GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/m3m0o/engeman-web-languagecombobox-sqli
标签:#CVE-2025
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/m3m0o/engeman-web-languagecombobox-sqli
标签:#CVE-2025
GitHub
GitHub - m3m0o/engeman-web-language-combobox-sqli: Proof of concept for exploitation of the vulnerability described in CVE-2025…
Proof of concept for exploitation of the vulnerability described in CVE-2025-8220, which concerns the possibility of SQL Injection during the password recovery page load in the Engeman Web software...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/m3m0o/engeman-web-language-combobox-sqli
标签:#CVE-2025
更新了:CVE-2025
描述:Detect CVE-2025-54313 eslint-config-prettier supply chain attack IOCs on Windows
URL:https://github.com/m3m0o/engeman-web-language-combobox-sqli
标签:#CVE-2025
GitHub
GitHub - m3m0o/engeman-web-language-combobox-sqli: Proof of concept for exploitation of the vulnerability described in CVE-2025…
Proof of concept for exploitation of the vulnerability described in CVE-2025-8220, which concerns the possibility of SQL Injection during the password recovery page load in the Engeman Web software...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-7404 exploit.
URL:https://github.com/mind2hex/CVE-2025-7404-CalibreWeb-0.6.24-BlindCommandInjection
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-7404 exploit.
URL:https://github.com/mind2hex/CVE-2025-7404-CalibreWeb-0.6.24-BlindCommandInjection
标签:#CVE-2025
GitHub
GitHub - mind2hex/CVE-2025-7404-CalibreWeb-0.6.24-BlindCommandInjection: CVE-2025-7404 exploit.
CVE-2025-7404 exploit. Contribute to mind2hex/CVE-2025-7404-CalibreWeb-0.6.24-BlindCommandInjection development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Linux CTF from VulnHub with a focus on enumeration, RCE, steganography, and privilege escalation to nested
URL:https://github.com/malik027/Double-1
标签:#RCE
更新了:RCE
描述:Linux CTF from VulnHub with a focus on enumeration, RCE, steganography, and privilege escalation to nested
URL:https://github.com/malik027/Double-1
标签:#RCE
GitHub
GitHub - malik027/Double-1: Linux CTF from VulnHub with a focus on enumeration, RCE, steganography, and privilege escalation to…
Linux CTF from VulnHub with a focus on enumeration, RCE, steganography, and privilege escalation to nested - malik027/Double-1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53770 Mass Scanner
URL:https://github.com/3a7/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53770 Mass Scanner
URL:https://github.com/3a7/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - 3a7/CVE-2025-53770: CVE-2025-53770 Mass Scanner
CVE-2025-53770 Mass Scanner. Contribute to 3a7/CVE-2025-53770 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/bosombaby/javascript
标签:#代码注入
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/bosombaby/javascript
标签:#代码注入
GitHub
GitHub - bosombaby/javascript: 这个仓库是一个专注于前端面试知识点的宝库,涵盖了各种重要的前端技术主题。无论你是正在准备面试,还是想要巩固和提升你的前端技术水平,这个仓库都将是你的理想选择。 仓库中包含了丰富的场景题,可…
这个仓库是一个专注于前端面试知识点的宝库,涵盖了各种重要的前端技术主题。无论你是正在准备面试,还是想要巩固和提升你的前端技术水平,这个仓库都将是你的理想选择。 仓库中包含了丰富的场景题,可以帮助你理解和掌握实际开发中可能遇到的各种问题和挑战。同时,我们还深入探讨了防抖节流、promise、闭包等高级主题,这些都是前端开发中常常见的技术难点,掌握它们将对你的技术提升有着重要的帮助。 此外,...
GitHub监控消息提醒!!!
更新了:RCE
描述:Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0)
URL:https://github.com/CSpanias/rpc-rce.py
标签:#RCE
更新了:RCE
描述:Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0)
URL:https://github.com/CSpanias/rpc-rce.py
标签:#RCE
GitHub
GitHub - CSpanias/rpc-rce.py: Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0)
Exploit for CVE-2022-35411 — Unauthenticated RCE in rpc.py (<= 0.6.0) - CSpanias/rpc-rce.py
GitHub监控消息提醒!!!
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/1-hexene/auto-commit
标签:#代码注入
更新了:代码注入
描述:适用于 Halo 的 HTML 代码注入插件
URL:https://github.com/1-hexene/auto-commit
标签:#代码注入
GitHub
GitHub - 1-hexene/auto-commit: 你说的对,但是GitHub是由Tom Preston-Werner、Chris Wanstrath、PJ Hyett和Scott Chacon自主研发的一款基于Git的代码托管平台。它发生在…
你说的对,但是GitHub是由Tom Preston-Werner、Chris Wanstrath、PJ Hyett和Scott Chacon自主研发的一款基于Git的代码托管平台。它发生在一个被称作互联网的全球信息网络中,在这里,被注册为GitHub用户的人将被授予创建和管理仓库的权限,导引开源软件和协作开发。你将扮演一位名为your_username的开发者,创建或加入项目,和他们一起编...
GitHub监控消息提醒!!!
更新了:RCE
描述:Authenticated File Upload to RCE via Mimetype Manipulation
URL:https://github.com/Yucaerin/MagicAI
标签:#RCE
更新了:RCE
描述:Authenticated File Upload to RCE via Mimetype Manipulation
URL:https://github.com/Yucaerin/MagicAI
标签:#RCE
GitHub
GitHub - Yucaerin/MagicAI: Authenticated File Upload to RCE via Mimetype Manipulation
Authenticated File Upload to RCE via Mimetype Manipulation - Yucaerin/MagicAI
GitHub监控消息提醒!!!
更新了:RCE
描述:Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL Injection, and XSS
URL:https://github.com/Mihirk23/dvwa-penetration-testing
标签:#RCE
更新了:RCE
描述:Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL Injection, and XSS
URL:https://github.com/Mihirk23/dvwa-penetration-testing
标签:#RCE
GitHub
GitHub - Mihirk23/dvwa-penetration-testing: Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL…
Penetration testing on DVWA: Brute-force, Command Injection, File Upload (RCE), SQL Injection, and XSS - Mihirk23/dvwa-penetration-testing
GitHub监控消息提醒!!!
更新了:RCE
描述: Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC
URL:https://github.com/Shivshantp/CVE-2025-24813
标签:#RCE
更新了:RCE
描述: Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC
URL:https://github.com/Shivshantp/CVE-2025-24813
标签:#RCE
GitHub
GitHub - Shivshantp/CVE-2025-24813: Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC
Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC - Shivshantp/CVE-2025-24813
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE in Amazon Managed Workflows for Apache Airflow (MWAA) service
URL:https://github.com/ricardojoserf/amazon-mwaa-RCE
标签:#RCE
更新了:RCE
描述:RCE in Amazon Managed Workflows for Apache Airflow (MWAA) service
URL:https://github.com/ricardojoserf/amazon-mwaa-RCE
标签:#RCE
GitHub
GitHub - ricardojoserf/amazon-mwaa-RCE: RCE in Amazon Managed Workflows for Apache Airflow (MWAA) service
RCE in Amazon Managed Workflows for Apache Airflow (MWAA) service - ricardojoserf/amazon-mwaa-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🎯 Vulnerability scanner for SharePoint servers affected by CVE-2025-53770. Detects unsafe deserialization using ToolPane.aspx with a crafted base64+gzip payload. 🛡️ Developed by Ahmed Tamer.
URL:https://github.com/0x-crypt/CVE-2025-53770-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:🎯 Vulnerability scanner for SharePoint servers affected by CVE-2025-53770. Detects unsafe deserialization using ToolPane.aspx with a crafted base64+gzip payload. 🛡️ Developed by Ahmed Tamer.
URL:https://github.com/0x-crypt/CVE-2025-53770-Scanner
标签:#CVE-2025
GitHub
GitHub - 0x-crypt/CVE-2025-53770-Scanner: 🎯 Vulnerability scanner for SharePoint servers affected by CVE-2025-53770. Detects unsafe…
🎯 Vulnerability scanner for SharePoint servers affected by CVE-2025-53770. Detects unsafe deserialization using ToolPane.aspx with a crafted base64+gzip payload. 🛡️ Developed by Ahmed Tamer. - 0x-c...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一款图形化的Web漏洞利用工具,用于渗透测试。支持Jeecg-Boot、泛微OA以及强大的Fastjson漏洞利用功能
URL:https://github.com/danran12/-web-exploit-tool
标签:#渗透测试
更新了:渗透测试
描述:一款图形化的Web漏洞利用工具,用于渗透测试。支持Jeecg-Boot、泛微OA以及强大的Fastjson漏洞利用功能
URL:https://github.com/danran12/-web-exploit-tool
标签:#渗透测试
GitHub
GitHub - danran12/-web-exploit-tool: 一款图形化的Web漏洞利用工具,用于渗透测试。支持springboot、Jeecg-Boot、泛微OA以及强大的Fastjson漏洞利用功能
一款图形化的Web漏洞利用工具,用于渗透测试。支持springboot、Jeecg-Boot、泛微OA以及强大的Fastjson漏洞利用功能 - danran12/-web-exploit-tool
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains a proof-of-concept (PoC) for exploiting the OpenSSH ProxyCommand vulnerability — CVE-2025-51385 — affecting OpenSSH servers <9.6 Version
URL:https://github.com/saarcastified/CVE-2023-51385---OpenSSH-ProxyCommand-Injection-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains a proof-of-concept (PoC) for exploiting the OpenSSH ProxyCommand vulnerability — CVE-2025-51385 — affecting OpenSSH servers <9.6 Version
URL:https://github.com/saarcastified/CVE-2023-51385---OpenSSH-ProxyCommand-Injection-PoC
标签:#CVE-2025
GitHub
GitHub - saarcastified/CVE-2023-51385---OpenSSH-ProxyCommand-Injection-PoC: This repository contains a proof-of-concept (PoC) for…
This repository contains a proof-of-concept (PoC) for exploiting the OpenSSH ProxyCommand vulnerability — CVE-2025-51385 — affecting OpenSSH servers <9.6 Version - saarcastified/CVE-2023-513...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit
URL:https://github.com/KaiHT-Ladiant/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit
URL:https://github.com/KaiHT-Ladiant/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - KaiHT-Ladiant/CVE-2025-32463: CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit
CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit - KaiHT-Ladiant/CVE-2025-32463