GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-48384 PoC
URL:https://github.com/IK-20211125/CVE-2025-48384
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-48384 PoC
URL:https://github.com/IK-20211125/CVE-2025-48384
标签:#CVE-2025
GitHub
GitHub - IK-20211125/CVE-2025-48384: CVE-2025-48384 PoC
CVE-2025-48384 PoC. Contribute to IK-20211125/CVE-2025-48384 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:攻防
描述:全球AI攻防挑战赛—赛道一:大模型生图安全疫苗注入 Top10 方案
URL:https://github.com/Gaotianhong/AIOffDef
标签:#攻防
更新了:攻防
描述:全球AI攻防挑战赛—赛道一:大模型生图安全疫苗注入 Top10 方案
URL:https://github.com/Gaotianhong/AIOffDef
标签:#攻防
GitHub
GitHub - Gaotianhong/AIOffDef: 全球AI攻防挑战赛—赛道一:大模型生图安全疫苗注入 Top10 方案
全球AI攻防挑战赛—赛道一:大模型生图安全疫苗注入 Top10 方案. Contribute to Gaotianhong/AIOffDef development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:WordPress Simple File List Unauthenticated RCE Exploit
URL:https://github.com/0xgh057r3c0n/CVE-2025-34085
标签:#CVE-2025
更新了:CVE-2025
描述:WordPress Simple File List Unauthenticated RCE Exploit
URL:https://github.com/0xgh057r3c0n/CVE-2025-34085
标签:#CVE-2025
GitHub
GitHub - 0xgh057r3c0n/CVE-2025-34085: WordPress Simple File List Unauthenticated RCE Exploit
WordPress Simple File List Unauthenticated RCE Exploit - 0xgh057r3c0n/CVE-2025-34085
GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试工具箱,目前正在制作当中,先做了个草稿,计划是整合比较好用的几个工具
URL:https://github.com/YaYAdmin123/-
标签:#渗透测试
更新了:渗透测试
描述:渗透测试工具箱,目前正在制作当中,先做了个草稿,计划是整合比较好用的几个工具
URL:https://github.com/YaYAdmin123/-
标签:#渗透测试
GitHub
YaYAdmin123/-
渗透测试工具箱,目前正在制作当中,先做了个草稿,计划是整合比较好用的几个工具. Contribute to YaYAdmin123/- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53770
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53770
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-53770: CVE-2025-53770
CVE-2025-53770. Contribute to B1ack4sh/Blackash-CVE-2025-53770 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypassav
描述:BypassAV 是一款小型免杀辅助工具,旨在帮助渗透人员应对主流杀软。
URL:https://github.com/littleleeks/BypassAv
标签:#bypassav
更新了:bypassav
描述:BypassAV 是一款小型免杀辅助工具,旨在帮助渗透人员应对主流杀软。
URL:https://github.com/littleleeks/BypassAv
标签:#bypassav
GitHub
GitHub - littleleeks/BypassAv: BypassAV 是一款小型免杀辅助工具,旨在帮助渗透人员应对主流杀软。
BypassAV 是一款小型免杀辅助工具,旨在帮助渗透人员应对主流杀软。. Contribute to littleleeks/BypassAv development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-48384 PoC
URL:https://github.com/RukshanaAlikhan/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-48384 PoC
URL:https://github.com/RukshanaAlikhan/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - RukshanaAlikhan/CVE-2025-53770: A critical zero-day vulnerability CVE‑2025‑53770 has been actively exploited in the wild…
A critical zero-day vulnerability CVE‑2025‑53770 has been actively exploited in the wild against on-premises Microsoft SharePoint Server. Dubbed "ToolShell," this exploit leverag...
GitHub监控消息提醒!!!
更新了:代码审计
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/huaimeng666/URLFinder
标签:#代码审计
更新了:代码审计
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/huaimeng666/URLFinder
标签:#代码审计
GitHub
huaimeng666/URLFinder
URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。 - huaimeng666/URLFinder
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This PowerShell script detects indicators of compromise for CVE-2025-53770 — a critical RCE vulnerability in Microsoft SharePoint. Created by @n1chr0x and @BlackRazer67
URL:https://github.com/n1chr0x/Zeropoint
标签:#CVE-2025
更新了:CVE-2025
描述:This PowerShell script detects indicators of compromise for CVE-2025-53770 — a critical RCE vulnerability in Microsoft SharePoint. Created by @n1chr0x and @BlackRazer67
URL:https://github.com/n1chr0x/Zeropoint
标签:#CVE-2025
GitHub
GitHub - n1chr0x/Zeropoint: This PowerShell script detects indicators of compromise for CVE-2025-53770 — a critical RCE vulnerability…
This PowerShell script detects indicators of compromise for CVE-2025-53770 — a critical RCE vulnerability in Microsoft SharePoint. Created by @n1chr0x and @BlackRazer67 - n1chr0x/Zeropoint
GitHub监控消息提醒!!!
更新了:渗透测试
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/huaimeng666/finger
标签:#渗透测试
更新了:渗透测试
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/huaimeng666/finger
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:护网
描述:市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
URL:https://github.com/161485936Bat/SpeedLiberator
标签:#护网
更新了:护网
描述:市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
URL:https://github.com/161485936Bat/SpeedLiberator
标签:#护网
GitHub
GitHub - Bat-HaibaraAI/SpeedLiberator: 市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课). Contribute to Bat-HaibaraAI/SpeedLiberator development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:护网
描述:市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
URL:https://github.com/Bat-HaibaraAI/SpeedLiberator
标签:#护网
更新了:护网
描述:市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
URL:https://github.com/Bat-HaibaraAI/SpeedLiberator
标签:#护网
GitHub
GitHub - Bat-HaibaraAI/SpeedLiberator: 市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课)
市面最强的视频播放防护绕过加速工具(灵感来自该死的假期网课). Contribute to Bat-HaibaraAI/SpeedLiberator development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detects unauthenticated POST requests to ToolPane.aspx with a SignOut.aspx referer, observed in exploitation of CVE-2025-53770 against SharePoint
URL:https://github.com/aazamil/SharePoint-ToolShell-Detection
标签:#CVE-2025
更新了:CVE-2025
描述:Detects unauthenticated POST requests to ToolPane.aspx with a SignOut.aspx referer, observed in exploitation of CVE-2025-53770 against SharePoint
URL:https://github.com/aazamil/SharePoint-ToolShell-Detection
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A comprehensive security monitoring solution for SharePoint Server with specific protection against CVE-2025-53770 and other threats
URL:https://github.com/paolokappa/SharePointSecurityMonitor
标签:#CVE-2025
更新了:CVE-2025
描述:A comprehensive security monitoring solution for SharePoint Server with specific protection against CVE-2025-53770 and other threats
URL:https://github.com/paolokappa/SharePointSecurityMonitor
标签:#CVE-2025
GitHub
GitHub - paolokappa/SharePointSecurityMonitor: A comprehensive security monitoring solution for SharePoint Server with specific…
A comprehensive security monitoring solution for SharePoint Server with specific protection against CVE-2025-53770 and other threats - paolokappa/SharePointSecurityMonitor
GitHub监控消息提醒!!!
更新了:RCE
描述:vulnerable app SQLi, XSS, RCE
URL:https://github.com/m-carneiro/owaspinho
标签:#RCE
更新了:RCE
描述:vulnerable app SQLi, XSS, RCE
URL:https://github.com/m-carneiro/owaspinho
标签:#RCE
GitHub
GitHub - m-carneiro/owaspinho: vulnerable app
vulnerable app. Contribute to m-carneiro/owaspinho development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Scanner for the SharePoint CVE-2025-53770 zero day vulnerability.
URL:https://github.com/hazcod/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:Scanner for the SharePoint CVE-2025-53770 zero day vulnerability.
URL:https://github.com/hazcod/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - hazcod/CVE-2025-53770: Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability.
Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability. - hazcod/CVE-2025-53770
GitHub监控消息提醒!!!
更新了:getshell
描述:This is a Compilation of ueditor exps like file upload 、xss 、ssrf 、getshell
URL:https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance
标签:#getshell
更新了:getshell
描述:This is a Compilation of ueditor exps like file upload 、xss 、ssrf 、getshell
URL:https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance
标签:#getshell
GitHub
GitHub - peiqiF4ck/WebFrameworkTools-5.5-enhance: 本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getsh…
本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getshell。批量自动化测试。例如:Thinkphp,Struts2,weblogic。出现的最新漏洞进行实时跟踪并且更新例如:log4jRCE,向日葵 禅道RCE 瑞友天翼应用虚拟化系统sql注入导致RCE大华智慧园区上传,金蝶云星空漏洞等等. ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-6019
URL:https://github.com/dreysanox/CVE-2025-6018_Poc
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-6019
URL:https://github.com/dreysanox/CVE-2025-6018_Poc
标签:#CVE-2025
GitHub
GitHub - dreysanox/CVE-2025-6018_Poc: Exploit for CVE-2025-6019
Exploit for CVE-2025-6019. Contribute to dreysanox/CVE-2025-6018_Poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:ToolShell scanner - CVE-2025-53770
URL:https://github.com/ZephrFish/CVE-2025-53770-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:ToolShell scanner - CVE-2025-53770
URL:https://github.com/ZephrFish/CVE-2025-53770-Scanner
标签:#CVE-2025
GitHub
GitHub - ZephrFish/CVE-2025-53770-Scanner: ToolShell scanner - CVE-2025-53770 and detection information
ToolShell scanner - CVE-2025-53770 and detection information - ZephrFish/CVE-2025-53770-Scanner