GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔥 React2Shell Toolkit - CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
标签:#CVE-2025
更新了:CVE-2025
描述:🔥 React2Shell Toolkit - CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
标签:#CVE-2025
GitHub
GitHub - M4xSec/CVE-2025-55182-React2Shell-RCE-Shell: CVE-2025-55182 – React2Shell: Proof-of-Concept Remote Code Execution (RCE)…
CVE-2025-55182 – React2Shell: Proof-of-Concept Remote Code Execution (RCE) exploit for Next.js apps. Features an interactive shell prompt to test and demonstrate the vulnerability in real time. Use...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠 Exploit CVE-2025-8088 with this Python tool to generate malicious WinRAR archives that ensure payload persistence in Windows startup folders.
URL:https://github.com/fsoc-ghost-0x/Fsociety-CVE-2025-24071-NTLM-Coercion
标签:#CVE-2025
更新了:CVE-2025
描述:🛠 Exploit CVE-2025-8088 with this Python tool to generate malicious WinRAR archives that ensure payload persistence in Windows startup folders.
URL:https://github.com/fsoc-ghost-0x/Fsociety-CVE-2025-24071-NTLM-Coercion
标签:#CVE-2025
GitHub
GitHub - fsoc-ghost-0x/Fsociety-CVE-2025-24071-NTLM-Coercion: Hello friend. This is the Fsociety Exploit Framework for CVE-2025…
Hello friend. This is the Fsociety Exploit Framework for CVE-2025-24071. Generates malicious .library-ms files to steal NTLMv2 hashes. Includes a 'Living Terminal' Cinematic Mode, D...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #EXP #CVE #Exploit
📦 项目名称: Slient-URL-Exploit
👤 项目作者: Frozoewn
🛠 开发语言: C#
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-05 12:00:12
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #EXP #CVE #Exploit
📦 项目名称: Slient-URL-Exploit
👤 项目作者: Frozoewn
🛠 开发语言: C#
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-05 12:00:12
📝 项目描述:
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.🔗 点击访问项目地址
GitHub
GitHub - Frozoewn/Slient-URL-Exploit: URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing…
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication. - Frozoewn/Slient-URL-Exploit
🚨 GitHub 监控消息提醒
🚨 发现关键词: #EXP #Exploit
📦 项目名称: Exploit-Agent
👤 项目作者: isshiki-dev
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-06 19:00:08
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #EXP #Exploit
📦 项目名称: Exploit-Agent
👤 项目作者: isshiki-dev
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-06 19:00:08
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - isshiki-dev/Exploit-Agent
Contribute to isshiki-dev/Exploit-Agent development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #EXP #CVE #Exploit
📦 项目名称: PDF-FUD-Exploit
👤 项目作者: Frozoewn
🛠 开发语言: C++
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 08:59:53
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #EXP #CVE #Exploit
📦 项目名称: PDF-FUD-Exploit
👤 项目作者: Frozoewn
🛠 开发语言: C++
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 08:59:53
📝 项目描述:
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates🔗 点击访问项目地址
GitHub
GitHub - Frozoewn/PDF-FUD-Exploit: A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling…
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates - Frozoewn/PDF-FUD-Exploit
🚨 GitHub 监控消息提醒
🚨 发现关键词: #EXP #CVE #Exploit
📦 项目名称: explain-openclaw
👤 项目作者: centminmod
🛠 开发语言: None
⭐ Star数量: 8 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-08 15:00:13
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #EXP #CVE #Exploit
📦 项目名称: explain-openclaw
👤 项目作者: centminmod
🛠 开发语言: None
⭐ Star数量: 8 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-08 15:00:13
📝 项目描述:
Multi-AI documentation for OpenClaw: architecture, security audits, deployment guide🔗 点击访问项目地址
GitHub
GitHub - centminmod/explain-openclaw: Multi-AI documentation for OpenClaw: architecture, security audits, deployment guide
Multi-AI documentation for OpenClaw: architecture, security audits, deployment guide - centminmod/explain-openclaw