GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/globlord/AIstudioProxyAPI
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/globlord/AIstudioProxyAPI
标签:#护网
GitHub
GitHub - globlord/AIstudioProxyAPI: Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容…
Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护 - gl...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: Exploit Erlang/OTP SSH CVE-2025-32433 in a lab setup.
URL:https://github.com/C9b3rD3vi1/Erlang-OTP-SSH-CVE-2025-32433
标签:#CVE-2025
更新了:CVE-2025
描述: Exploit Erlang/OTP SSH CVE-2025-32433 in a lab setup.
URL:https://github.com/C9b3rD3vi1/Erlang-OTP-SSH-CVE-2025-32433
标签:#CVE-2025
GitHub
GitHub - C9b3rD3vi1/Erlang-OTP-SSH-CVE-2025-32433: Exploit Erlang/OTP SSH CVE-2025-32433 in a lab setup.
Exploit Erlang/OTP SSH CVE-2025-32433 in a lab setup. - C9b3rD3vi1/Erlang-OTP-SSH-CVE-2025-32433
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:poc for CVE-2025-24252 & CVE-2025-24132
URL:https://github.com/ekomsSavior/2-poc-s-1-repository
标签:#CVE-2025
更新了:CVE-2025
描述:poc for CVE-2025-24252 & CVE-2025-24132
URL:https://github.com/ekomsSavior/2-poc-s-1-repository
标签:#CVE-2025
GitHub
GitHub - ekomsSavior/AirBorne-PoC: poc for CVE-2025-24252 & CVE-2025-24132
poc for CVE-2025-24252 & CVE-2025-24132. Contribute to ekomsSavior/AirBorne-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:poc for CVE-2025-24252 & CVE-2025-24132
URL:https://github.com/ekomsSavior/2-PoCs-1-repository
标签:#CVE-2025
更新了:CVE-2025
描述:poc for CVE-2025-24252 & CVE-2025-24132
URL:https://github.com/ekomsSavior/2-PoCs-1-repository
标签:#CVE-2025
GitHub
GitHub - ekomsSavior/AirBorne-PoC: poc for CVE-2025-24252 & CVE-2025-24132
poc for CVE-2025-24252 & CVE-2025-24132. Contribute to ekomsSavior/AirBorne-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:poc for CVE-2025-24252 & CVE-2025-24132
URL:https://github.com/ekomsSavior/AirBorne-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:poc for CVE-2025-24252 & CVE-2025-24132
URL:https://github.com/ekomsSavior/AirBorne-PoC
标签:#CVE-2025
GitHub
GitHub - ekomsSavior/AirBorne-PoC: poc for CVE-2025-24252 & CVE-2025-24132
poc for CVE-2025-24252 & CVE-2025-24132. Contribute to ekomsSavior/AirBorne-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POCs for CVE-2025-29775
URL:https://github.com/twypsy/cve-2025-29775
标签:#CVE-2025
更新了:CVE-2025
描述:POCs for CVE-2025-29775
URL:https://github.com/twypsy/cve-2025-29775
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A tool designed to detect the vulnerability **CVE-2025-31650** in Apache Tomcat (versions 10.1.10 to 10.1.39)
URL:https://github.com/absholi7ly/TomcatKiller-CVE-2025-31650
标签:#CVE-2025
更新了:CVE-2025
描述:A tool designed to detect the vulnerability **CVE-2025-31650** in Apache Tomcat (versions 10.1.10 to 10.1.39)
URL:https://github.com/absholi7ly/TomcatKiller-CVE-2025-31650
标签:#CVE-2025
GitHub
GitHub - absholi7ly/TomcatKiller-CVE-2025-31650: A tool designed to detect the vulnerability **CVE-2025-31650** in Apache Tomcat…
A tool designed to detect the vulnerability **CVE-2025-31650** in Apache Tomcat (versions 10.1.10 to 10.1.39) - absholi7ly/TomcatKiller-CVE-2025-31650
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025043006xqdjulgzr4hvvkygbmg94z
URL:https://github.com/static-web-apps-testing-org/swa2025043006xqdjulgzr4hvvkygbmg94z
标签:#hvv
更新了:hvv
描述:swa2025043006xqdjulgzr4hvvkygbmg94z
URL:https://github.com/static-web-apps-testing-org/swa2025043006xqdjulgzr4hvvkygbmg94z
标签:#hvv
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Python-based Burp Suite extension is designed to detect the presence of CVE-2025-31324
URL:https://github.com/BlueOWL-overlord/Burp_CVE-2025-31324
标签:#CVE-2025
更新了:CVE-2025
描述:Python-based Burp Suite extension is designed to detect the presence of CVE-2025-31324
URL:https://github.com/BlueOWL-overlord/Burp_CVE-2025-31324
标签:#CVE-2025
GitHub
GitHub - BlueOWL-overlord/Burp_CVE-2025-31324: Python-based Burp Suite extension is designed to detect the presence of CVE-2025…
Python-based Burp Suite extension is designed to detect the presence of CVE-2025-31324 - BlueOWL-overlord/Burp_CVE-2025-31324
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Tomcat CVE-2025-46701 PoC
URL:https://github.com/gregk4sec/CVE-2025-46701
标签:#CVE-2025
更新了:CVE-2025
描述:Tomcat CVE-2025-46701 PoC
URL:https://github.com/gregk4sec/CVE-2025-46701
标签:#CVE-2025
GitHub
GitHub - gregk4sec/CVE-2025-46701: Tomcat CVE-2025-46701 PoC
Tomcat CVE-2025-46701 PoC. Contribute to gregk4sec/CVE-2025-46701 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Clash Verge rev 本地提权/远程命令执行漏洞 POC
URL:https://github.com/yuziiiiiiiiii/Clash-Verge-RCE-POC
标签:#RCE
更新了:RCE
描述:Clash Verge rev 本地提权/远程命令执行漏洞 POC
URL:https://github.com/yuziiiiiiiiii/Clash-Verge-RCE-POC
标签:#RCE
GitHub
GitHub - yuziiiiiiiiii/Clash-Verge-RCE-POC: Clash Verge rev 本地提权/远程命令执行漏洞 POC
Clash Verge rev 本地提权/远程命令执行漏洞 POC. Contribute to yuziiiiiiiiii/Clash-Verge-RCE-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-31650 PoC
URL:https://github.com/tunahantekeoglu/CVE-2025-31650
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-31650 PoC
URL:https://github.com/tunahantekeoglu/CVE-2025-31650
标签:#CVE-2025
GitHub
GitHub - tunahantekeoglu/CVE-2025-31650: CVE-2025-31650 PoC
CVE-2025-31650 PoC. Contribute to tunahantekeoglu/CVE-2025-31650 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:CTF 应急响应赛用 Linux 自动化应急 SSH 版
URL:https://github.com/IHK-ONE/AutoIR_Remote
标签:#应急响应
更新了:应急响应
描述:CTF 应急响应赛用 Linux 自动化应急 SSH 版
URL:https://github.com/IHK-ONE/AutoIR_Remote
标签:#应急响应
GitHub
GitHub - IHK-ONE/AutoIR_Remote: CTF 应急响应赛用 Linux 自动化应急 SSH 版
CTF 应急响应赛用 Linux 自动化应急 SSH 版. Contribute to IHK-ONE/AutoIR_Remote development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 A simple Bash script to detect malicious JSP webshells, including those used in exploits of SAP NetWeaver CVE-2025-31324.
URL:https://github.com/respondiq/jsp-webshell-scanner
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 A simple Bash script to detect malicious JSP webshells, including those used in exploits of SAP NetWeaver CVE-2025-31324.
URL:https://github.com/respondiq/jsp-webshell-scanner
标签:#CVE-2025
GitHub
GitHub - respondiq/jsp-webshell-scanner: 🔍 A simple Bash script to detect malicious JSP webshells, including those used in exploits…
🔍 A simple Bash script to detect malicious JSP webshells, including those used in exploits of SAP NetWeaver CVE-2025-31324. - respondiq/jsp-webshell-scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Python-based security scanner for identifying the CVE-2025-31324 vulnerability in SAP Visual Composer systems, and detecting known Indicators of Compromise (IOCs) such as malicious .jsp.
URL:https://github.com/JonathanStross/CVE-2025-31324
标签:#CVE-2025
更新了:CVE-2025
描述:A Python-based security scanner for identifying the CVE-2025-31324 vulnerability in SAP Visual Composer systems, and detecting known Indicators of Compromise (IOCs) such as malicious .jsp.
URL:https://github.com/JonathanStross/CVE-2025-31324
标签:#CVE-2025
GitHub
GitHub - JonathanStross/CVE-2025-31324
Contribute to JonathanStross/CVE-2025-31324 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Simulated environment for CVE-2025-20029 using Docker. Includes PoC and auto-reporting.
URL:https://github.com/schoi1337/CVE-2025-20029-simulation
标签:#CVE-2025
更新了:CVE-2025
描述:Simulated environment for CVE-2025-20029 using Docker. Includes PoC and auto-reporting.
URL:https://github.com/schoi1337/CVE-2025-20029-simulation
标签:#CVE-2025
GitHub
GitHub - schoi1337/CVE-2025-20029-simulation: Simulated environment for CVE-2025-20029 using Docker. Includes PoC and auto-reporting.
Simulated environment for CVE-2025-20029 using Docker. Includes PoC and auto-reporting. - schoi1337/CVE-2025-20029-simulation
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
URL:https://github.com/Yuweixn/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
URL:https://github.com/Yuweixn/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
GitHub
Unauthenticated Remote Code Execution in Erlang/OTP SSH
### Summary
A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SS...
A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SS...
👍1
GitHub监控消息提醒!!!
更新了:RCE
描述:Patches the RCE Exploit in XWorm
URL:https://github.com/Caztemaz/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
标签:#RCE
更新了:RCE
描述:Patches the RCE Exploit in XWorm
URL:https://github.com/Caztemaz/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
标签:#RCE
GitHub
GitHub - Caztemaz/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud: Exploit development targets vulnerabilities like CVE-2025…
Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CV...