GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-6018 Poc and Exploit
URL:https://github.com/ibrahmsql/CVE-2025-6018-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-6018 Poc and Exploit
URL:https://github.com/ibrahmsql/CVE-2025-6018-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-6018 Poc and Exploit
URL:https://github.com/ibrahmsql/CVE-2025-6018
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-6018 Poc and Exploit
URL:https://github.com/ibrahmsql/CVE-2025-6018
标签:#CVE-2025
GitHub
GitHub - ibrahmsql/CVE-2025-6018: CVE-2025-6018 Poc and Exploit
CVE-2025-6018 Poc and Exploit . Contribute to ibrahmsql/CVE-2025-6018 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:In this write up, we will go over reverse engineering and exploiting a vulnerable MIPS OpenWRT router in order to get RCE and a reverse shell.
URL:https://github.com/Archan6el/OpenWRT-Router-Exploit-RCE-Writeup
标签:#RCE
更新了:RCE
描述:In this write up, we will go over reverse engineering and exploiting a vulnerable MIPS OpenWRT router in order to get RCE and a reverse shell.
URL:https://github.com/Archan6el/OpenWRT-Router-Exploit-RCE-Writeup
标签:#RCE
GitHub
GitHub - Archan6el/OpenWRT-Router-Exploit-RCE-Writeup: In this write up, we will go over reverse engineering and exploiting a vulnerable…
In this write up, we will go over reverse engineering and exploiting a vulnerable MIPS OpenWRT router in order to get RCE and a reverse shell. - Archan6el/OpenWRT-Router-Exploit-RCE-Writeup
GitHub监控消息提醒!!!
更新了:信息收集
描述:Whois_Google_Plugin 是一款为安全研究员、红队人员和渗透测试工程师设计的 Chrome 浏览器插件,能够在访问目标站点时自动提取当前网页的域名,并实时查询其 Whois 信息(包括注册时间、到期时间、注册商、联系方式等)。 该插件可用于信息收集阶段(Reconnaissance),为目标资产分析提供第一手域名情报。
URL:https://github.com/Maikefee/Whois_Google_Plugin
标签:#信息收集
更新了:信息收集
描述:Whois_Google_Plugin 是一款为安全研究员、红队人员和渗透测试工程师设计的 Chrome 浏览器插件,能够在访问目标站点时自动提取当前网页的域名,并实时查询其 Whois 信息(包括注册时间、到期时间、注册商、联系方式等)。 该插件可用于信息收集阶段(Reconnaissance),为目标资产分析提供第一手域名情报。
URL:https://github.com/Maikefee/Whois_Google_Plugin
标签:#信息收集
GitHub
GitHub - Maikefee/Whois_Google_Plugin: Whois_Google_Plugin 是一款为安全研究员、红队人员和渗透测试工程师设计的 Chrome 浏览器插件,能够在访问目标站点时自动提取当前网页的域名,并实时查询其…
Whois_Google_Plugin 是一款为安全研究员、红队人员和渗透测试工程师设计的 Chrome 浏览器插件,能够在访问目标站点时自动提取当前网页的域名,并实时查询其 Whois 信息(包括注册时间、到期时间、注册商、联系方式等)。 该插件可用于信息收集阶段(Reconnaissance),为目标资产分析提供第一手域名情报。 - Maikefee/Whois_Google_Plugin
GitHub监控消息提醒!!!
更新了:RCE
描述:Malicious Maven pom.xml that uses \"groovy-maven-plugin\" to get RCE
URL:https://github.com/mbadanoiu/mvn_pwn
标签:#RCE
更新了:RCE
描述:Malicious Maven pom.xml that uses \"groovy-maven-plugin\" to get RCE
URL:https://github.com/mbadanoiu/mvn_pwn
标签:#RCE
GitHub
GitHub - mbadanoiu/mvn_pwn: Malicious Maven pom.xml that uses "groovy-maven-plugin" to get RCE
Malicious Maven pom.xml that uses "groovy-maven-plugin" to get RCE - mbadanoiu/mvn_pwn
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-52914
URL:https://github.com/rxerium/CVE-2025-52914
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-52914
URL:https://github.com/rxerium/CVE-2025-52914
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-52914: Detection for CVE-2025-52914
Detection for CVE-2025-52914. Contribute to rxerium/CVE-2025-52914 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53652: Jenkins Git Parameter Analysis
URL:https://github.com/pl4tyz/CVE-2025-53652-Jenkins-Git-Parameter-Analysis
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53652: Jenkins Git Parameter Analysis
URL:https://github.com/pl4tyz/CVE-2025-53652-Jenkins-Git-Parameter-Analysis
标签:#CVE-2025
GitHub
GitHub - pl4tyz/CVE-2025-53652-Jenkins-Git-Parameter-Analysis: CVE-2025-53652: Jenkins Git Parameter Analysis
CVE-2025-53652: Jenkins Git Parameter Analysis. Contribute to pl4tyz/CVE-2025-53652-Jenkins-Git-Parameter-Analysis development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Honeypot for CVE-2025-53770 aka ToolShell
URL:https://github.com/a-hydrae/ToolShell-Honeypot
标签:#CVE-2025
更新了:CVE-2025
描述:Honeypot for CVE-2025-53770 aka ToolShell
URL:https://github.com/a-hydrae/ToolShell-Honeypot
标签:#CVE-2025
GitHub
GitHub - a-hydrae/ToolShell-Honeypot: Honeypot for CVE-2025-53770 aka ToolShell
Honeypot for CVE-2025-53770 aka ToolShell. Contribute to a-hydrae/ToolShell-Honeypot development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-32429 – SQLi in XWiki REST API (getdeleteddocuments.vm).
URL:https://github.com/byteReaper77/CVE-2025-32429
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-32429 – SQLi in XWiki REST API (getdeleteddocuments.vm).
URL:https://github.com/byteReaper77/CVE-2025-32429
标签:#CVE-2025
GitHub
GitHub - byteReaper77/CVE-2025-32429: Exploit for CVE-2025-32429 – SQLi in XWiki REST API (getdeleteddocuments.vm).
Exploit for CVE-2025-32429 – SQLi in XWiki REST API (getdeleteddocuments.vm). - byteReaper77/CVE-2025-32429
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public Disclosure: CVE-2025-54554 – Unauthenticated Access in tiaudit REST API leading to Sensitive Information Disclosure
URL:https://github.com/Aman-Parmar/CVE-2025-54554
标签:#CVE-2025
更新了:CVE-2025
描述:Public Disclosure: CVE-2025-54554 – Unauthenticated Access in tiaudit REST API leading to Sensitive Information Disclosure
URL:https://github.com/Aman-Parmar/CVE-2025-54554
标签:#CVE-2025
GitHub
GitHub - Aman-Parmar/CVE-2025-54554: CVE-2025-54554 – Unauthenticated Access in tiaudit REST API leading to Sensitive Information…
CVE-2025-54554 – Unauthenticated Access in tiaudit REST API leading to Sensitive Information Disclosure - Aman-Parmar/CVE-2025-54554
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Scans Windows IIS logs for signs of CVE-2025-53770 & CVE-2025-53771
URL:https://github.com/zach115th/ToolShellFinder
标签:#CVE-2025
更新了:CVE-2025
描述:Scans Windows IIS logs for signs of CVE-2025-53770 & CVE-2025-53771
URL:https://github.com/zach115th/ToolShellFinder
标签:#CVE-2025
GitHub
GitHub - zach115th/ToolShellFinder: Scans Windows IIS logs for signs of CVE-2025-53770 & CVE-2025-53771
Scans Windows IIS logs for signs of CVE-2025-53770 & CVE-2025-53771 - zach115th/ToolShellFinder
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-34085
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-34085
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-34085
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-34085
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-34085: CVE-2025-34085
CVE-2025-34085. Contribute to B1ack4sh/Blackash-CVE-2025-34085 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:域渗透
描述:FOFA Google Plugin 是一款基于 FOFA API 的 Chrome 浏览器插件,能够自动识别当前访问网站的域名或 IP,并实时查询其资产信息,如开放端口、服务类型等。该插件主要面向安全研究员、红队渗透人员、CTF 选手以及网络测绘从业者,用于快速识别目标的边界资产和潜在攻击面。
URL:https://github.com/Maikefee/Fofa_Google_Plugin
标签:#域渗透
更新了:域渗透
描述:FOFA Google Plugin 是一款基于 FOFA API 的 Chrome 浏览器插件,能够自动识别当前访问网站的域名或 IP,并实时查询其资产信息,如开放端口、服务类型等。该插件主要面向安全研究员、红队渗透人员、CTF 选手以及网络测绘从业者,用于快速识别目标的边界资产和潜在攻击面。
URL:https://github.com/Maikefee/Fofa_Google_Plugin
标签:#域渗透
GitHub
GitHub - Maikefee/Fofa_Google_Plugin: # 🔍 FOFA Google Plugin 一款基于 [FOFA API](https://fofa.info) 的 Chrome 浏览器插件,自动提取当前页面的域名并查询…
# 🔍 FOFA Google Plugin 一款基于 [FOFA API](https://fofa.info) 的 Chrome 浏览器插件,自动提取当前页面的域名并查询其开放端口、安全资产信息,辅助安全研究与渗透测试中的信息收集工作。 --- ## ✨ 插件特色 - 🚀 自动获取当前标签页 URL 并提取主域名/IP - 🔐 使用 FOFA API 查询目标资产信息(如开放端口...
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/anuj-akotkar/RCE_system
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/anuj-akotkar/RCE_system
标签:#RCE
GitHub
GitHub - anuj-akotkar/RCE_system: The RCE (Remote Code Execution) system lets users write and run code safely in a browser. It…
The RCE (Remote Code Execution) system lets users write and run code safely in a browser. It uses Docker to execute code in isolated environments with time and memory limits. The system supports te...
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC for CVE-2024-25600 (Bricks Builder RCE) — educational use only
URL:https://github.com/frankfm-labs/bricks-rce
标签:#RCE
更新了:RCE
描述:PoC for CVE-2024-25600 (Bricks Builder RCE) — educational use only
URL:https://github.com/frankfm-labs/bricks-rce
标签:#RCE
GitHub
frankfm-labs/bricks-rce
PoC for CVE-2024-25600 (Bricks Builder RCE) — educational use only - frankfm-labs/bricks-rce
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-32429 (SQL Injection in PHP PDO prepared statements) – for educational and security research purposes only
URL:https://github.com/amir-othman/CVE-2025-32429
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-32429 (SQL Injection in PHP PDO prepared statements) – for educational and security research purposes only
URL:https://github.com/amir-othman/CVE-2025-32429
标签:#CVE-2025
GitHub
GitHub - amir-othman/CVE-2025-32429: Proof-of-Concept exploit for CVE-2025-32429 (SQL Injection in PHP PDO prepared statements)…
Proof-of-Concept exploit for CVE-2025-32429 (SQL Injection in PHP PDO prepared statements) – for educational and security research purposes only - amir-othman/CVE-2025-32429
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting SysAid On-Premise servers running on Windows.
URL:https://github.com/0xgh057r3c0n/SysAid-PreAuth-RCE-Chain
标签:#RCE
更新了:RCE
描述:This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting SysAid On-Premise servers running on Windows.
URL:https://github.com/0xgh057r3c0n/SysAid-PreAuth-RCE-Chain
标签:#RCE
GitHub
GitHub - 0xgh057r3c0n/SysAid-PreAuth-RCE-Chain: This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting…
This is a Pre-Authentication Remote Code Execution (RCE) exploit chain targeting SysAid On-Premise servers running on Windows. - 0xgh057r3c0n/SysAid-PreAuth-RCE-Chain
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Sharepoint ToolPane - CVE-2025-53770 & CVE-2025-53771
URL:https://github.com/unk9vvn/sharepoint-toolpane
标签:#CVE-2025
更新了:CVE-2025
描述:Sharepoint ToolPane - CVE-2025-53770 & CVE-2025-53771
URL:https://github.com/unk9vvn/sharepoint-toolpane
标签:#CVE-2025
GitHub
GitHub - unk9vvn/sharepoint-toolpane: Sharepoint ToolPane - PoC
Sharepoint ToolPane - PoC. Contribute to unk9vvn/sharepoint-toolpane development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Reference to https://github.com/mulwareX/CVE-2025-6218-POC?tab=readme-ov-file, with some small changes
URL:https://github.com/vulnerbyte/CVE-2025-6218
标签:#CVE-2025
更新了:CVE-2025
描述:Reference to https://github.com/mulwareX/CVE-2025-6218-POC?tab=readme-ov-file, with some small changes
URL:https://github.com/vulnerbyte/CVE-2025-6218
标签:#CVE-2025
GitHub
GitHub - mulwareX/CVE-2025-6218-POC: RARLAB WinRAR Directory Traversal Remote Code Execution
RARLAB WinRAR Directory Traversal Remote Code Execution - mulwareX/CVE-2025-6218-POC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/ShinP451/scavenger_scanner
标签:#CVE-2025
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/ShinP451/scavenger_scanner
标签:#CVE-2025
GitHub
GitHub - ShinP451/scavenger_scanner: Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows - ShinP451/scavenger_scanner