GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30967
URL:https://github.com/Anton-ai111/CVE-2025-30967
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30967
URL:https://github.com/Anton-ai111/CVE-2025-30967
标签:#CVE-2025
GitHub
GitHub - Anton-ai111/CVE-2025-30967: CVE-2025-30967
CVE-2025-30967. Contribute to Anton-ai111/CVE-2025-30967 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:hvv
描述:swa20250416137y0m7245jla5bn4i9hvvmj
URL:https://github.com/static-web-apps-testing-org/swa20250416137y0m7245jla5bn4i9hvvmj
标签:#hvv
更新了:hvv
描述:swa20250416137y0m7245jla5bn4i9hvvmj
URL:https://github.com/static-web-apps-testing-org/swa20250416137y0m7245jla5bn4i9hvvmj
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa20250416137y0m7245jla5bn4i9hvvmj: swa20250416137y0m7245jla5bn4i9hvvmj
swa20250416137y0m7245jla5bn4i9hvvmj. Contribute to static-web-apps-testing-org/swa20250416137y0m7245jla5bn4i9hvvmj development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:WordPress Custom CSS, JS & PHP plugin <= 2.4.1 - CSRF to RCE vulnerability
URL:https://github.com/Nxploited/CVE-2025-39601
标签:#RCE
更新了:RCE
描述:WordPress Custom CSS, JS & PHP plugin <= 2.4.1 - CSRF to RCE vulnerability
URL:https://github.com/Nxploited/CVE-2025-39601
标签:#RCE
GitHub
GitHub - Nxploited/CVE-2025-39601: WordPress Custom CSS, JS & PHP plugin <= 2.4.1 - CSRF to RCE vulnerability
WordPress Custom CSS, JS & PHP plugin <= 2.4.1 - CSRF to RCE vulnerability - Nxploited/CVE-2025-39601
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Meshtastic buffer overflow vulnerability - CVE-2025-24797
URL:https://github.com/Alainx277/CVE-2025-24797
标签:#CVE-2025
更新了:CVE-2025
描述:Meshtastic buffer overflow vulnerability - CVE-2025-24797
URL:https://github.com/Alainx277/CVE-2025-24797
标签:#CVE-2025
GitHub
GitHub - Alainx277/CVE-2025-24797: Meshtastic buffer overflow vulnerability - CVE-2025-24797
Meshtastic buffer overflow vulnerability - CVE-2025-24797 - Alainx277/CVE-2025-24797
GitHub监控消息提醒!!!
更新了:RCE
描述:Arbitrary File Write in Gibbon LMS for RCE (CVE-2023-45878)
URL:https://github.com/ulricvbs/gibbonlms-filewrite_rce
标签:#RCE
更新了:RCE
描述:Arbitrary File Write in Gibbon LMS for RCE (CVE-2023-45878)
URL:https://github.com/ulricvbs/gibbonlms-filewrite_rce
标签:#RCE
GitHub
GitHub - ulricvbs/gibbonlms-filewrite_rce: PoC - Arbitrary File Write in Gibbon LMS for RCE (CVE-2023-45878)
PoC - Arbitrary File Write in Gibbon LMS for RCE (CVE-2023-45878) - ulricvbs/gibbonlms-filewrite_rce
👍1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:SQL Injection in Dietiqa App v1.0.20 (CVE-2025-28009) – Unauthenticated remote data access via vulnerable parameter.
URL:https://github.com/beardenx/CVE-2025-28009
标签:#CVE-2025
更新了:CVE-2025
描述:SQL Injection in Dietiqa App v1.0.20 (CVE-2025-28009) – Unauthenticated remote data access via vulnerable parameter.
URL:https://github.com/beardenx/CVE-2025-28009
标签:#CVE-2025
GitHub
GitHub - beardenx/CVE-2025-28009: SQL Injection in Dietiqa App v1.0.20 (CVE-2025-28009) – Unauthenticated remote data access via…
SQL Injection in Dietiqa App v1.0.20 (CVE-2025-28009) – Unauthenticated remote data access via vulnerable parameter. - beardenx/CVE-2025-28009
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:本工具是一个自动化PWN利用框架,专为CTF比赛和二进制漏洞利用设计,集成了栈溢出、格式化字符串等多种漏洞利用技术,支持32位和64位程序的自动化分析利用。(About ctf一键栈溢出、格式化字符串pwn工具/一键pwn利用工具)
URL:https://github.com/heimao-box/pwnpasi
标签:#漏洞利用
更新了:漏洞利用
描述:本工具是一个自动化PWN利用框架,专为CTF比赛和二进制漏洞利用设计,集成了栈溢出、格式化字符串等多种漏洞利用技术,支持32位和64位程序的自动化分析利用。(About ctf一键栈溢出、格式化字符串pwn工具/一键pwn利用工具)
URL:https://github.com/heimao-box/pwnpasi
标签:#漏洞利用
GitHub
GitHub - heimao-box/pwnpasi: This tool is an automated PWN exploitation framework designed for CTF competitions and binary vulnerability…
This tool is an automated PWN exploitation framework designed for CTF competitions and binary vulnerability exploitation. It integrates various exploitation techniques such as stack overflow and fo...
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025041712fq680pjiut91hvv6142icw
URL:https://github.com/static-web-apps-testing-org/swa2025041712fq680pjiut91hvv6142icw
标签:#hvv
更新了:hvv
描述:swa2025041712fq680pjiut91hvv6142icw
URL:https://github.com/static-web-apps-testing-org/swa2025041712fq680pjiut91hvv6142icw
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa2025041712fq680pjiut91hvv6142icw: swa2025041712fq680pjiut91hvv6142icw
swa2025041712fq680pjiut91hvv6142icw. Contribute to static-web-apps-testing-org/swa2025041712fq680pjiut91hvv6142icw development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.
URL:https://github.com/lukehebe/CVE-2023-27163
标签:#RCE
更新了:RCE
描述:Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.
URL:https://github.com/lukehebe/CVE-2023-27163
标签:#RCE
GitHub
GitHub - lukehebe/CVE-2023-27163: CVE-2023-27163 Request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery…
CVE-2023-27163 Request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access netwo...
GitHub监控消息提醒!!!
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/ViFDevv/scout
标签:#信息收集
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/ViFDevv/scout
标签:#信息收集
GitHub
GitHub - ViFDevv/scout: Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web…
Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。 - ViFDevv/scout
GitHub监控消息提醒!!!
更新了:绕过
描述:一个用于绕过体适能应用(com.bxkj.student)的Xposed模块,移除广告并绕过各种安全检测。
URL:https://github.com/pansoul1/Fuck-TSN
标签:#绕过
更新了:绕过
描述:一个用于绕过体适能应用(com.bxkj.student)的Xposed模块,移除广告并绕过各种安全检测。
URL:https://github.com/pansoul1/Fuck-TSN
标签:#绕过
GitHub
GitHub - pansoul1/Fuck-TSN: 一个用于绕过体适能应用(com.bxkj.student)的Xposed模块,移除广告并绕过各种安全检测。
一个用于绕过体适能应用(com.bxkj.student)的Xposed模块,移除广告并绕过各种安全检测。 - pansoul1/Fuck-TSN
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025041801314hvvt6h9r3qval6nwzmz
URL:https://github.com/static-web-apps-testing-org/swa2025041801314hvvt6h9r3qval6nwzmz
标签:#hvv
更新了:hvv
描述:swa2025041801314hvvt6h9r3qval6nwzmz
URL:https://github.com/static-web-apps-testing-org/swa2025041801314hvvt6h9r3qval6nwzmz
标签:#hvv
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32395-POC
URL:https://github.com/ruiwenya/CVE-2025-32395
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32395-POC
URL:https://github.com/ruiwenya/CVE-2025-32395
标签:#CVE-2025
GitHub
GitHub - ruiwenya/CVE-2025-32395: CVE-2025-32395-POC
CVE-2025-32395-POC. Contribute to ruiwenya/CVE-2025-32395 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Security research on Erlang/OTP SSH CVE-2025-32433.
URL:https://github.com/darses/CVE-2025-32433.py
标签:#CVE-2025
更新了:CVE-2025
描述:Security research on Erlang/OTP SSH CVE-2025-32433.
URL:https://github.com/darses/CVE-2025-32433.py
标签:#CVE-2025
GitHub
GitHub - darses/CVE-2025-32433: Security research on Erlang/OTP SSH CVE-2025-32433.
Security research on Erlang/OTP SSH CVE-2025-32433. - darses/CVE-2025-32433