GitHub监控消息提醒!!!
更新了:反序列化
描述: 《深入JDBC安全:特殊URL构造与不出网反序列化利用技术揭秘》对应研究总结项目 \"Deep Dive into JDBC Security: Special URL Construction and Non-Networked Deserialization Exploitation Techniques Revealed\" - Research Summary Project
URL:https://github.com/Oluwaseunnn/jdbc-tricks
标签:#反序列化
更新了:反序列化
描述: 《深入JDBC安全:特殊URL构造与不出网反序列化利用技术揭秘》对应研究总结项目 \"Deep Dive into JDBC Security: Special URL Construction and Non-Networked Deserialization Exploitation Techniques Revealed\" - Research Summary Project
URL:https://github.com/Oluwaseunnn/jdbc-tricks
标签:#反序列化
GitHub
GitHub - Oluwaseunnn/jdbc-tricks: 《深入JDBC安全:特殊URL构造与不出网反序列化利用技术揭秘》对应研究总结项目 "Deep Dive into JDBC Security: Special URL Construction…
《深入JDBC安全:特殊URL构造与不出网反序列化利用技术揭秘》对应研究总结项目 "Deep Dive into JDBC Security: Special URL Construction and Non-Networked Deserialization Exploitation Techniques Revealed" - Research Su...
GitHub监控消息提醒!!!
更新了:应急响应
描述:针对恶意程序的网络连接行为监控工具,特别适用于应急响应场景。通过监控特定 IP/域名的网络连接,快速定位潜伏的恶意程序,协助应急处理人员及时发现和清除威胁。
URL:https://github.com/jayimu/Network_Monitor
标签:#应急响应
更新了:应急响应
描述:针对恶意程序的网络连接行为监控工具,特别适用于应急响应场景。通过监控特定 IP/域名的网络连接,快速定位潜伏的恶意程序,协助应急处理人员及时发现和清除威胁。
URL:https://github.com/jayimu/Network_Monitor
标签:#应急响应
GitHub
GitHub - jayimu/Network_Monitor: 针对恶意程序的网络连接行为监控工具,特别适用于应急响应场景。通过监控特定 IP/域名的网络连接,快速定位潜伏的恶意程序,协助应急处理人员及时发现和清除威胁。
针对恶意程序的网络连接行为监控工具,特别适用于应急响应场景。通过监控特定 IP/域名的网络连接,快速定位潜伏的恶意程序,协助应急处理人员及时发现和清除威胁。 - jayimu/Network_Monitor
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025042218hvvq2ibzgpl6vy9g0kdde1
URL:https://github.com/static-web-apps-testing-org/swa2025042218hvvq2ibzgpl6vy9g0kdde1
标签:#hvv
更新了:hvv
描述:swa2025042218hvvq2ibzgpl6vy9g0kdde1
URL:https://github.com/static-web-apps-testing-org/swa2025042218hvvq2ibzgpl6vy9g0kdde1
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa2025042218hvvq2ibzgpl6vy9g0kdde1: swa2025042218hvvq2ibzgpl6vy9g0kdde1
swa2025042218hvvq2ibzgpl6vy9g0kdde1. Contribute to static-web-apps-testing-org/swa2025042218hvvq2ibzgpl6vy9g0kdde1 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29529
URL:https://github.com/Yoshik0xF6/CVE-2025-29529
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29529
URL:https://github.com/Yoshik0xF6/CVE-2025-29529
标签:#CVE-2025
GitHub
GitHub - Yoshik0xF6/CVE-2025-29529: SQLi ITC Multiplan v3.7.4.1002 (CVE-2025-29529)
SQLi ITC Multiplan v3.7.4.1002 (CVE-2025-29529). Contribute to Yoshik0xF6/CVE-2025-29529 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:哥斯拉反编译源码---Godzilla_native_refile 哥斯拉改编asp、java、php、cshap木马免杀版---Godzilla_native_refile.jar
URL:https://github.com/Sywanggg/Godzilla_collection
标签:#免杀
更新了:免杀
描述:哥斯拉反编译源码---Godzilla_native_refile 哥斯拉改编asp、java、php、cshap木马免杀版---Godzilla_native_refile.jar
URL:https://github.com/Sywanggg/Godzilla_collection
标签:#免杀
GitHub
GitHub - Sywanggg/Godzilla_collection: 哥斯拉反编译源码---Godzilla_native_refile 哥斯拉改编asp、java、php、cshap木马免杀版---Godzilla_native_refile.jar
哥斯拉反编译源码---Godzilla_native_refile 哥斯拉改编asp、java、php、cshap木马免杀版---Godzilla_native_refile.jar - Sywanggg/Godzilla_collection
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29927: Next.js Middleware Bypass Vulnerability
URL:https://github.com/kh4sh3i/CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29927: Next.js Middleware Bypass Vulnerability
URL:https://github.com/kh4sh3i/CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - kh4sh3i/CVE-2025-29927: CVE-2025-29927: Next.js Middleware Bypass Vulnerability
CVE-2025-29927: Next.js Middleware Bypass Vulnerability - kh4sh3i/CVE-2025-29927
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/yusufdalbudak/CVE-2025-32965-xrpl.js-Supply-Chain-Attack-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/yusufdalbudak/CVE-2025-32965-xrpl.js-Supply-Chain-Attack-PoC
标签:#CVE-2025
GitHub
GitHub - yusufdalbudak/CVE-2025-32965-xrpl-js-poc: CVE Kodu: CVE-2025-32965 Zafiyet Türü: Supply Chain Attack (CWE-506: Embedded…
CVE Kodu: CVE-2025-32965 Zafiyet Türü: Supply Chain Attack (CWE-506: Embedded Malicious Code) Hedef: xrpl.js kütüphanesinin 4.2.1–4.2.4 ve 2.14.2 versiyonları Etki: Kullanıcının cüzdan seed/secr...
GitHub监控消息提醒!!!
更新了:内存马
描述:对原版JNDIExploit进行修改增加线程和JMX注入内存马
URL:https://github.com/pap1rman/JNDIExploit-modify
标签:#内存马
更新了:内存马
描述:对原版JNDIExploit进行修改增加线程和JMX注入内存马
URL:https://github.com/pap1rman/JNDIExploit-modify
标签:#内存马
GitHub
GitHub - pap1rman/JNDIExploit-modify: 对原版JNDIExploit进行修改增加线程和JMX注入内存马
对原版JNDIExploit进行修改增加线程和JMX注入内存马. Contribute to pap1rman/JNDIExploit-modify development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/yusufdalbudak/CVE-2025-32965-xrpl-js-poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/yusufdalbudak/CVE-2025-32965-xrpl-js-poc
标签:#CVE-2025
GitHub
GitHub - yusufdalbudak/CVE-2025-32965-xrpl-js-poc: CVE Kodu: CVE-2025-32965 Zafiyet Türü: Supply Chain Attack (CWE-506: Embedded…
CVE Kodu: CVE-2025-32965 Zafiyet Türü: Supply Chain Attack (CWE-506: Embedded Malicious Code) Hedef: xrpl.js kütüphanesinin 4.2.1–4.2.4 ve 2.14.2 versiyonları Etki: Kullanıcının cüzdan seed/secr...
👍1
GitHub监控消息提醒!!!
更新了:webshell
描述:A webshell-framework
URL:https://github.com/m310ct/webshell-framework
标签:#webshell
更新了:webshell
描述:A webshell-framework
URL:https://github.com/m310ct/webshell-framework
标签:#webshell
GitHub
GitHub - m310ct/webshell-framework: A webshell-framework
A webshell-framework. Contribute to m310ct/webshell-framework development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025042318yicky7g7gyac95hvvcznje
URL:https://github.com/static-web-apps-testing-org/swa2025042318yicky7g7gyac95hvvcznje
标签:#hvv
更新了:hvv
描述:swa2025042318yicky7g7gyac95hvvcznje
URL:https://github.com/static-web-apps-testing-org/swa2025042318yicky7g7gyac95hvvcznje
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa2025042318yicky7g7gyac95hvvcznje: swa2025042318yicky7g7gyac95hvvcznje
swa2025042318yicky7g7gyac95hvvcznje. Contribute to static-web-apps-testing-org/swa2025042318yicky7g7gyac95hvvcznje development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This Python script exploits the CVE-2025-32433 vulnerability in certain versions of the Erlang SSH daemon.
URL:https://github.com/tobiasGuta/Erlang-OTP-CVE-2025-32433
标签:#CVE-2025
更新了:CVE-2025
描述:This Python script exploits the CVE-2025-32433 vulnerability in certain versions of the Erlang SSH daemon.
URL:https://github.com/tobiasGuta/Erlang-OTP-CVE-2025-32433
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: WordPress Verification SMS with TargetSMS Plugin <= 1.5 is vulnerable to Remote Code Execution (RCE)
URL:https://github.com/Nxploited/CVE-2025-3776
标签:#CVE-2025
更新了:CVE-2025
描述: WordPress Verification SMS with TargetSMS Plugin <= 1.5 is vulnerable to Remote Code Execution (RCE)
URL:https://github.com/Nxploited/CVE-2025-3776
标签:#CVE-2025
GitHub
GitHub - Nxploited/CVE-2025-3776: WordPress Verification SMS with TargetSMS Plugin <= 1.5 is vulnerable to Remote Code Execution…
WordPress Verification SMS with TargetSMS Plugin <= 1.5 is vulnerable to Remote Code Execution (RCE) - GitHub - Nxploited/CVE-2025-3776: WordPress Verification SMS with TargetSMS Plugin &a...
GitHub监控消息提醒!!!
更新了:RCE
描述:ACM Cyber Gradescope RCE workshop
URL:https://github.com/acmucsd/gradescope-griefing
标签:#RCE
更新了:RCE
描述:ACM Cyber Gradescope RCE workshop
URL:https://github.com/acmucsd/gradescope-griefing
标签:#RCE
GitHub
GitHub - acmucsd/gradescope-griefing: ACM Cyber Gradescope RCE workshop
ACM Cyber Gradescope RCE workshop. Contribute to acmucsd/gradescope-griefing development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025042408lf5jmb1hvvs37vcnq9o8nm
URL:https://github.com/static-web-apps-testing-org/swa2025042408lf5jmb1hvvs37vcnq9o8nm
标签:#hvv
更新了:hvv
描述:swa2025042408lf5jmb1hvvs37vcnq9o8nm
URL:https://github.com/static-web-apps-testing-org/swa2025042408lf5jmb1hvvs37vcnq9o8nm
标签:#hvv
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-30406
URL:https://github.com/W01fh4cker/CVE-2025-30406
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-30406
URL:https://github.com/W01fh4cker/CVE-2025-30406
标签:#CVE-2025
GitHub
GitHub - W01fh4cker/CVE-2025-30406: Exploit for CVE-2025-30406
Exploit for CVE-2025-30406. Contribute to W01fh4cker/CVE-2025-30406 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025042408ugzb3zcr834i9igk1hvv30
URL:https://github.com/static-web-apps-testing-org/swa2025042408ugzb3zcr834i9igk1hvv30
标签:#hvv
更新了:hvv
描述:swa2025042408ugzb3zcr834i9igk1hvv30
URL:https://github.com/static-web-apps-testing-org/swa2025042408ugzb3zcr834i9igk1hvv30
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa2025042408ugzb3zcr834i9igk1hvv30: swa2025042408ugzb3zcr834i9igk1hvv30
swa2025042408ugzb3zcr834i9igk1hvv30. Contribute to static-web-apps-testing-org/swa2025042408ugzb3zcr834i9igk1hvv30 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Official Nuclei template for CVE-2025-31161 (formerly CVE-2025-2825)
URL:https://github.com/SUPRAAA-1337/Nuclei_CVE-2025-31161_CVE-2025-2825
标签:#CVE-2025
更新了:CVE-2025
描述:Official Nuclei template for CVE-2025-31161 (formerly CVE-2025-2825)
URL:https://github.com/SUPRAAA-1337/Nuclei_CVE-2025-31161_CVE-2025-2825
标签:#CVE-2025
GitHub
GitHub - SUPRAAA-1337/Nuclei_CVE-2025-31161_CVE-2025-2825: Official Nuclei template for CVE-2025-31161 (formerly CVE-2025-2825)
Official Nuclei template for CVE-2025-31161 (formerly CVE-2025-2825) - SUPRAAA-1337/Nuclei_CVE-2025-31161_CVE-2025-2825