVE-2023-27163 + maltrail vuln RCE
URL:https://github.com/G4sp4rCS/htb-sau-automated
标签:#RCE
GitHub
GitHub - G4sp4rCS/htb-sau-automated: SSRF CVE-2023-27163 + maltrail vuln RCE
SSRF CVE-2023-27163 + maltrail vuln RCE. Contribute to G4sp4rCS/htb-sau-automated development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A PHP CVE-2025-1219 SCANNER. In bash no root.
URL:https://github.com/ediop3SquadALT/ediop3PHP
标签:#CVE-2025
更新了:CVE-2025
描述:A PHP CVE-2025-1219 SCANNER. In bash no root.
URL:https://github.com/ediop3SquadALT/ediop3PHP
标签:#CVE-2025
GitHub
GitHub - ediop3SquadALT/ediop3PHP: A PHP CVE-2025-1219 SCANNER. In bash no root.
A PHP CVE-2025-1219 SCANNER. In bash no root. Contribute to ediop3SquadALT/ediop3PHP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-30921
URL:https://github.com/DoTTak/CVE-2025-30921
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-30921
URL:https://github.com/DoTTak/CVE-2025-30921
标签:#CVE-2025
GitHub
GitHub - DoTTak/CVE-2025-30921: PoC of CVE-2025-30921
PoC of CVE-2025-30921. Contribute to DoTTak/CVE-2025-30921 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-31864
URL:https://github.com/DoTTak/CVE-2025-31864
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-31864
URL:https://github.com/DoTTak/CVE-2025-31864
标签:#CVE-2025
GitHub
GitHub - DoTTak/CVE-2025-31864: PoC of CVE-2025-31864
PoC of CVE-2025-31864. Contribute to DoTTak/CVE-2025-31864 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30208 - Vite Arbitrary File Read PoC
URL:https://github.com/4m3rr0r/CVE-2025-30208-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30208 - Vite Arbitrary File Read PoC
URL:https://github.com/4m3rr0r/CVE-2025-30208-PoC
标签:#CVE-2025
GitHub
GitHub - 4m3rr0r/CVE-2025-30208-PoC: CVE-2025-30208 - Vite Arbitrary File Read PoC
CVE-2025-30208 - Vite Arbitrary File Read PoC. Contribute to 4m3rr0r/CVE-2025-30208-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.
URL:https://github.com/cboss43/CVE-2024-25600
标签:#RCE
更新了:RCE
描述:Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.
URL:https://github.com/cboss43/CVE-2024-25600
标签:#RCE
GitHub
GitHub - cboss43/CVE-2024-25600: Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes…
Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely. - cboss43/CVE-2024-25600
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Next.js Middleware Authorization Bypass Tool (CVE-2025-29927)
URL:https://github.com/fahimalshihab/NextBypass
标签:#CVE-2025
更新了:CVE-2025
描述:Next.js Middleware Authorization Bypass Tool (CVE-2025-29927)
URL:https://github.com/fahimalshihab/NextBypass
标签:#CVE-2025
GitHub
GitHub - fahimalshihab/NextBypass: Next.js Middleware Authorization Bypass Tool (CVE-2025-29927)
Next.js Middleware Authorization Bypass Tool (CVE-2025-29927) - fahimalshihab/NextBypass
👍1
GitHub监控消息提醒!!!
更新了:反序列化
描述:Shiro反序列化漏洞综合利用,在原版工具上进行一些功能增加。
URL:https://github.com/Chave0v0/ShiroAttack2_Pro
标签:#反序列化
更新了:反序列化
描述:Shiro反序列化漏洞综合利用,在原版工具上进行一些功能增加。
URL:https://github.com/Chave0v0/ShiroAttack2_Pro
标签:#反序列化
GitHub
GitHub - Chave0v0/ShiroAttack2_Pro: Shiro反序列化漏洞综合利用,在原版工具上进行一些功能增加。
Shiro反序列化漏洞综合利用,在原版工具上进行一些功能增加。. Contribute to Chave0v0/ShiroAttack2_Pro development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述: Collection of Beacon Object Files (BOF) for Cobalt Strike
URL:https://github.com/ohkuom/BOF-Kit
标签:#Cobalt Strike
更新了:Cobalt Strike
描述: Collection of Beacon Object Files (BOF) for Cobalt Strike
URL:https://github.com/ohkuom/BOF-Kit
标签:#Cobalt Strike
GitHub
GitHub - ohkuom/BOF-Kit: Collection of Beacon Object Files (BOF) for Cobalt Strike
Collection of Beacon Object Files (BOF) for Cobalt Strike - ohkuom/BOF-Kit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/realcodeb0ss/CVE-2025-30567-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/realcodeb0ss/CVE-2025-30567-PoC
标签:#CVE-2025
GitHub
GitHub - realcodeb0ss/CVE-2025-30567-PoC: CVE-2025-30567 - WordPress WP01 < Path traversal
CVE-2025-30567 - WordPress WP01 < Path traversal. Contribute to realcodeb0ss/CVE-2025-30567-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-2294 < Wordpress Kubio[Plugin] - Local File Inclusion[LFI].
URL:https://github.com/realcodeb0ss/CVE-2025-2294-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-2294 < Wordpress Kubio[Plugin] - Local File Inclusion[LFI].
URL:https://github.com/realcodeb0ss/CVE-2025-2294-PoC
标签:#CVE-2025
GitHub
GitHub - realcodeb0ss/CVE-2025-2294-PoC: CVE-2025-2294 < Wordpress Kubio[Plugin] - Local File Inclusion[LFI].
CVE-2025-2294 < Wordpress Kubio[Plugin] - Local File Inclusion[LFI]. - realcodeb0ss/CVE-2025-2294-PoC
👍1
GitHub监控消息提醒!!!
更新了:RCE
描述:Subrion File Upload Bypass to RCE (Authenticated)
URL:https://github.com/Drew-Alleman/CVE-2018-19422
标签:#RCE
更新了:RCE
描述:Subrion File Upload Bypass to RCE (Authenticated)
URL:https://github.com/Drew-Alleman/CVE-2018-19422
标签:#RCE
GitHub
GitHub - Drew-Alleman/CVE-2018-19422: Subrion File Upload Bypass to RCE and Custom File Upload (Authenticated)
Subrion File Upload Bypass to RCE and Custom File Upload (Authenticated) - Drew-Alleman/CVE-2018-19422
GitHub监控消息提醒!!!
更新了:RCE
描述:Monstra CMS 3.0.4 Authenticated RCE via theme injection
URL:https://github.com/wcheng729/Monstra-3.0.4-RCE
标签:#RCE
更新了:RCE
描述:Monstra CMS 3.0.4 Authenticated RCE via theme injection
URL:https://github.com/wcheng729/Monstra-3.0.4-RCE
标签:#RCE
GitHub
GitHub - wcheng729/Monstra-3.0.4-RCE: Monstra CMS 3.0.4 Authenticated RCE via theme injection
Monstra CMS 3.0.4 Authenticated RCE via theme injection - wcheng729/Monstra-3.0.4-RCE
GitHub监控消息提醒!!!
更新了:RCE
描述: WordPress RomethemeKit For Elementor Plugin <= 1.5.4 is vulnerable to Remote Code Execution (RCE)
URL:https://github.com/Nxploited/CVE-2025-30911
标签:#RCE
更新了:RCE
描述: WordPress RomethemeKit For Elementor Plugin <= 1.5.4 is vulnerable to Remote Code Execution (RCE)
URL:https://github.com/Nxploited/CVE-2025-30911
标签:#RCE
GitHub
GitHub - Nxploited/CVE-2025-30911: WordPress RomethemeKit For Elementor Plugin <= 1.5.4 is vulnerable to Remote Code Execution…
WordPress RomethemeKit For Elementor Plugin <= 1.5.4 is vulnerable to Remote Code Execution (RCE) - GitHub - Nxploited/CVE-2025-30911: WordPress RomethemeKit For Elementor Plugin <=...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/h3st4k3r/CVE-2025-30065
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/h3st4k3r/CVE-2025-30065
标签:#CVE-2025
GitHub
GitHub - h3st4k3r/CVE-2025-30065: This PoC targets CVE-2025-30065, an RCE vulnerability in Apache Parquet via Avro schema deserialization.…
This PoC targets CVE-2025-30065, an RCE vulnerability in Apache Parquet via Avro schema deserialization. It abuses the getDefaultValue() mechanism to instantiate arbitrary record types during parsi...
GitHub监控消息提醒!!!
更新了:免杀
描述:seo|黑帽seo|sem|sem开户|竞价开户|域名||老域名|备案域名|批发域名|服务器||香港服务器|美国服务器|韩国服务器|台湾服务器|多ip服务器|站群||站群软件|蜘蛛池软件|建站工具|渗透||渗透拿站|webshell|免杀木马|远控|劫持|提权|流量||流量变现|收流量|卖流量
URL:https://github.com/seocn/seocn
标签:#免杀
更新了:免杀
描述:seo|黑帽seo|sem|sem开户|竞价开户|域名||老域名|备案域名|批发域名|服务器||香港服务器|美国服务器|韩国服务器|台湾服务器|多ip服务器|站群||站群软件|蜘蛛池软件|建站工具|渗透||渗透拿站|webshell|免杀木马|远控|劫持|提权|流量||流量变现|收流量|卖流量
URL:https://github.com/seocn/seocn
标签:#免杀
GitHub
GitHub - seocn/seocn.github.io: seo|黑帽seo|sem|sem开户|竞价开户|域名||老域名|备案域名|批发域名|服务器||香港服务器|美国服务器|韩国服务器|台湾服务器|多ip服务器|站群||站群软件|蜘蛛池软件|…
seo|黑帽seo|sem|sem开户|竞价开户|域名||老域名|备案域名|批发域名|服务器||香港服务器|美国服务器|韩国服务器|台湾服务器|多ip服务器|站群||站群软件|蜘蛛池软件|建站工具|渗透||渗透拿站|webshell|免杀木马|远控|劫持|提权|流量||流量变现|收流量|卖流量 - seocn/seocn.github.io
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Kirbirls/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Kirbirls/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025