GitHub监控消息提醒!!!
更新了:CVE-2025
描述:test for CVE-2025-48384
URL:https://github.com/f1shh/CVE-2025-48384
标签:#CVE-2025
更新了:CVE-2025
描述:test for CVE-2025-48384
URL:https://github.com/f1shh/CVE-2025-48384
标签:#CVE-2025
GitHub
GitHub - f1shh/CVE-2025-48384: test for CVE-2025-48384
test for CVE-2025-48384. Contribute to f1shh/CVE-2025-48384 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:changeHeaders是一个功能强大的Burp Suite扩展插件,允许安全专业人员和开发人员轻松修改HTTP请求头。无论您是在进行渗透测试、漏洞赏金 hunting,还是应用程序调试,changeHeaders都能简化跨多个Burp Suite工具的请求头操作过程。
URL:https://github.com/GitHubNull/changeHeaders
标签:#渗透测试
更新了:渗透测试
描述:changeHeaders是一个功能强大的Burp Suite扩展插件,允许安全专业人员和开发人员轻松修改HTTP请求头。无论您是在进行渗透测试、漏洞赏金 hunting,还是应用程序调试,changeHeaders都能简化跨多个Burp Suite工具的请求头操作过程。
URL:https://github.com/GitHubNull/changeHeaders
标签:#渗透测试
GitHub
GitHub - GitHubNull/changeHeaders: changeHeaders是一个功能强大的Burp Suite扩展插件,允许安全专业人员和开发人员轻松修改HTTP请求头。无论您是在进行渗透测试、漏洞赏金 hunting,还是应用程…
changeHeaders是一个功能强大的Burp Suite扩展插件,允许安全专业人员和开发人员轻松修改HTTP请求头。无论您是在进行渗透测试、漏洞赏金 hunting,还是应用程序调试,changeHeaders都能简化跨多个Burp Suite工具的请求头操作过程。 - GitHubNull/changeHeaders
GitHub监控消息提醒!!!
更新了:应急响应
描述:这是一个基于 Jetpack Compose 的 Android 应用,专为安全学习者设计,包含渗透测试、内网渗透、Web 安全、应急响应和权限提升相关的题目,帮助用户学习。
URL:https://github.com/Aining777/MyFirstQuizApp
标签:#应急响应
更新了:应急响应
描述:这是一个基于 Jetpack Compose 的 Android 应用,专为安全学习者设计,包含渗透测试、内网渗透、Web 安全、应急响应和权限提升相关的题目,帮助用户学习。
URL:https://github.com/Aining777/MyFirstQuizApp
标签:#应急响应
GitHub
GitHub - Aining777/MyFirstQuizApp: 这是一个基于 Jetpack Compose 的 Android 应用,专为安全学习者设计,包含渗透测试、内网渗透、Web 安全、应急响应和权限提升相关的题目,帮助用户学习。
这是一个基于 Jetpack Compose 的 Android 应用,专为安全学习者设计,包含渗透测试、内网渗透、Web 安全、应急响应和权限提升相关的题目,帮助用户学习。 - Aining777/MyFirstQuizApp
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure of CVE-2025-46018: A Bluetooth-based payment bypass vulnerability in CSC Pay Mobile App v2.19.4\"
URL:https://github.com/niranjangaire1995/CVE-2025-46018-CSC-Pay-Mobile-App-Payment-Authentication-Bypass
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure of CVE-2025-46018: A Bluetooth-based payment bypass vulnerability in CSC Pay Mobile App v2.19.4\"
URL:https://github.com/niranjangaire1995/CVE-2025-46018-CSC-Pay-Mobile-App-Payment-Authentication-Bypass
标签:#CVE-2025
GitHub
GitHub - niranjangaire1995/CVE-2025-46018-CSC-Pay-Mobile-App-Payment-Authentication-Bypass: Disclosure of CVE-2025-46018: A Bluetooth…
Disclosure of CVE-2025-46018: A Bluetooth-based payment bypass vulnerability in CSC Pay Mobile App v2.19.4" - niranjangaire1995/CVE-2025-46018-CSC-Pay-Mobile-App-Payment-Authentication-Bypass
GitHub监控消息提醒!!!
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/rix4uni/GarudRecon
标签:#RCE
更新了:RCE
描述:An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more.
URL:https://github.com/rix4uni/GarudRecon
标签:#RCE
GitHub
GitHub - rix4uni/GarudRecon: An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports…
An automated recon tool for asset discovery and vulnerability scanning using open-source tools. Supports XSS, SQLi, LFI, RCE, IIS, Open Redirect, Swagger UI, .git exposures and more. - rix4uni/Garu...
GitHub监控消息提醒!!!
更新了:RCE
描述:A demonstration of the RCE vulnerability in the @nestjs/devtools-integration
URL:https://github.com/JLLeitschuh/nestjs-devtools-integration-rce-poc
标签:#RCE
更新了:RCE
描述:A demonstration of the RCE vulnerability in the @nestjs/devtools-integration
URL:https://github.com/JLLeitschuh/nestjs-devtools-integration-rce-poc
标签:#RCE
GitHub
GitHub - JLLeitschuh/nestjs-devtools-integration-rce-poc: A demonstration of the RCE vulnerability in the @nestjs/devtools-integration
A demonstration of the RCE vulnerability in the @nestjs/devtools-integration - JLLeitschuh/nestjs-devtools-integration-rce-poc
GitHub监控消息提醒!!!
更新了:sql注入
描述:CN:基于我个人的服务器设定的黑名单ip网段,包括ssh、邮件、sql注入
URL:https://github.com/holywd/blacklist-iproute
标签:#sql注入
更新了:sql注入
描述:CN:基于我个人的服务器设定的黑名单ip网段,包括ssh、邮件、sql注入
URL:https://github.com/holywd/blacklist-iproute
标签:#sql注入
GitHub
holywd/blacklist-iproute
CN:基于我个人的服务器设定的黑名单ip网段,包括ssh、邮件、sql注入. Contribute to holywd/blacklist-iproute development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:在利用pdf进行xss攻击时会有waf拦截,因为alert()函数属于危险函数,此项目使用response()函数弹窗能绕过一些waf进行上传pdf
URL:https://github.com/SunDay2t/XSS-PDF
标签:#绕过
更新了:绕过
描述:在利用pdf进行xss攻击时会有waf拦截,因为alert()函数属于危险函数,此项目使用response()函数弹窗能绕过一些waf进行上传pdf
URL:https://github.com/SunDay2t/XSS-PDF
标签:#绕过
GitHub
GitHub - SunDay2t/XSS-PDF: 在利用pdf进行xss攻击时会有waf拦截,因为alert()函数属于危险函数,此项目使用response()函数弹窗能绕过一些waf进行上传pdf
在利用pdf进行xss攻击时会有waf拦截,因为alert()函数属于危险函数,此项目使用response()函数弹窗能绕过一些waf进行上传pdf - SunDay2t/XSS-PDF
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:一个简单的数据库漏洞扫描系统,漏洞来源主要是cnvd、cve、阿里云
URL:https://github.com/zwang0621/shixi-proj
标签:#漏洞扫描
更新了:漏洞扫描
描述:一个简单的数据库漏洞扫描系统,漏洞来源主要是cnvd、cve、阿里云
URL:https://github.com/zwang0621/shixi-proj
标签:#漏洞扫描
GitHub
GitHub - zwang0621/shixi-proj: 一个简单的数据库漏洞扫描系统,漏洞来源主要是cnvd、cve、阿里云
一个简单的数据库漏洞扫描系统,漏洞来源主要是cnvd、cve、阿里云. Contribute to zwang0621/shixi-proj development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-41373 Authenticated SQL Injection in Gandia Integra Total v2.1.2217.3–4.4.2236.1
URL:https://github.com/byteReaper77/CVE-2025-41373
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-41373 Authenticated SQL Injection in Gandia Integra Total v2.1.2217.3–4.4.2236.1
URL:https://github.com/byteReaper77/CVE-2025-41373
标签:#CVE-2025
GitHub
GitHub - byteReaper77/CVE-2025-41373: PoC for CVE-2025-41373 Authenticated SQL Injection in Gandia Integra Total v2.1.2217.3–4.4.2236.1
PoC for CVE-2025-41373 Authenticated SQL Injection in Gandia Integra Total v2.1.2217.3–4.4.2236.1 - GitHub - byteReaper77/CVE-2025-41373: PoC for CVE-2025-41373 Authenticated SQL Injection in G...
GitHub监控消息提醒!!!
更新了:RCE
描述:A project that tries to document every potential path from any web app to RCE
URL:https://github.com/AnvithLobo/WEB2RCE
标签:#RCE
更新了:RCE
描述:A project that tries to document every potential path from any web app to RCE
URL:https://github.com/AnvithLobo/WEB2RCE
标签:#RCE
GitHub
GitHub - AnvithLobo/WEB2RCE: A project that tries to document every potential path from any web app to RCE
A project that tries to document every potential path from any web app to RCE - AnvithLobo/WEB2RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
URL:https://github.com/cyberpoul/CVE-Alert-Bot
标签:#RCE
更新了:RCE
描述:TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
URL:https://github.com/cyberpoul/CVE-Alert-Bot
标签:#RCE
GitHub
GitHub - cyberpoul/CVE-Alert-Bot: This is a discord bot designed to automatically monitor and alert about newly published CVEs…
This is a discord bot designed to automatically monitor and alert about newly published CVEs related to remote code execution (RCE), kernel exploits, privilege escalation, and other critical vulner...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Explore the CVE-2025-32463 lab environment for testing the sudo vulnerability. Ideal for security researchers. 🐱💻🔍
URL:https://github.com/harryhaxor/CVE-2025-53770-SharePoint-Deserialization-RCE-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Explore the CVE-2025-32463 lab environment for testing the sudo vulnerability. Ideal for security researchers. 🐱💻🔍
URL:https://github.com/harryhaxor/CVE-2025-53770-SharePoint-Deserialization-RCE-PoC
标签:#CVE-2025
GitHub
GitHub - harryhaxor/CVE-2025-53770-SharePoint-Deserialization-RCE-PoC: A critical vulnerability in Microsoft SharePoint Server…
A critical vulnerability in Microsoft SharePoint Server allows unauthenticated remote code execution via deserialization of untrusted data. Microsoft is aware of active exploitation; apply CVE miti...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
URL:https://github.com/platsecurity/CVE-2025-32433
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
URL:https://github.com/platsecurity/CVE-2025-32433
标签:#CVE-2025
GitHub
Unauthenticated Remote Code Execution in Erlang/OTP SSH
### Summary
A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SS...
A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SS...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-48384
URL:https://github.com/fluoworite/CVE-2025-48384
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-48384
URL:https://github.com/fluoworite/CVE-2025-48384
标签:#CVE-2025
GitHub
GitHub - fluoworite/CVE-2025-48384: PoC for CVE-2025-48384
PoC for CVE-2025-48384. Contribute to fluoworite/CVE-2025-48384 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is a small script for the rce vulnerability for CVE-2025-24893. It supports basic input/output
URL:https://github.com/Kai7788/CVE-2025-24893-RCE-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:This is a small script for the rce vulnerability for CVE-2025-24893. It supports basic input/output
URL:https://github.com/Kai7788/CVE-2025-24893-RCE-PoC
标签:#CVE-2025
GitHub
Kai7788/CVE-2025-24893-RCE-PoC
This is a small script for the rce vulnerability for CVE-2025-24893. It supports basic input/output - Kai7788/CVE-2025-24893-RCE-PoC
GitHub监控消息提醒!!!
更新了:反序列化
描述:序列化反序列化 application/x-www-form-urlencoded 格式
URL:https://github.com/eclipse-oniro-openharmony/third_party_rust_serde_urlencoded
标签:#反序列化
更新了:反序列化
描述:序列化反序列化 application/x-www-form-urlencoded 格式
URL:https://github.com/eclipse-oniro-openharmony/third_party_rust_serde_urlencoded
标签:#反序列化
GitHub
eclipse-oniro-openharmony/third_party_rust_serde_urlencoded
序列化反序列化 application/x-www-form-urlencoded 格式. Contribute to eclipse-oniro-openharmony/third_party_rust_serde_urlencoded development by creating an account on GitHub.