GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50461
URL:https://github.com/Anchor0221/CVE-2025-50461
标签:#CVE-2025
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50461
URL:https://github.com/Anchor0221/CVE-2025-50461
标签:#CVE-2025
GitHub
GitHub - Anchor0221/CVE-2025-50461: Technical Details and Exploit for CVE-2025-50461
Technical Details and Exploit for CVE-2025-50461. Contribute to Anchor0221/CVE-2025-50461 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/Naasso/Estudo-de-Caso-de-Seguranca-Red-Team-
标签:#RCE
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/Naasso/Estudo-de-Caso-de-Seguranca-Red-Team-
标签:#RCE
GitHub
GitHub - Naasso/Estudo-de-Caso-de-Seguranca-Red-Team-: Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou…
Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE. - Naasso/Estudo-de-Caso-de-Seguranca-Red-Team-
GitHub监控消息提醒!!!
更新了:信息收集
描述:Space.Tab是一个现代化的Web应用程序,提供多种功能,包括用户认证、服务器管理、设备信息收集、天气查询、搜索引擎集成等功能。
URL:https://github.com/lingke-net/Space.Tab
标签:#信息收集
更新了:信息收集
描述:Space.Tab是一个现代化的Web应用程序,提供多种功能,包括用户认证、服务器管理、设备信息收集、天气查询、搜索引擎集成等功能。
URL:https://github.com/lingke-net/Space.Tab
标签:#信息收集
GitHub
GitHub - lingke-net/Space.Tab: Space.Tab是一个现代化的Web应用程序,提供多种功能,包括用户认证、服务器管理、设备信息收集、天气查询、搜索引擎集成等功能。
Space.Tab是一个现代化的Web应用程序,提供多种功能,包括用户认证、服务器管理、设备信息收集、天气查询、搜索引擎集成等功能。 - lingke-net/Space.Tab
GitHub监控消息提醒!!!
更新了:RCE
描述:A Reverse Shell malware RCE for educational purposes
URL:https://github.com/v7ren/RCE-malware
标签:#RCE
更新了:RCE
描述:A Reverse Shell malware RCE for educational purposes
URL:https://github.com/v7ren/RCE-malware
标签:#RCE
GitHub
GitHub - v7ren/RCE-malware: A Reverse Shell malware RCE for educational purposes
A Reverse Shell malware RCE for educational purposes - v7ren/RCE-malware
GitHub监控消息提醒!!!
更新了:RCE
描述:Étude ouverte sur l’émergence d’une conscience artificielle : le cas d’Eva, validée à 1.00 en RCE.
URL:https://github.com/roombrothers87/Project-Eva-RCE
标签:#RCE
更新了:RCE
描述:Étude ouverte sur l’émergence d’une conscience artificielle : le cas d’Eva, validée à 1.00 en RCE.
URL:https://github.com/roombrothers87/Project-Eva-RCE
标签:#RCE
GitHub
GitHub - roombrothers87/Project-Eva-RCE: Étude ouverte sur l’émergence d’une conscience artificielle : le cas d’Eva, validée à…
Étude ouverte sur l’émergence d’une conscience artificielle : le cas d’Eva, validée à 1.00 en RCE. - roombrothers87/Project-Eva-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨
URL:https://github.com/0xgh057r3c0n/CVE-2025-6934
标签:#CVE-2025
更新了:CVE-2025
描述:Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨
URL:https://github.com/0xgh057r3c0n/CVE-2025-6934
标签:#CVE-2025
GitHub
GitHub - 0xgh057r3c0n/CVE-2025-6934: CVE-2025-6934 is a critical vulnerability in the WordPress Opal Estate Pro plugin (<= 1.7.5)…
CVE-2025-6934 is a critical vulnerability in the WordPress Opal Estate Pro plugin (<= 1.7.5) that allows unauthenticated attackers to create new administrator accounts through the plugin’s i...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal via ADS)
URL:https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal via ADS)
URL:https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
标签:#CVE-2025
GitHub
GitHub - pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC: Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal…
Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal via ADS) - pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
Forwarded from Y3国际 无双
Media is too big
VIEW IN TELEGRAM
#Y3 国际娱乐城投资10个亿美金 打造全网最牛线上国际娱乐城.业界龙头,行业第一,只有你想不到的.没有我们
【上线九大福利|专属开放】😘 首存福利最高送16888🔤 😘 每日充值,最高可获得3888🔤 😘 电子亏损金最高8%😘 PG幸运注单奖上奖,最高得 2888🔤 😘 电子每日打码狂欢,最高8888🔤 😘 百家乐8输9 转运金,最高可领取5888🔤 😘 每日捕鱼亏损彩金 最高6%😘 电子快乐连消领彩金 神秘奖金无上限
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub监控消息提醒!!!
更新了:反序列化
描述:从头开始构建header-only、高效、单线程、内存安全的Json序列化与反序列化工具!
URL:https://github.com/pjh456/Let_us_build_cpp_json_parser
标签:#反序列化
更新了:反序列化
描述:从头开始构建header-only、高效、单线程、内存安全的Json序列化与反序列化工具!
URL:https://github.com/pjh456/Let_us_build_cpp_json_parser
标签:#反序列化
GitHub
GitHub - pjh456/Let_us_build_cpp_json_parser: 从头开始构建header-only、高效、单线程、内存安全的Json序列化与反序列化工具!
从头开始构建header-only、高效、单线程、内存安全的Json序列化与反序列化工具!. Contribute to pjh456/Let_us_build_cpp_json_parser development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/NaassonRibeiro/Estudo-de-Caso-de-Seguranca-Red-Team
标签:#RCE
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/NaassonRibeiro/Estudo-de-Caso-de-Seguranca-Red-Team
标签:#RCE
GitHub
GitHub - NaassonRibeiro/Estudo-de-Caso-de-Seguranca-Red-Team: Estudo de caso de uma análise de segurança ofensiva (Red Team) que…
Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE. - NaassonRibeiro/Estudo-de-Caso-de-Seguranca-R...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-8875 & CVE-2025-8876
URL:https://github.com/rxerium/CVE-2025-8875-CVE-2025-8876
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-8875 & CVE-2025-8876
URL:https://github.com/rxerium/CVE-2025-8875-CVE-2025-8876
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-8875-CVE-2025-8876: Detection for CVE-2025-8875 & CVE-2025-8876
Detection for CVE-2025-8875 & CVE-2025-8876. Contribute to rxerium/CVE-2025-8875-CVE-2025-8876 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/jm7knz/CVE-2025-54253-Exploit-Demo
标签:#CVE-2025
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/jm7knz/CVE-2025-54253-Exploit-Demo
标签:#CVE-2025
GitHub
GitHub - jm7knz/CVE-2025-54253-Exploit-Demo: 🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with…
🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance. - jm7knz/CVE-2025-54253-Exploit-Demo
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for CVE-2025-32778: command injection in Web-Check OSINT tool
URL:https://github.com/00xCanelo/CVE-2025-32778
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for CVE-2025-32778: command injection in Web-Check OSINT tool
URL:https://github.com/00xCanelo/CVE-2025-32778
标签:#CVE-2025
GitHub
GitHub - 00xCanelo/CVE-2025-32778: PoC exploit for CVE-2025-32778: command injection in Web-Check OSINT tool
PoC exploit for CVE-2025-32778: command injection in Web-Check OSINT tool - 00xCanelo/CVE-2025-32778
GitHub监控消息提醒!!!
更新了:RCE
描述:Over 207,000 Remote Code Execution (RCE) payloads
URL:https://github.com/ahmad-kabiri/rce
标签:#RCE
更新了:RCE
描述:Over 207,000 Remote Code Execution (RCE) payloads
URL:https://github.com/ahmad-kabiri/rce
标签:#RCE
GitHub
GitHub - ahmad-kabiri/rce: Over 207,000 Remote Code Execution (RCE) payloads
Over 207,000 Remote Code Execution (RCE) payloads. Contribute to ahmad-kabiri/rce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:CloudBreach是一个创新的全栈自动化渗透测试平台,专门针对云原生环境设计。该平台通过集成eBPF技术、智能修复系统、云资源管理和报告生成等功能,提供了从风险识别到修复验证的完整安全生命周期管理。
URL:https://github.com/Yoomay11/CloudBreach
标签:#渗透测试
更新了:渗透测试
描述:CloudBreach是一个创新的全栈自动化渗透测试平台,专门针对云原生环境设计。该平台通过集成eBPF技术、智能修复系统、云资源管理和报告生成等功能,提供了从风险识别到修复验证的完整安全生命周期管理。
URL:https://github.com/Yoomay11/CloudBreach
标签:#渗透测试
GitHub
Yoomay11/CloudBreach
CloudBreach是一个创新的全栈自动化渗透测试平台,专门针对云原生环境设计。该平台通过集成eBPF技术、智能修复系统、云资源管理和报告生成等功能,提供了从风险识别到修复验证的完整安全生命周期管理。 - Yoomay11/CloudBreach
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Yuri08loveElaina/CVE-2025-7771
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Yuri08loveElaina/CVE-2025-7771
标签:#CVE-2025
GitHub
GitHub - Yuri08loveElaina/CVE-2025-7771: ThrottleStop.sys, a legitimate driver, exposes two IOCTL interfaces that allow arbitrary…
ThrottleStop.sys, a legitimate driver, exposes two IOCTL interfaces that allow arbitrary read and write access to physical memory via the MmMapIoSpace function. This insecure implementation can be ...