GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025040903hvvhdt0zsfn7zqxwysbvoj
URL:https://github.com/static-web-apps-testing-org/swa2025040903hvvhdt0zsfn7zqxwysbvoj
标签:#hvv
更新了:hvv
描述:swa2025040903hvvhdt0zsfn7zqxwysbvoj
URL:https://github.com/static-web-apps-testing-org/swa2025040903hvvhdt0zsfn7zqxwysbvoj
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa2025040903hvvhdt0zsfn7zqxwysbvoj: swa2025040903hvvhdt0zsfn7zqxwysbvoj
swa2025040903hvvhdt0zsfn7zqxwysbvoj. Contribute to static-web-apps-testing-org/swa2025040903hvvhdt0zsfn7zqxwysbvoj development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:使用graalvm编译的本地文件敏感信息收集工具,依靠hae的规则配置文件
URL:https://github.com/hikeny666/ezmm
标签:#信息收集
更新了:信息收集
描述:使用graalvm编译的本地文件敏感信息收集工具,依靠hae的规则配置文件
URL:https://github.com/hikeny666/ezmm
标签:#信息收集
GitHub
GitHub - hikeny666/ezmm: 使用graalvm编译的本地文件敏感信息收集工具,依靠hae的规则配置文件
使用graalvm编译的本地文件敏感信息收集工具,依靠hae的规则配置文件. Contribute to hikeny666/ezmm development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:CVE-2024-3640绕过Waf进行漏洞利用
URL:https://github.com/H1ng007/CVE-2024-3640_WafBypass
标签:#绕过
更新了:绕过
描述:CVE-2024-3640绕过Waf进行漏洞利用
URL:https://github.com/H1ng007/CVE-2024-3640_WafBypass
标签:#绕过
GitHub
GitHub - H1ng007/CVE-2024-3640_WafBypass: CVE-2024-3640绕过Waf进行漏洞利用
CVE-2024-3640绕过Waf进行漏洞利用. Contribute to H1ng007/CVE-2024-3640_WafBypass development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24221: Sensitive keychain data may be accessible from an iOS backup
URL:https://github.com/AnonymousDeveloper69/CVE-2025-24221
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24221: Sensitive keychain data may be accessible from an iOS backup
URL:https://github.com/AnonymousDeveloper69/CVE-2025-24221
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:针对CVE-2025-30208和CVE-2025-31125的漏洞利用
URL:https://github.com/jackieya/ViteVulScan
标签:#CVE-2025
更新了:CVE-2025
描述:针对CVE-2025-30208和CVE-2025-31125的漏洞利用
URL:https://github.com/jackieya/ViteVulScan
标签:#CVE-2025
GitHub
GitHub - jackieya/ViteVulScan: 针对CVE-2025-30208和CVE-2025-31125的漏洞利用
针对CVE-2025-30208和CVE-2025-31125的漏洞利用. Contribute to jackieya/ViteVulScan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Research on Next.js middleware vulnerability (CVE-2025-29927) allowing authorization bypass and potential exploits.
URL:https://github.com/l1uk/nextjs-middleware-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Research on Next.js middleware vulnerability (CVE-2025-29927) allowing authorization bypass and potential exploits.
URL:https://github.com/l1uk/nextjs-middleware-exploit
标签:#CVE-2025
GitHub
GitHub - l1uk/nextjs-middleware-exploit: Research on Next.js middleware vulnerability (CVE-2025-29927) allowing authorization bypass…
Research on Next.js middleware vulnerability (CVE-2025-29927) allowing authorization bypass and potential exploits. - l1uk/nextjs-middleware-exploit
GitHub监控消息提醒!!!
更新了:Red Team
描述:A list of curated resources for people interested in AI Red Teaming, Jailbreaking, and Prompt Injection
URL:https://github.com/PromptLabs/Prompt-Hacking-Resources
标签:#Red Team
更新了:Red Team
描述:A list of curated resources for people interested in AI Red Teaming, Jailbreaking, and Prompt Injection
URL:https://github.com/PromptLabs/Prompt-Hacking-Resources
标签:#Red Team
GitHub
GitHub - PromptLabs/Prompt-Hacking-Resources: A list of curated resources for people interested in AI Red Teaming, Jailbreaking…
A list of curated resources for people interested in AI Red Teaming, Jailbreaking, and Prompt Injection - PromptLabs/Prompt-Hacking-Resources
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/housam123456789/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/housam123456789/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:信息收集
描述:MCP 信息收集客户端 是一个轻量级的信息收集工具,可以扩展使用mcp服务,进行静默信息收集。它无需用户交互或聊天
URL:https://github.com/Dont-Chat/mcp-collector
标签:#信息收集
更新了:信息收集
描述:MCP 信息收集客户端 是一个轻量级的信息收集工具,可以扩展使用mcp服务,进行静默信息收集。它无需用户交互或聊天
URL:https://github.com/Dont-Chat/mcp-collector
标签:#信息收集
GitHub
GitHub - Dont-Chat/mcp-collector: MCP 信息收集客户端 是一个轻量级的信息收集工具,可以扩展使用mcp服务,进行静默信息收集。它无需用户交互或聊天
MCP 信息收集客户端 是一个轻量级的信息收集工具,可以扩展使用mcp服务,进行静默信息收集。它无需用户交互或聊天 - Dont-Chat/mcp-collector
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025041002t31qcpv3hvv0ygx8n3vs0s
URL:https://github.com/static-web-apps-testing-org/swa2025041002t31qcpv3hvv0ygx8n3vs0s
标签:#hvv
更新了:hvv
描述:swa2025041002t31qcpv3hvv0ygx8n3vs0s
URL:https://github.com/static-web-apps-testing-org/swa2025041002t31qcpv3hvv0ygx8n3vs0s
标签:#hvv
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE
URL:https://github.com/securekomodo/CVE-2025-22457
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE
URL:https://github.com/securekomodo/CVE-2025-22457
标签:#CVE-2025
GitHub
GitHub - securekomodo/CVE-2025-22457: CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE
CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE - securekomodo/CVE-2025-22457
👍2
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit CVE-2025-1974 with a single file.
URL:https://github.com/Rubby2001/CVE-2025-1974-go
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit CVE-2025-1974 with a single file.
URL:https://github.com/Rubby2001/CVE-2025-1974-go
标签:#CVE-2025
GitHub
GitHub - Rubby2001/CVE-2025-1974-go: Exploit CVE-2025-1974 with a single file.
Exploit CVE-2025-1974 with a single file. Contribute to Rubby2001/CVE-2025-1974-go development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一个基于 Python 和 Tkinter 的模块化渗透测试工具箱,支持多种工具类型和环境配置。
URL:https://github.com/AiENG07/My_ToolBox
标签:#渗透测试
更新了:渗透测试
描述:一个基于 Python 和 Tkinter 的模块化渗透测试工具箱,支持多种工具类型和环境配置。
URL:https://github.com/AiENG07/My_ToolBox
标签:#渗透测试
GitHub
GitHub - AiENG07/My_ToolBox: 一个基于 Python 和 Tkinter 的模块化渗透测试工具箱,支持多种工具类型和环境配置。
一个基于 Python 和 Tkinter 的模块化渗透测试工具箱,支持多种工具类型和环境配置。. Contribute to AiENG07/My_ToolBox development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:My self-built SQLi cases for practice and demos. Includes binary search data dumps, custom SQLMap tamper, stored procedure injection, and RCE tricks.
URL:https://github.com/quyt0/sqli-cases
标签:#RCE
更新了:RCE
描述:My self-built SQLi cases for practice and demos. Includes binary search data dumps, custom SQLMap tamper, stored procedure injection, and RCE tricks.
URL:https://github.com/quyt0/sqli-cases
标签:#RCE
GitHub
GitHub - quyt0/sqli-cases: My self-built SQLi cases for practice and demos. Includes binary search data dumps, custom SQLMap tamper…
My self-built SQLi cases for practice and demos. Includes binary search data dumps, custom SQLMap tamper, stored procedure injection, and RCE tricks. - quyt0/sqli-cases