GitHub监控消息提醒!!!
更新了:反序列化
描述:项目初始化:订阅kafka消息,根据消息中的文件目录寻找对应文件后对文件进行反序列化然后写入es.
URL:https://github.com/Arvinshu/EIS
标签:#反序列化
更新了:反序列化
描述:项目初始化:订阅kafka消息,根据消息中的文件目录寻找对应文件后对文件进行反序列化然后写入es.
URL:https://github.com/Arvinshu/EIS
标签:#反序列化
GitHub
GitHub - Arvinshu/EIS: 项目初始化:订阅kafka消息,根据消息中的文件目录寻找对应文件后对文件进行反序列化然后写入es.
项目初始化:订阅kafka消息,根据消息中的文件目录寻找对应文件后对文件进行反序列化然后写入es. Contribute to Arvinshu/EIS development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:(CVE-2022-22965)PoC 应用程序和漏洞利用
URL:https://github.com/ZapcoMan/spring4shell-vulnerable-application
标签:#漏洞利用
更新了:漏洞利用
描述:(CVE-2022-22965)PoC 应用程序和漏洞利用
URL:https://github.com/ZapcoMan/spring4shell-vulnerable-application
标签:#漏洞利用
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept (PoC) that exploits the CVE-2025-49144 vulnerability in the Notepad++ 8.8.1 installer.
URL:https://github.com/b0ySie7e/Notepad-8.8.1_CVE-2025-49144
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept (PoC) that exploits the CVE-2025-49144 vulnerability in the Notepad++ 8.8.1 installer.
URL:https://github.com/b0ySie7e/Notepad-8.8.1_CVE-2025-49144
标签:#CVE-2025
GitHub
GitHub - b0ySie7e/Notepad-8.8.1_CVE-2025-49144: Proof of Concept (PoC) that exploits the CVE-2025-49144 vulnerability in the Notepad++…
Proof of Concept (PoC) that exploits the CVE-2025-49144 vulnerability in the Notepad++ 8.8.1 installer. - b0ySie7e/Notepad-8.8.1_CVE-2025-49144
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A simple proof of concept for WinRAR Path Traversal | RCE | CVE-2025-6218
URL:https://github.com/ignis-sec/CVE-2025-6218
标签:#CVE-2025
更新了:CVE-2025
描述:A simple proof of concept for WinRAR Path Traversal | RCE | CVE-2025-6218
URL:https://github.com/ignis-sec/CVE-2025-6218
标签:#CVE-2025
GitHub
GitHub - ignis-sec/CVE-2025-6218: A simple proof of concept for WinRAR Path Traversal | RCE | CVE-2025-6218
A simple proof of concept for WinRAR Path Traversal | RCE | CVE-2025-6218 - ignis-sec/CVE-2025-6218
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Reproduce CVE-2022-32250 and CVE-2025-21756 by tampering with modprobe_path and hijacking control flow, respectively.
URL:https://github.com/KuanKuanQAQ/cve-testing
标签:#CVE-2025
更新了:CVE-2025
描述:Reproduce CVE-2022-32250 and CVE-2025-21756 by tampering with modprobe_path and hijacking control flow, respectively.
URL:https://github.com/KuanKuanQAQ/cve-testing
标签:#CVE-2025
GitHub
GitHub - KuanKuanQAQ/cve-testing: Reproduce CVE-2022-32250 and CVE-2025-21756 by tampering with modprobe_path and hijacking control…
Reproduce CVE-2022-32250 and CVE-2025-21756 by tampering with modprobe_path and hijacking control flow, respectively. - KuanKuanQAQ/cve-testing
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:> 🔓 Proof-of-Concept for a fictional Next.js middleware bypass (CVE-2025-29927) — craft sub-requests to test protected routes.
URL:https://github.com/m2hcz/PoC-for-Next.js-Middleware
标签:#CVE-2025
更新了:CVE-2025
描述:> 🔓 Proof-of-Concept for a fictional Next.js middleware bypass (CVE-2025-29927) — craft sub-requests to test protected routes.
URL:https://github.com/m2hcz/PoC-for-Next.js-Middleware
标签:#CVE-2025
GitHub
GitHub - m2hcz/PoC-for-Next.js-Middleware: > 🔓 Proof-of-Concept for a fictional Next.js middleware bypass (CVE-2025-29927) — craft…
> 🔓 Proof-of-Concept for a fictional Next.js middleware bypass (CVE-2025-29927) — craft sub-requests to test protected routes. - m2hcz/PoC-for-Next.js-Middleware
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件
URL:https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
标签:#CVE-2025
更新了:CVE-2025
描述:详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件
URL:https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
标签:#CVE-2025
GitHub
GitHub - mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-: 详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件
详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件. Contribute to mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:一套标准化的数字取证与应急响应信息采集规则格式规范。
URL:https://github.com/Just-Hack-For-Fun/OpenForensicRules
标签:#应急响应
更新了:应急响应
描述:一套标准化的数字取证与应急响应信息采集规则格式规范。
URL:https://github.com/Just-Hack-For-Fun/OpenForensicRules
标签:#应急响应
GitHub
GitHub - Just-Hack-For-Fun/OpenForensicRules: 一套标准化的数字取证与应急响应信息采集规则格式规范。
一套标准化的数字取证与应急响应信息采集规则格式规范。. Contribute to Just-Hack-For-Fun/OpenForensicRules development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC and Setup for CVE-2025-4664
URL:https://github.com/amalmurali47/cve-2025-4664
标签:#CVE-2025
更新了:CVE-2025
描述:PoC and Setup for CVE-2025-4664
URL:https://github.com/amalmurali47/cve-2025-4664
标签:#CVE-2025
GitHub
GitHub - amalmurali47/cve-2025-4664: PoC and Setup for CVE-2025-4664
PoC and Setup for CVE-2025-4664. Contribute to amalmurali47/cve-2025-4664 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows machine
URL:https://github.com/maverick-doan/win-rce-checker
标签:#RCE
更新了:RCE
描述:This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows machine
URL:https://github.com/maverick-doan/win-rce-checker
标签:#RCE
GitHub
GitHub - maverick-doan/win-rce-checker: This is a simple and benign Go script that red teamers can drop and attempt execution to…
This is a simple and benign Go script that red teamers can drop and attempt execution to test RCE on Windows machine - maverick-doan/win-rce-checker
GitHub监控消息提醒!!!
更新了:渗透测试
描述:本项目是一个基于FastAPI+React的Web安全自动化渗透测试平台,集成了资产发现、端口探测、网站信息抓取、漏洞扫描等功能,支持JWT认证、API自动化测试、前端进度条展示、工具状态检测、全流程自动化、结构化结果展示、项目/任务归档,适配云端环境。
URL:https://github.com/wooluo/scan
标签:#渗透测试
更新了:渗透测试
描述:本项目是一个基于FastAPI+React的Web安全自动化渗透测试平台,集成了资产发现、端口探测、网站信息抓取、漏洞扫描等功能,支持JWT认证、API自动化测试、前端进度条展示、工具状态检测、全流程自动化、结构化结果展示、项目/任务归档,适配云端环境。
URL:https://github.com/wooluo/scan
标签:#渗透测试
GitHub
GitHub - wooluo/scan: 本项目是一个基于FastAPI+React的Web安全自动化渗透测试平台,集成了资产发现、端口探测、网站信息抓取、漏洞扫描等功能,支持JWT认证、API自动化测试、前端进度条展示、工具状态检测、全流程自动化、…
本项目是一个基于FastAPI+React的Web安全自动化渗透测试平台,集成了资产发现、端口探测、网站信息抓取、漏洞扫描等功能,支持JWT认证、API自动化测试、前端进度条展示、工具状态检测、全流程自动化、结构化结果展示、项目/任务归档,适配云端环境。 - wooluo/scan
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Simple Proof of Concept for CVE-2025-6218, demonstrating the exploitation of a vulnerability involving WinRAR’s handling of archive extraction paths.
URL:https://github.com/skimask1690/CVE-2025-6218-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Simple Proof of Concept for CVE-2025-6218, demonstrating the exploitation of a vulnerability involving WinRAR’s handling of archive extraction paths.
URL:https://github.com/skimask1690/CVE-2025-6218-POC
标签:#CVE-2025
GitHub
GitHub - skimask1690/CVE-2025-6218-POC: Proof of Concept for CVE-2025-6218, demonstrating the exploitation of a vulnerability in…
Proof of Concept for CVE-2025-6218, demonstrating the exploitation of a vulnerability in WinRAR versions 7.11 and under, involving improper handling of archive extraction paths. - skimask1690/CVE-2...
GitHub监控消息提醒!!!
更新了:RCE
描述:codeBox RCE is a service that provides a secure, containerized environment to run code remotely. The API supports Python, JavaScript, and C++, with potential for more languages in the future.
URL:https://github.com/Rajivkumawat3/code-box
标签:#RCE
更新了:RCE
描述:codeBox RCE is a service that provides a secure, containerized environment to run code remotely. The API supports Python, JavaScript, and C++, with potential for more languages in the future.
URL:https://github.com/Rajivkumawat3/code-box
标签:#RCE
GitHub
GitHub - Rajivkumawat3/code-box: codeBox RCE is a service that provides a secure, containerized environment to run code remotely.…
codeBox RCE is a service that provides a secure, containerized environment to run code remotely. The API supports Python, JavaScript, and C++, with potential for more languages in the future. - Raj...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
URL:https://github.com/4m3rr0r/CVE-2025-47812
标签:#CVE-2025
更新了:CVE-2025
描述:Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
URL:https://github.com/4m3rr0r/CVE-2025-47812
标签:#CVE-2025
GitHub
GitHub - 4m3rr0r/CVE-2025-47812-poc: Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812) - 4m3rr0r/CVE-2025-47812-poc
GitHub监控消息提醒!!!
更新了:RCE
描述:Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
URL:https://github.com/4m3rr0r/CVE-2025-47812-poc
标签:#RCE
更新了:RCE
描述:Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
URL:https://github.com/4m3rr0r/CVE-2025-47812-poc
标签:#RCE
GitHub
GitHub - 4m3rr0r/CVE-2025-47812-poc: Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812) - 4m3rr0r/CVE-2025-47812-poc
GitHub监控消息提醒!!!
更新了:代码审计
描述:X-SAST 替代Seay的轻量级多语言支持的GUI代码审计工具
URL:https://github.com/winezer0/X-SAST-Public
标签:#代码审计
更新了:代码审计
描述:X-SAST 替代Seay的轻量级多语言支持的GUI代码审计工具
URL:https://github.com/winezer0/X-SAST-Public
标签:#代码审计
GitHub
GitHub - winezer0/X-SAST-Public: X-SAST 替代Seay的轻量级多语言支持的GUI代码审计工具
X-SAST 替代Seay的轻量级多语言支持的GUI代码审计工具. Contribute to winezer0/X-SAST-Public development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32463 Proof of concept
URL:https://github.com/K1tt3h/CVE-2025-32463-POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32463 Proof of concept
URL:https://github.com/K1tt3h/CVE-2025-32463-POC
标签:#CVE-2025
GitHub
GitHub - K1tt3h/CVE-2025-32463-POC: CVE-2025-32463 Proof of concept
CVE-2025-32463 Proof of concept. Contribute to K1tt3h/CVE-2025-32463-POC development by creating an account on GitHub.