GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770
URL:https://github.com/grupooruss/CVE-2025-53770-Checker
标签:#CVE-2025
更新了:CVE-2025
描述:Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770
URL:https://github.com/grupooruss/CVE-2025-53770-Checker
标签:#CVE-2025
GitHub
GitHub - grupooruss/CVE-2025-53770-Checker: Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770
Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770 - grupooruss/CVE-2025-53770-Checker
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection
URL:https://github.com/00xCanelo/CVE-2025-27591-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection
URL:https://github.com/00xCanelo/CVE-2025-27591-PoC
标签:#CVE-2025
GitHub
GitHub - 00xCanelo/CVE-2025-27591: 🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below…
🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection - 00xCanelo/CVE-2025-27591
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25014
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-25014
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25014
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-25014
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-25014: CVE-2025-25014
CVE-2025-25014. Contribute to B1ack4sh/Blackash-CVE-2025-25014 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution.
URL:https://github.com/byteReaper77/CVE-2025-47917
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution.
URL:https://github.com/byteReaper77/CVE-2025-47917
标签:#CVE-2025
GitHub
GitHub - byteReaper77/CVE-2025-47917: PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution.
PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution. - byteReaper77/CVE-2025-47917
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32463
URL:https://github.com/ChetanKomal/sudo_exploit
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32463
URL:https://github.com/ChetanKomal/sudo_exploit
标签:#CVE-2025
GitHub
GitHub - ChetanKomal/sudo_exploit: CVE-2025-32463
CVE-2025-32463. Contribute to ChetanKomal/sudo_exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:GitLabRCECVE-2021-22205Tool
URL:https://github.com/whiex/GitLabRCECVE-2021-22205Tool
标签:#RCE
更新了:RCE
描述:GitLabRCECVE-2021-22205Tool
URL:https://github.com/whiex/GitLabRCECVE-2021-22205Tool
标签:#RCE
GitHub
GitHub - whiex/GitLabRCECVE-2021-22205Tool: GitLabRCECVE-2021-22205Tool
GitLabRCECVE-2021-22205Tool. Contribute to whiex/GitLabRCECVE-2021-22205Tool development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A critical zero-auth RCE vulnerability in SharePoint (CVE-2025-53770), now exploited in the wild, building directly on the spoofing flaw CVE-2025-49706.
URL:https://github.com/AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:A critical zero-auth RCE vulnerability in SharePoint (CVE-2025-53770), now exploited in the wild, building directly on the spoofing flaw CVE-2025-49706.
URL:https://github.com/AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE
标签:#CVE-2025
GitHub
GitHub - AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE: A critical zero-auth RCE vulnerability…
A critical zero-auth RCE vulnerability in SharePoint (CVE-2025-53770), now exploited in the wild, building directly on the spoofing flaw CVE-2025-49706. - AdityaBhatt3010/CVE-2025-53770-SharePoint-...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x
URL:https://github.com/Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass
标签:#CVE-2025
更新了:CVE-2025
描述:Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x
URL:https://github.com/Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass
标签:#CVE-2025
GitHub
GitHub - Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass: Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x
Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x - Shivshantp/CVE-2025-2825-CrushFTP-AuthBypass
GitHub监控消息提醒!!!
更新了:反序列化
描述:C++20协程和基于io_uringの百万并发服务器; 可异步读写, 支持Transfer-Encoding分块编码传输文件, 支持断点续传; 基于压缩前缀树编写的路由, 支持通配符解析;+ http/https/websocket、socks5代理、Json无宏反射(支持序列化与反序列化)
URL:https://github.com/HengXin666/HXLibs
标签:#反序列化
更新了:反序列化
描述:C++20协程和基于io_uringの百万并发服务器; 可异步读写, 支持Transfer-Encoding分块编码传输文件, 支持断点续传; 基于压缩前缀树编写的路由, 支持通配符解析;+ http/https/websocket、socks5代理、Json无宏反射(支持序列化与反序列化)
URL:https://github.com/HengXin666/HXLibs
标签:#反序列化
GitHub
GitHub - HengXin666/HXLibs: 现代C++20协程编写的基于io_uring/iocp百万并发HTTP服务器; 可异步读写, 支持分块编码传输文件, 支持断点续传; http/websocket、客户端socks5代理、JSON…
现代C++20协程编写的基于io_uring/iocp百万并发HTTP服务器; 可异步读写, 支持分块编码传输文件, 支持断点续传; http/websocket、客户端socks5代理、JSON解析、聚合类无宏反射/宏反射支持别名 - HengXin666/HXLibs
GitHub监控消息提醒!!!
更新了:蓝队
描述:HW蓝队溯源工具,可以快速处理IP信息、威胁情报、基本信息查询、贴吧信息查询、确认攻击者是否从事安全行业。
URL:https://github.com/Di-duo/TrackAttacker
标签:#蓝队
更新了:蓝队
描述:HW蓝队溯源工具,可以快速处理IP信息、威胁情报、基本信息查询、贴吧信息查询、确认攻击者是否从事安全行业。
URL:https://github.com/Di-duo/TrackAttacker
标签:#蓝队
GitHub
GitHub - Di-duo/TrackAttacker: HW蓝队溯源工具,可以快速处理IP信息、威胁情报、基本信息查询、贴吧信息查询、确认攻击者是否从事安全行业。
HW蓝队溯源工具,可以快速处理IP信息、威胁情报、基本信息查询、贴吧信息查询、确认攻击者是否从事安全行业。 - Di-duo/TrackAttacker
GitHub监控消息提醒!!!
更新了:bypass av
描述:BypassAV 是一款小型免杀辅助工具,旨在帮助渗透人员应对主流杀软。
URL:https://github.com/Taowmw/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
标签:#bypass av
更新了:bypass av
描述:BypassAV 是一款小型免杀辅助工具,旨在帮助渗透人员应对主流杀软。
URL:https://github.com/Taowmw/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
标签:#bypass av
GitHub监控消息提醒!!!
更新了:Red Team
描述:Group project with the Build Red Team and HackTheHood
URL:https://github.com/Yajham/ShellCode-Encrypt-Tool-Xor-Aes-Fud-Stable
标签:#Red Team
更新了:Red Team
描述:Group project with the Build Red Team and HackTheHood
URL:https://github.com/Yajham/ShellCode-Encrypt-Tool-Xor-Aes-Fud-Stable
标签:#Red Team
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:多线程路径爆破,漏洞检测,生成报告自动打包为ZIP文件
URL:https://github.com/xiaoshao798/web-
标签:#漏洞检测
更新了:漏洞检测
描述:多线程路径爆破,漏洞检测,生成报告自动打包为ZIP文件
URL:https://github.com/xiaoshao798/web-
标签:#漏洞检测
GitHub
GitHub - xiaoshao798/web-: 多线程路径爆破,漏洞检测,生成报告自动打包为ZIP文件
多线程路径爆破,漏洞检测,生成报告自动打包为ZIP文件. Contribute to xiaoshao798/web- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:burp
描述:burp
URL:https://github.com/SibghaMursaleen/api-hardening-internshipTask
标签:#burp
更新了:burp
描述:burp
URL:https://github.com/SibghaMursaleen/api-hardening-internshipTask
标签:#burp
GitHub
GitHub - SibghaMursaleen/api-hardening-internshipTask: DVWA (Damn Vulnerable Web App) was used in this internship to perform ethical…
DVWA (Damn Vulnerable Web App) was used in this internship to perform ethical hacking and security audits. Tools like Nmap, Nikto, SQLMap, Burp Suite, and Metasploit were used to test for SQLi, CSR...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Python-based reconnaissance scanner for safely identifying potential exposure to SharePoint vulnerability CVE-2025-53770.
URL:https://github.com/Sec-Dan/CVE-2025-53770-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:A Python-based reconnaissance scanner for safely identifying potential exposure to SharePoint vulnerability CVE-2025-53770.
URL:https://github.com/Sec-Dan/CVE-2025-53770-Scanner
标签:#CVE-2025
GitHub
GitHub - Sec-Dan/CVE-2025-53770-Scanner: A Python-based reconnaissance scanner for safely identifying potential exposure to SharePoint…
A Python-based reconnaissance scanner for safely identifying potential exposure to SharePoint vulnerability CVE-2025-53770. - Sec-Dan/CVE-2025-53770-Scanner