GitHub监控消息提醒!!!
更新了:渗透测试
描述:Save Multiple URLs 是一款专为渗透测试人员设计的浏览器插件,用于一键记录当前浏览器中打开的所有页面 URL。支持复制到剪贴板或导出为 .txt 文件,帮助你在测试过程中快速保存目标站点,提升工作效率。
URL:https://github.com/exp3n5ive/Save-Multiple-URLs
标签:#渗透测试
更新了:渗透测试
描述:Save Multiple URLs 是一款专为渗透测试人员设计的浏览器插件,用于一键记录当前浏览器中打开的所有页面 URL。支持复制到剪贴板或导出为 .txt 文件,帮助你在测试过程中快速保存目标站点,提升工作效率。
URL:https://github.com/exp3n5ive/Save-Multiple-URLs
标签:#渗透测试
GitHub
GitHub - exp3n5ive/Save-Multiple-URLs: Save Multiple URLs 是一款专为渗透测试人员设计的浏览器插件,用于一键记录当前浏览器中打开的所有页面 URL。支持复制到剪贴板或导出为 .txt 文件,帮助你…
Save Multiple URLs 是一款专为渗透测试人员设计的浏览器插件,用于一键记录当前浏览器中打开的所有页面 URL。支持复制到剪贴板或导出为 .txt 文件,帮助你在测试过程中快速保存目标站点,提升工作效率。 - exp3n5ive/Save-Multiple-URLs
GitHub监控消息提醒!!!
更新了:RCE
描述:A front-end replica of the UET RCET official website, built with HTML, CSS, and JavaScript, showcasing academic sections, department layouts, and responsive design.
URL:https://github.com/AbdulAhad56/UET-RCET-Website
标签:#RCE
更新了:RCE
描述:A front-end replica of the UET RCET official website, built with HTML, CSS, and JavaScript, showcasing academic sections, department layouts, and responsive design.
URL:https://github.com/AbdulAhad56/UET-RCET-Website
标签:#RCE
GitHub
GitHub - AbdulAhad56/UET-RCET-Website: A front-end replica of the UET RCET official website, built with HTML, CSS, and JavaScript…
A front-end replica of the UET RCET official website, built with HTML, CSS, and JavaScript, showcasing academic sections, department layouts, and responsive design. - AbdulAhad56/UET-RCET-Website
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:C PoC language for emulating path traversal vulnerability (CVE-2025-5964) in M-Files25.6.14925.0
URL:https://github.com/byteReaper77/CVE-2025-5964-
标签:#CVE-2025
更新了:CVE-2025
描述:C PoC language for emulating path traversal vulnerability (CVE-2025-5964) in M-Files25.6.14925.0
URL:https://github.com/byteReaper77/CVE-2025-5964-
标签:#CVE-2025
GitHub
GitHub - byteReaper77/CVE-2025-5964-: C PoC language for emulating path traversal vulnerability (CVE-2025-5964) in M-Files25.6.14925.0
C PoC language for emulating path traversal vulnerability (CVE-2025-5964) in M-Files25.6.14925.0 - byteReaper77/CVE-2025-5964-
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-3248 Langflow RCE Exploit
URL:https://github.com/ynsmroztas/CVE-2025-3248-Langflow-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-3248 Langflow RCE Exploit
URL:https://github.com/ynsmroztas/CVE-2025-3248-Langflow-RCE
标签:#CVE-2025
GitHub
GitHub - ynsmroztas/CVE-2025-3248-Langflow-RCE: CVE-2025-3248 Langflow RCE Exploit
CVE-2025-3248 Langflow RCE Exploit. Contribute to ynsmroztas/CVE-2025-3248-Langflow-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-3248 Langflow RCE Exploit
URL:https://github.com/tinopreter/DocViewerExploitApp
标签:#RCE
更新了:RCE
描述:CVE-2025-3248 Langflow RCE Exploit
URL:https://github.com/tinopreter/DocViewerExploitApp
标签:#RCE
GitHub
GitHub - tinopreter/DocViewerExploitApp: This is an Exploit App I made when solving the DocumentViewer challenge (CVE-2021-40724)…
This is an Exploit App I made when solving the DocumentViewer challenge (CVE-2021-40724) from MobileHackingLab. It will download a libdocviewe_pro.so library from your local machine unto the vulner...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Escaner para encontrar vulnerabilidad CVE-2025-4123 grafana
URL:https://github.com/DesDoTvl/CVE-2025-4123grafana
标签:#CVE-2025
更新了:CVE-2025
描述:Escaner para encontrar vulnerabilidad CVE-2025-4123 grafana
URL:https://github.com/DesDoTvl/CVE-2025-4123grafana
标签:#CVE-2025
GitHub
GitHub - DesDoTvl/CVE-2025-4123grafana: Escaner para encontrar vulnerabilidad CVE-2025-4123 grafana
Escaner para encontrar vulnerabilidad CVE-2025-4123 grafana - DesDoTvl/CVE-2025-4123grafana
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49113
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-49113
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49113
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-49113
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-49113: CVE-2025-49113
CVE-2025-49113. Contribute to B1ack4sh/Blackash-CVE-2025-49113 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE proof of concept regarding the CVE-2025-45620 vulnerabillity.
URL:https://github.com/weedl/CVE-2025-45620
标签:#CVE-2025
更新了:CVE-2025
描述:CVE proof of concept regarding the CVE-2025-45620 vulnerabillity.
URL:https://github.com/weedl/CVE-2025-45620
标签:#CVE-2025
GitHub
GitHub - weedl/CVE-2025-45620
Contribute to weedl/CVE-2025-45620 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: CVE-2025-0133 GlobalProtect XSS
URL:https://github.com/ynsmroztas/-CVE-2025-0133-GlobalProtect-XSS
标签:#CVE-2025
更新了:CVE-2025
描述: CVE-2025-0133 GlobalProtect XSS
URL:https://github.com/ynsmroztas/-CVE-2025-0133-GlobalProtect-XSS
标签:#CVE-2025
GitHub
GitHub - ynsmroztas/-CVE-2025-0133-GlobalProtect-XSS: CVE-2025-0133 GlobalProtect XSS
CVE-2025-0133 GlobalProtect XSS. Contribute to ynsmroztas/-CVE-2025-0133-GlobalProtect-XSS development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:应急响应课设(AI审计+日志筛选)---纯水用需要自取
URL:https://github.com/LiChaser/AI_search
标签:#应急响应
更新了:应急响应
描述:应急响应课设(AI审计+日志筛选)---纯水用需要自取
URL:https://github.com/LiChaser/AI_search
标签:#应急响应
GitHub
GitHub - LiChaser/AI_search: 应急响应课设(AI审计+日志筛选)---纯水用需要自取
应急响应课设(AI审计+日志筛选)---纯水用需要自取. Contribute to LiChaser/AI_search development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-33053 Checker and PoC
URL:https://github.com/TheTorjanCaptain/CVE-2025-33053-Checker-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-33053 Checker and PoC
URL:https://github.com/TheTorjanCaptain/CVE-2025-33053-Checker-PoC
标签:#CVE-2025
GitHub
GitHub - TheTorjanCaptain/CVE-2025-33053-Checker-PoC: CVE-2025-33053 Checker and PoC
CVE-2025-33053 Checker and PoC. Contribute to TheTorjanCaptain/CVE-2025-33053-Checker-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible
URL:https://github.com/NtDallas/MemLoader
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible
URL:https://github.com/NtDallas/MemLoader
标签:#Cobalt Strike
GitHub
GitHub - NtDallas/MemLoader: Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain…
Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible - NtDallas/MemLoader
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:SAP NetWeaver Visual Composer Metadata Uploader 7.50 CVE-2025-31324 PoC
URL:https://github.com/sug4r-wr41th/CVE-2025-31324
标签:#CVE-2025
更新了:CVE-2025
描述:SAP NetWeaver Visual Composer Metadata Uploader 7.50 CVE-2025-31324 PoC
URL:https://github.com/sug4r-wr41th/CVE-2025-31324
标签:#CVE-2025
GitHub
GitHub - sug4r-wr41th/CVE-2025-31324: SAP NetWeaver Visual Composer Metadata Uploader <= 7.50 CVE-2025-31324 PoC
SAP NetWeaver Visual Composer Metadata Uploader <= 7.50 CVE-2025-31324 PoC - sug4r-wr41th/CVE-2025-31324
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-44203 - HotelDruid 3.0.0/3.0.7 - Sensitive Information Disclosure, DoS
URL:https://github.com/IvanT7D3/CVE-2025-44203
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-44203 - HotelDruid 3.0.0/3.0.7 - Sensitive Information Disclosure, DoS
URL:https://github.com/IvanT7D3/CVE-2025-44203
标签:#CVE-2025
GitHub
GitHub - IvanT7D3/CVE-2025-44203: CVE-2025-44203 - HotelDruid 3.0.0/3.0.7 - Sensitive Information Disclosure, DoS
CVE-2025-44203 - HotelDruid 3.0.0/3.0.7 - Sensitive Information Disclosure, DoS - IvanT7D3/CVE-2025-44203
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-3248 — Langflow RCE Exploit
URL:https://github.com/zapstiko/CVE-2025-3248
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-3248 — Langflow RCE Exploit
URL:https://github.com/zapstiko/CVE-2025-3248
标签:#CVE-2025
GitHub
GitHub - zapstiko/CVE-2025-3248: CVE-2025-3248 — Langflow RCE Exploit
CVE-2025-3248 — Langflow RCE Exploit. Contribute to zapstiko/CVE-2025-3248 development by creating an account on GitHub.
一觉醒来频道炸了一堆,心态炸裂。加之长期以来的高强度运营与服务器资源的持续消耗,当前收入已不足以支撑运营成本。此频道需要全天监控,占用服务器资源过多,且各位师傅活跃度不高、互动频率有限。后续可能会停止更新计划,或转型为其他内容形式,以更合理地配置资源。
👍2
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/aliiiiii404-Git/Design-of-Corridor-Lighting-System-Based-on-STM32F103
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/aliiiiii404-Git/Design-of-Corridor-Lighting-System-Based-on-STM32F103
标签:#护网
GitHub
GitHub - aliiiiii404-Git/Design-of-Corridor-Lighting-System-Based-on-STM32F103: 基于keil,完成的综合嵌入式开发项目功能包括1、集成光照传感器,通过STM32进行环境光照…
基于keil,完成的综合嵌入式开发项目功能包括1、集成光照传感器,通过STM32进行环境光照的监测,实时调整楼道灯光亮度,提高能效。 2、设计人体感应系统,通过STM32实现对楼道内人体的检测,实现自动开关灯功能,提高能效,降低能源消耗。 3、集成时钟模块,通过STM32实现楼道照明的时间控制,例如夜间自动降低亮度,白天自动关闭,提高能效。 4、集成远程控制功能,居民或物业管理人员可以通过网...