GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Vite任意文件读取漏洞批量检测脚本CVE-2025-31486
URL:https://github.com/iSee857/CVE-2025-31486-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Vite任意文件读取漏洞批量检测脚本CVE-2025-31486
URL:https://github.com/iSee857/CVE-2025-31486-PoC
标签:#CVE-2025
GitHub
GitHub - iSee857/CVE-2025-31486-PoC: Vite任意文件读取漏洞批量检测脚本CVE-2025-31486
Vite任意文件读取漏洞批量检测脚本CVE-2025-31486. Contribute to iSee857/CVE-2025-31486-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29927
URL:https://github.com/pixilated730/NextJS-Exploit-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29927
URL:https://github.com/pixilated730/NextJS-Exploit-
标签:#CVE-2025
GitHub
GitHub - pixilated730/NextJS-Exploit-: CVE-2025-29927
CVE-2025-29927. Contribute to pixilated730/NextJS-Exploit- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:SQLMap Studio 是一个现代化的 Web 界面工具,专为生成和配置 SQLMap 命令而设计,帮助安全研究人员和渗透测试人员高效执行 SQL 注入测试。
URL:https://github.com/xinyikan/sqlmap-studio
标签:#渗透测试
更新了:渗透测试
描述:SQLMap Studio 是一个现代化的 Web 界面工具,专为生成和配置 SQLMap 命令而设计,帮助安全研究人员和渗透测试人员高效执行 SQL 注入测试。
URL:https://github.com/xinyikan/sqlmap-studio
标签:#渗透测试
GitHub
GitHub - xinyikan/sqlmap-studio: SQLMap Studio 是一个现代化的 Web 界面工具,专为生成和配置 SQLMap 命令而设计,帮助安全研究人员和渗透测试人员高效执行 SQL 注入测试。
SQLMap Studio 是一个现代化的 Web 界面工具,专为生成和配置 SQLMap 命令而设计,帮助安全研究人员和渗透测试人员高效执行 SQL 注入测试。 - xinyikan/sqlmap-studio
GitHub监控消息提醒!!!
更新了:webshell
描述:A exploitation tool (webshell)
URL:https://github.com/ediop3SquadALT/ediop3Webshell
标签:#webshell
更新了:webshell
描述:A exploitation tool (webshell)
URL:https://github.com/ediop3SquadALT/ediop3Webshell
标签:#webshell
GitHub
GitHub - ediop3SquadALT/ediop3Webshell: A exploitation tool (webshell)
A exploitation tool (webshell). Contribute to ediop3SquadALT/ediop3Webshell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.
URL:https://github.com/Karitosmuan/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
标签:#RCE
更新了:RCE
描述:Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.
URL:https://github.com/Karitosmuan/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:codeBox RCE is a service that provides a secure, containerized environment to run code remotely. The API supports Python, JavaScript, and C++, with potential for more languages in the future.
URL:https://github.com/Rajivkumawat3/codebox
标签:#RCE
更新了:RCE
描述:codeBox RCE is a service that provides a secure, containerized environment to run code remotely. The API supports Python, JavaScript, and C++, with potential for more languages in the future.
URL:https://github.com/Rajivkumawat3/codebox
标签:#RCE
GitHub
GitHub - Rajivkumawat3/CodeBox: CodeBox is a remote code runner that lets users execute C++, Python, and JS code in a sandboxed…
CodeBox is a remote code runner that lets users execute C++, Python, and JS code in a sandboxed environment with real-time session sharing. - Rajivkumawat3/CodeBox
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.
URL:https://github.com/horsehacks/CVE-2025-24813-checker
标签:#CVE-2025
更新了:CVE-2025
描述:Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.
URL:https://github.com/horsehacks/CVE-2025-24813-checker
标签:#CVE-2025
GitHub
GitHub - horsehacks/CVE-2025-24813-checker: Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.
Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker. - horsehacks/CVE-2025-24813-checker
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025040804y6wkuiy6mta5q6k2hvvybn
URL:https://github.com/static-web-apps-testing-org/swa2025040804y6wkuiy6mta5q6k2hvvybn
标签:#hvv
更新了:hvv
描述:swa2025040804y6wkuiy6mta5q6k2hvvybn
URL:https://github.com/static-web-apps-testing-org/swa2025040804y6wkuiy6mta5q6k2hvvybn
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa2025040804y6wkuiy6mta5q6k2hvvybn: swa2025040804y6wkuiy6mta5q6k2hvvybn
swa2025040804y6wkuiy6mta5q6k2hvvybn. Contribute to static-web-apps-testing-org/swa2025040804y6wkuiy6mta5q6k2hvvybn development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29927 ~ a poc of the next.js middleware authentication bypass
URL:https://github.com/ValGrace/middleware-auth-bypass
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29927 ~ a poc of the next.js middleware authentication bypass
URL:https://github.com/ValGrace/middleware-auth-bypass
标签:#CVE-2025
GitHub
GitHub - ValGrace/middleware-auth-bypass: CVE-2025-29927 ~ a poc of the next.js middleware authentication bypass
CVE-2025-29927 ~ a poc of the next.js middleware authentication bypass - ValGrace/middleware-auth-bypass
GitHub监控消息提醒!!!
更新了:域渗透
描述:seo|黑帽seo|sem|sem开户|竞价开户|域名||老域名|备案域名|批发域名|服务器||香港服务器|美国服务器|韩国服务器|台湾服务器|多ip服务器|站群||站群软件|蜘蛛池软件|建站工具|渗透||渗透拿站|webshell|免杀木马|远控|劫持|提权|流量||流量变现|收流量|卖流量
URL:https://github.com/seocn/seocn.github.io
标签:#域渗透
更新了:域渗透
描述:seo|黑帽seo|sem|sem开户|竞价开户|域名||老域名|备案域名|批发域名|服务器||香港服务器|美国服务器|韩国服务器|台湾服务器|多ip服务器|站群||站群软件|蜘蛛池软件|建站工具|渗透||渗透拿站|webshell|免杀木马|远控|劫持|提权|流量||流量变现|收流量|卖流量
URL:https://github.com/seocn/seocn.github.io
标签:#域渗透
GitHub
GitHub - seocn/seocn.github.io: seo|黑帽seo|sem|sem开户|竞价开户|域名||老域名|备案域名|批发域名|服务器||香港服务器|美国服务器|韩国服务器|台湾服务器|多ip服务器|站群||站群软件|蜘蛛池软件|…
seo|黑帽seo|sem|sem开户|竞价开户|域名||老域名|备案域名|批发域名|服务器||香港服务器|美国服务器|韩国服务器|台湾服务器|多ip服务器|站群||站群软件|蜘蛛池软件|建站工具|渗透||渗透拿站|webshell|免杀木马|远控|劫持|提权|流量||流量变现|收流量|卖流量 - seocn/seocn.github.io
GitHub监控消息提醒!!!
更新了:绕过
描述:黑客项目_通过kdmapper手动映射DBK驱动,并重构DBK与Cheat Engine的通讯机制,绕过微软签名
URL:https://github.com/1003761249/CheatEngine-With-kdmapper
标签:#绕过
更新了:绕过
描述:黑客项目_通过kdmapper手动映射DBK驱动,并重构DBK与Cheat Engine的通讯机制,绕过微软签名
URL:https://github.com/1003761249/CheatEngine-With-kdmapper
标签:#绕过
GitHub
GitHub - 1003761249/CheatEngine-With-kdmapper: 黑客项目_通过kdmapper手动映射DBK驱动,并重构DBK与Cheat Engine的通讯机制,绕过微软签名
黑客项目_通过kdmapper手动映射DBK驱动,并重构DBK与Cheat Engine的通讯机制,绕过微软签名 - 1003761249/CheatEngine-With-kdmapper
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Prevent CVE-2025-22457 and other security problems with Juniper/Ivanti Secure Connect SSL VPN
URL:https://github.com/Vinylrider/ivantiunlocker
标签:#CVE-2025
更新了:CVE-2025
描述:Prevent CVE-2025-22457 and other security problems with Juniper/Ivanti Secure Connect SSL VPN
URL:https://github.com/Vinylrider/ivantiunlocker
标签:#CVE-2025
GitHub
GitHub - Vinylrider/ivantiunlocker: Prevent CVE-2025-22457 and other security problems with Juniper/Ivanti Secure Connect SSL VPN
Prevent CVE-2025-22457 and other security problems with Juniper/Ivanti Secure Connect SSL VPN - Vinylrider/ivantiunlocker
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-22457 Python and Metasploit PoC for Ivanti unauthenticated RCE
URL:https://github.com/N4SL1/CVE-2025-22457-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-22457 Python and Metasploit PoC for Ivanti unauthenticated RCE
URL:https://github.com/N4SL1/CVE-2025-22457-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Work-In-Progress for CVE-2025-27840
URL:https://github.com/ladyg00se/CVE-2025-27840-WIP
标签:#CVE-2025
更新了:CVE-2025
描述:A Work-In-Progress for CVE-2025-27840
URL:https://github.com/ladyg00se/CVE-2025-27840-WIP
标签:#CVE-2025
GitHub
GitHub - ladyg00se/CVE-2025-27840-WIP: A Work-In-Progress for CVE-2025-27840
A Work-In-Progress for CVE-2025-27840 . Contribute to ladyg00se/CVE-2025-27840-WIP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3
URL:https://github.com/tdeerenberg/InlineWhispers3
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3
URL:https://github.com/tdeerenberg/InlineWhispers3
标签:#Cobalt Strike
GitHub
GitHub - tdeerenberg/InlineWhispers3: Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF)…
Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion - tdeerenberg/InlineWhispers3
GitHub监控消息提醒!!!
更新了:RCE
描述:php-in-jpg is a simple yet flexible tool that generates .jpg image files embedding PHP payloads, designed to support PHP RCE polyglot techniques.
URL:https://github.com/nemmusu/php-in-jpg
标签:#RCE
更新了:RCE
描述:php-in-jpg is a simple yet flexible tool that generates .jpg image files embedding PHP payloads, designed to support PHP RCE polyglot techniques.
URL:https://github.com/nemmusu/php-in-jpg
标签:#RCE
GitHub
GitHub - nemmusu/php-in-jpg: php-in-jpg is a simple yet flexible tool that generates .jpg image files embedding PHP payloads, designed…
php-in-jpg is a simple yet flexible tool that generates .jpg image files embedding PHP payloads, designed to support PHP RCE polyglot techniques. - nemmusu/php-in-jpg
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Security Advisory and PoC for CVE-2025-32013
URL:https://github.com/Mohith-T/CVE-2025-32013
标签:#CVE-2025
更新了:CVE-2025
描述:Security Advisory and PoC for CVE-2025-32013
URL:https://github.com/Mohith-T/CVE-2025-32013
标签:#CVE-2025
GitHub
GitHub - Mohith-T/CVE-2025-32013: Security Advisory and PoC for CVE-2025-32013
Security Advisory and PoC for CVE-2025-32013. Contribute to Mohith-T/CVE-2025-32013 development by creating an account on GitHub.