GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Unauthenticated Python PoC for CVE-2025-20281 RCE against Cisco ISE ERS API
URL:https://github.com/abrewer251/CVE-2025-20281-2-Citrix-ISE-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:Unauthenticated Python PoC for CVE-2025-20281 RCE against Cisco ISE ERS API
URL:https://github.com/abrewer251/CVE-2025-20281-2-Citrix-ISE-RCE
标签:#CVE-2025
GitHub
GitHub - abrewer251/CVE-2025-20281-2-Cisco-ISE-RCE: Unauthenticated Python PoC for CVE-2025-20281 RCE against ISE ERS API
Unauthenticated Python PoC for CVE-2025-20281 RCE against ISE ERS API - abrewer251/CVE-2025-20281-2-Cisco-ISE-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Discover the CVE-2025-49144 vulnerability in Notepad++ installers. This PoC highlights local privilege escalation risks. 🛠️🔍
URL:https://github.com/65-75-65-83-72/65-75-65-83-72.github.io
标签:#CVE-2025
更新了:CVE-2025
描述:Discover the CVE-2025-49144 vulnerability in Notepad++ installers. This PoC highlights local privilege escalation risks. 🛠️🔍
URL:https://github.com/65-75-65-83-72/65-75-65-83-72.github.io
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Discover CVE-2025-49144, a local privilege escalation flaw in Notepad++ installers. Learn how attackers exploit this vulnerability. 🐙🔍
URL:https://github.com/65-75-65-83-72/CVE-2025-49144_PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Discover CVE-2025-49144, a local privilege escalation flaw in Notepad++ installers. Learn how attackers exploit this vulnerability. 🐙🔍
URL:https://github.com/65-75-65-83-72/CVE-2025-49144_PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:A PoC exploit for CVE-2017-9841 - PHPUnit Remote Code Execution(RCE)
URL:https://github.com/K3ysTr0K3R/CVE-2017-9841-EXPLOIT
标签:#RCE
更新了:RCE
描述:A PoC exploit for CVE-2017-9841 - PHPUnit Remote Code Execution(RCE)
URL:https://github.com/K3ysTr0K3R/CVE-2017-9841-EXPLOIT
标签:#RCE
GitHub
GitHub - K3ysTr0K3R/CVE-2017-9841-EXPLOIT: A PoC exploit for CVE-2017-9841 - PHPUnit Remote Code Execution(RCE)
A PoC exploit for CVE-2017-9841 - PHPUnit Remote Code Execution(RCE) - K3ysTr0K3R/CVE-2017-9841-EXPLOIT
GitHub监控消息提醒!!!
更新了:RCE
描述:Universal RCE Protection for SA:MP using #TE SDK
URL:https://github.com/WaterinoS/rce_protection
标签:#RCE
更新了:RCE
描述:Universal RCE Protection for SA:MP using #TE SDK
URL:https://github.com/WaterinoS/rce_protection
标签:#RCE
GitHub
GitHub - WaterinoS/rce_protection: Universal RCE Protection for SA:MP using #TE SDK
Universal RCE Protection for SA:MP using #TE SDK. Contribute to WaterinoS/rce_protection development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:项目初始化:订阅kafka消息,根据消息中的文件目录寻找对应文件后对文件进行反序列化然后写入es.
URL:https://github.com/Arvinshu/EIS
标签:#反序列化
更新了:反序列化
描述:项目初始化:订阅kafka消息,根据消息中的文件目录寻找对应文件后对文件进行反序列化然后写入es.
URL:https://github.com/Arvinshu/EIS
标签:#反序列化
GitHub
GitHub - Arvinshu/EIS: 项目初始化:订阅kafka消息,根据消息中的文件目录寻找对应文件后对文件进行反序列化然后写入es.
项目初始化:订阅kafka消息,根据消息中的文件目录寻找对应文件后对文件进行反序列化然后写入es. Contribute to Arvinshu/EIS development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:(CVE-2022-22965)PoC 应用程序和漏洞利用
URL:https://github.com/ZapcoMan/spring4shell-vulnerable-application
标签:#漏洞利用
更新了:漏洞利用
描述:(CVE-2022-22965)PoC 应用程序和漏洞利用
URL:https://github.com/ZapcoMan/spring4shell-vulnerable-application
标签:#漏洞利用
GitHub
GitHub - ZapcoMan/spring4shell-vulnerable-application: (CVE-2022-22965)PoC 应用程序和漏洞利用
(CVE-2022-22965)PoC 应用程序和漏洞利用. Contribute to ZapcoMan/spring4shell-vulnerable-application development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept (PoC) that exploits the CVE-2025-49144 vulnerability in the Notepad++ 8.8.1 installer.
URL:https://github.com/b0ySie7e/Notepad-8.8.1_CVE-2025-49144
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept (PoC) that exploits the CVE-2025-49144 vulnerability in the Notepad++ 8.8.1 installer.
URL:https://github.com/b0ySie7e/Notepad-8.8.1_CVE-2025-49144
标签:#CVE-2025
GitHub
GitHub - b0ySie7e/Notepad-8.8.1_CVE-2025-49144: Proof of Concept (PoC) that exploits the CVE-2025-49144 vulnerability in the Notepad++…
Proof of Concept (PoC) that exploits the CVE-2025-49144 vulnerability in the Notepad++ 8.8.1 installer. - GitHub - b0ySie7e/Notepad-8.8.1_CVE-2025-49144: Proof of Concept (PoC) that exploits the C...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A simple proof of concept for WinRAR Path Traversal | RCE | CVE-2025-6218
URL:https://github.com/ignis-sec/CVE-2025-6218
标签:#CVE-2025
更新了:CVE-2025
描述:A simple proof of concept for WinRAR Path Traversal | RCE | CVE-2025-6218
URL:https://github.com/ignis-sec/CVE-2025-6218
标签:#CVE-2025
GitHub
GitHub - ignis-sec/CVE-2025-6218: A simple proof of concept for WinRAR Path Traversal | RCE | CVE-2025-6218
A simple proof of concept for WinRAR Path Traversal | RCE | CVE-2025-6218 - ignis-sec/CVE-2025-6218
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Reproduce CVE-2022-32250 and CVE-2025-21756 by tampering with modprobe_path and hijacking control flow, respectively.
URL:https://github.com/KuanKuanQAQ/cve-testing
标签:#CVE-2025
更新了:CVE-2025
描述:Reproduce CVE-2022-32250 and CVE-2025-21756 by tampering with modprobe_path and hijacking control flow, respectively.
URL:https://github.com/KuanKuanQAQ/cve-testing
标签:#CVE-2025
GitHub
GitHub - KuanKuanQAQ/cve-testing: Reproduce CVE-2022-32250 and CVE-2025-21756 by tampering with modprobe_path and hijacking control…
Reproduce CVE-2022-32250 and CVE-2025-21756 by tampering with modprobe_path and hijacking control flow, respectively. - KuanKuanQAQ/cve-testing
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:> 🔓 Proof-of-Concept for a fictional Next.js middleware bypass (CVE-2025-29927) — craft sub-requests to test protected routes.
URL:https://github.com/m2hcz/PoC-for-Next.js-Middleware
标签:#CVE-2025
更新了:CVE-2025
描述:> 🔓 Proof-of-Concept for a fictional Next.js middleware bypass (CVE-2025-29927) — craft sub-requests to test protected routes.
URL:https://github.com/m2hcz/PoC-for-Next.js-Middleware
标签:#CVE-2025
GitHub
GitHub - m2hcz/PoC-for-Next.js-Middleware: > 🔓 Proof-of-Concept for a fictional Next.js middleware bypass (CVE-2025-29927) — craft…
> 🔓 Proof-of-Concept for a fictional Next.js middleware bypass (CVE-2025-29927) — craft sub-requests to test protected routes. - m2hcz/PoC-for-Next.js-Middleware
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件
URL:https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
标签:#CVE-2025
更新了:CVE-2025
描述:详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件
URL:https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
标签:#CVE-2025
GitHub
GitHub - mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-: 详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件
详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件. Contribute to mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:一套标准化的数字取证与应急响应信息采集规则格式规范。
URL:https://github.com/Just-Hack-For-Fun/OpenForensicRules
标签:#应急响应
更新了:应急响应
描述:一套标准化的数字取证与应急响应信息采集规则格式规范。
URL:https://github.com/Just-Hack-For-Fun/OpenForensicRules
标签:#应急响应
GitHub
GitHub - Just-Hack-For-Fun/OpenForensicRules: 一套标准化的数字取证与应急响应信息采集规则格式规范。
一套标准化的数字取证与应急响应信息采集规则格式规范。. Contribute to Just-Hack-For-Fun/OpenForensicRules development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC and Setup for CVE-2025-4664
URL:https://github.com/amalmurali47/cve-2025-4664
标签:#CVE-2025
更新了:CVE-2025
描述:PoC and Setup for CVE-2025-4664
URL:https://github.com/amalmurali47/cve-2025-4664
标签:#CVE-2025
GitHub
GitHub - amalmurali47/cve-2025-4664: PoC and Setup for CVE-2025-4664
PoC and Setup for CVE-2025-4664. Contribute to amalmurali47/cve-2025-4664 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows machine
URL:https://github.com/maverick-doan/win-rce-checker
标签:#RCE
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows machine
URL:https://github.com/maverick-doan/win-rce-checker
标签:#RCE
GitHub
GitHub - maverick-doan/win-rce-checker: This is a simple and benign Go script that red teamers can drop and attempt execution to…
This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows machine - maverick-doan/win-rce-checker