GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for CVE-2025-50154, a Zero Day Vulnerability Leaking NTLM Challenge in 0 Click. It is a bypass for the CVE-2025-24054 Security Patch
URL:https://github.com/rubenformation/CVE-2025-50154
标签:#CVE-2025
更新了:CVE-2025
描述:POC for CVE-2025-50154, a Zero Day Vulnerability Leaking NTLM Challenge in 0 Click. It is a bypass for the CVE-2025-24054 Security Patch
URL:https://github.com/rubenformation/CVE-2025-50154
标签:#CVE-2025
GitHub
GitHub - rubenformation/CVE-2025-50154: POC for CVE-2025-50154, a zero day vulnerability on windows file explorer disclosing NTLMv2…
POC for CVE-2025-50154, a zero day vulnerability on windows file explorer disclosing NTLMv2-SSP without user interaction. It is a bypass for the CVE-2025-24054 Security Patch - rubenformation/CVE-2...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit)
URL:https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit)
URL:https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
标签:#CVE-2025
GitHub
GitHub - sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-: CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit)
CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit) - sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE Payload for NPM Dependency Confusion Attack
URL:https://github.com/Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload
标签:#RCE
更新了:RCE
描述:RCE Payload for NPM Dependency Confusion Attack
URL:https://github.com/Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload
标签:#RCE
GitHub
Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload
RCE Payload for NPM Dependency Confusion Attack. Contribute to Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection PoC
URL:https://github.com/barbaraeivyu/CVE-2025-25256
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection PoC
URL:https://github.com/barbaraeivyu/CVE-2025-25256
标签:#CVE-2025
GitHub
GitHub - barbaraeivyu/CVE-2025-25256: CVE-2025-25256: Fortinet FortiSIEM OS Command Injection PoC
CVE-2025-25256: Fortinet FortiSIEM OS Command Injection PoC - barbaraeivyu/CVE-2025-25256
GitHub监控消息提醒!!!
更新了:渗透测试
描述:RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志、提炼情报、模拟攻击链、制定作战计划。无论是迅速锁定漏洞、整理入侵痕迹,还是推演渗透路径,RedDynasty 都能在暗潮汹涌的网络战场,为你提供敏锐、精准、贴近红队思维的智力支持。
URL:https://github.com/ctkqiang/RedDynasty
标签:#渗透测试
更新了:渗透测试
描述:RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志、提炼情报、模拟攻击链、制定作战计划。无论是迅速锁定漏洞、整理入侵痕迹,还是推演渗透路径,RedDynasty 都能在暗潮汹涌的网络战场,为你提供敏锐、精准、贴近红队思维的智力支持。
URL:https://github.com/ctkqiang/RedDynasty
标签:#渗透测试
GitHub
GitHub - ctkqiang/RedDynasty: RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志…
RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志、提炼情报、模拟攻击链、制定作战计划。无论是迅速锁定漏洞、整理入侵痕迹,还是推演渗透路径,RedDynasty 都能在暗潮汹涌的网络战场,为你提供敏锐、精准、贴近红队思维的智力支持。 - ctkqian...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:this is a poc for the CVE-2025-54887
URL:https://github.com/Wizard079/CVE-2025-54887_POC
标签:#CVE-2025
更新了:CVE-2025
描述:this is a poc for the CVE-2025-54887
URL:https://github.com/Wizard079/CVE-2025-54887_POC
标签:#CVE-2025
GitHub
Wizard079/CVE-2025-54887_POC
this is a poc for the CVE-2025-54887. Contribute to Wizard079/CVE-2025-54887_POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53773
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53773
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53773
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53773
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-53773: CVE-2025-53773
CVE-2025-53773 . Contribute to B1ack4sh/Blackash-CVE-2025-53773 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of concept for the vulnerability CVE-2025-50428: Authenticated OS Command Injection in RaspAP
URL:https://github.com/security-smarttecs/cve-2025-50428
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of concept for the vulnerability CVE-2025-50428: Authenticated OS Command Injection in RaspAP
URL:https://github.com/security-smarttecs/cve-2025-50428
标签:#CVE-2025
GitHub
GitHub - security-smarttecs/cve-2025-50428: Proof of concept for the vulnerability CVE-2025-50428: Authenticated OS Command Injection…
Proof of concept for the vulnerability CVE-2025-50428: Authenticated OS Command Injection in RaspAP - security-smarttecs/cve-2025-50428
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for XWiki Remote Code Execution Vulnerability (CVE-2025-24893)
URL:https://github.com/CMassa/CVE-2025-24893
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for XWiki Remote Code Execution Vulnerability (CVE-2025-24893)
URL:https://github.com/CMassa/CVE-2025-24893
标签:#CVE-2025
GitHub
GitHub - CMassa/CVE-2025-24893: PoC exploit for XWiki Remote Code Execution Vulnerability (CVE-2025-24893)
PoC exploit for XWiki Remote Code Execution Vulnerability (CVE-2025-24893) - CMassa/CVE-2025-24893
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088
URL:https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool
标签:#CVE-2025
更新了:CVE-2025
描述:Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088
URL:https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool
标签:#CVE-2025
GitHub
GitHub - onlytoxi/CVE-2025-8088-Winrar-Tool: Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088
Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088 - onlytoxi/CVE-2025-8088-Winrar-Tool
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53770 - SharePoint
URL:https://github.com/ghostn4444/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53770 - SharePoint
URL:https://github.com/ghostn4444/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - ghostn4444/CVE-2025-53770: CVE-2025-53770 - SharePoint
CVE-2025-53770 - SharePoint. Contribute to ghostn4444/CVE-2025-53770 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:sql注入
描述:基于springboot的安全模块,包括加解密、数据脱敏、防篡改、sql注入等
URL:https://github.com/rainsoil/securt-kit
标签:#sql注入
更新了:sql注入
描述:基于springboot的安全模块,包括加解密、数据脱敏、防篡改、sql注入等
URL:https://github.com/rainsoil/securt-kit
标签:#sql注入
GitHub
rainsoil/securt-kit
基于springboot的安全模块,包括加解密、数据脱敏、防篡改、sql注入等. Contribute to rainsoil/securt-kit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure for CVE-2025-8091
URL:https://github.com/MooseLoveti/EventON-Lite-CVE-Report
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure for CVE-2025-8091
URL:https://github.com/MooseLoveti/EventON-Lite-CVE-Report
标签:#CVE-2025
GitHub
GitHub - MooseLoveti/EventON-Lite-CVE-Report: Disclosure for CVE-2025-8091
Disclosure for CVE-2025-8091. Contribute to MooseLoveti/EventON-Lite-CVE-Report development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。
URL:https://github.com/guchangan1/CodeVulnScan
标签:#代码审计
更新了:代码审计
描述:CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。
URL:https://github.com/guchangan1/CodeVulnScan
标签:#代码审计
GitHub
guchangan1/CodeVulnScan
CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。 - guchangan1/CodeVulnScan
GitHub监控消息提醒!!!
更新了:应急响应
描述:隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本
URL:https://github.com/taielab/YinGuard
标签:#应急响应
更新了:应急响应
描述:隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本
URL:https://github.com/taielab/YinGuard
标签:#应急响应
GitHub
taielab/YinGuard
隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本. Contribute to taielab/YinGuard development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50461
URL:https://github.com/jordan922/cve2025-20265
标签:#CVE-2025
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50461
URL:https://github.com/jordan922/cve2025-20265
标签:#CVE-2025
GitHub
GitHub - jordan922/cve2025-20265: Safe Python script to detect Cisco FMC instances potentially vulnerable to CVE-2025-20265. Uses…
Safe Python script to detect Cisco FMC instances potentially vulnerable to CVE-2025-20265. Uses official FMC API to check version, supports single/multi-target scanning, and includes a harmless l...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:这是一个轻量级的、纯前端的Web应用,旨在帮助团队或个人追踪项目交付情况、隐私合规问题和渗透测试安全漏洞。所有数据都安全地存储在您自己的浏览器本地,无需任何后端服务器。
URL:https://github.com/Aining777/Project-Security-Dashboard
标签:#渗透测试
更新了:渗透测试
描述:这是一个轻量级的、纯前端的Web应用,旨在帮助团队或个人追踪项目交付情况、隐私合规问题和渗透测试安全漏洞。所有数据都安全地存储在您自己的浏览器本地,无需任何后端服务器。
URL:https://github.com/Aining777/Project-Security-Dashboard
标签:#渗透测试
GitHub
GitHub - Aining777/Project-Security-Dashboard: 这是一个轻量级的、纯前端的Web应用,旨在帮助团队或个人追踪项目交付情况、隐私合规问题和渗透测试安全漏洞。所有数据都安全地存储在您自己的浏览器本地,无需任何后端服务器。
这是一个轻量级的、纯前端的Web应用,旨在帮助团队或个人追踪项目交付情况、隐私合规问题和渗透测试安全漏洞。所有数据都安全地存储在您自己的浏览器本地,无需任何后端服务器。 - Aining777/Project-Security-Dashboard