🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: Rooter
👤 项目作者: Syn2Much
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-09 21:58:16
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: Rooter
👤 项目作者: Syn2Much
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-09 21:58:16
📝 项目描述:
Fingerprints IOT devices and flags routers running firmware affected by known RCE (Remote Code Execution) vulnerabilities. Targets MikroTik RouterOS, Huawei HG532, and TP-Link devices.🔗 点击访问项目地址
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: Veritensor
👤 项目作者: arsbr
🛠 开发语言: Python
⭐ Star数量: 62 | 🍴 Fork数量: 4
📅 更新时间: 2026-02-10 19:54:23
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: Veritensor
👤 项目作者: arsbr
🛠 开发语言: Python
⭐ Star数量: 62 | 🍴 Fork数量: 4
📅 更新时间: 2026-02-10 19:54:23
📝 项目描述:
Secure your AI Supply Chain. A static analysis tool to scan Models, Datasets, and Notebooks for RCE, Data Poisoning, and Stealth Attacks. Stop guessing, start proving.🔗 点击访问项目地址
GitHub
GitHub - arsbr/Veritensor: The Anti-Virus for AI Artifacts & RAG Firewall. A static analysis tool scanning Models and Notebooks…
The Anti-Virus for AI Artifacts & RAG Firewall. A static analysis tool scanning Models and Notebooks for RCE, Datasets and RAG docs for Data Poisoning, PII, and Prompt Injections. Secure yo...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: Kioptrix-Level-3-
👤 项目作者: zlatster-doge
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-11 09:53:47
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: Kioptrix-Level-3-
👤 项目作者: zlatster-doge
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-11 09:53:47
📝 项目描述:
To perform RCE on the Kioptrix 3 machine and grab the user account details stored on the MYSQL server.🔗 点击访问项目地址
GitHub
GitHub - zlatster-doge/Kioptrix-Level-3-: To perform RCE on the Kioptrix 3 machine and grab the user account details stored on…
To perform RCE on the Kioptrix 3 machine and grab the user account details stored on the MYSQL server. - zlatster-doge/Kioptrix-Level-3-
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: react2shell-ultimate
👤 项目作者: Lennonxlz
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-13 17:00:02
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: react2shell-ultimate
👤 项目作者: Lennonxlz
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-13 17:00:02
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - Lennonxlz/react2shell-ultimate
Contribute to Lennonxlz/react2shell-ultimate development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: upwork-malware-lazarus-analysis
👤 项目作者: soulcore-dev
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-16 19:00:22
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: upwork-malware-lazarus-analysis
👤 项目作者: soulcore-dev
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-16 19:00:22
📝 项目描述:
Pentest & Threat Intelligence: Lazarus Group (DPRK) malware analysis from Upwork supply chain attack. 3 RCE vectors, MITRE ATT&CK G1052 attribution, full C2 mapping.🔗 点击访问项目地址
GitHub
GitHub - soulcore-dev/upwork-malware-lazarus-analysis: Pentest & Threat Intelligence: Lazarus Group (DPRK) malware analysis from…
Pentest & Threat Intelligence: Lazarus Group (DPRK) malware analysis from Upwork supply chain attack. 3 RCE vectors, MITRE ATT&CK G1052 attribution, full C2 mapping. - soulcore-dev/...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: Vulnerability-Research-Exploitation
👤 项目作者: karcibald
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-16 21:58:47
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: Vulnerability-Research-Exploitation
👤 项目作者: karcibald
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-16 21:58:47
📝 项目描述:
A comprehensive lab report on the penetration testing lifecycle, featuring manual enumeration, exploit research using Searchsploit, and unauthenticated RCE on a vulnerable web application.🔗 点击访问项目地址
GitHub
GitHub - karcibald/Vulnerability-Research-Exploitation: A comprehensive lab report on the penetration testing lifecycle, featuring…
A comprehensive lab report on the penetration testing lifecycle, featuring manual enumeration, exploit research using Searchsploit, and unauthenticated RCE on a vulnerable web application. - karcib...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: xwiki-rce
👤 项目作者: ffqnayt
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-20 16:59:55
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: xwiki-rce
👤 项目作者: ffqnayt
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-20 16:59:55
📝 项目描述:
🛠️ Exploit a critical remote code execution vulnerability in XWiki, affecting its confidentiality and integrity; patches available in recent versions.🔗 点击访问项目地址
GitHub
GitHub - ffqnayt/xwiki-rce: 🛠️ Exploit a critical remote code execution vulnerability in XWiki, affecting its confidentiality and…
🛠️ Exploit a critical remote code execution vulnerability in XWiki, affecting its confidentiality and integrity; patches available in recent versions. - ffqnayt/xwiki-rce
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: phoenix
👤 项目作者: anshumaan-10
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-25 11:59:31
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: phoenix
👤 项目作者: anshumaan-10
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-25 11:59:31
📝 项目描述:
Intentionally vulnerable Flask app for Kubernetes security lab (RCE + host escape)🔗 点击访问项目地址
GitHub
GitHub - anshumaan-10/phoenix: Intentionally vulnerable Flask app for Kubernetes security lab (RCE + host escape)
Intentionally vulnerable Flask app for Kubernetes security lab (RCE + host escape) - anshumaan-10/phoenix
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: KeySpy
👤 项目作者: 3rr0r-505
🛠 开发语言: Python
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 05:59:28
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: KeySpy
👤 项目作者: 3rr0r-505
🛠 开发语言: Python
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 05:59:28
📝 项目描述:
Advance Python Keylogger & Remote Payload Executor for windows🔗 点击访问项目地址
GitHub
GitHub - 3rr0r-505/KeySpy: Advance Python Keylogger & Remote Payload Executor for windows
Advance Python Keylogger & Remote Payload Executor for windows - 3rr0r-505/KeySpy
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: cve-2024-56348
👤 项目作者: Msakhana68
🛠 开发语言: FreeMarker
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 03:23:01
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: cve-2024-56348
👤 项目作者: Msakhana68
🛠 开发语言: FreeMarker
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 03:23:01
📝 项目描述:
Demonstrate an authentication bypass and remote code execution exploit targeting JetBrains TeamCity versions before 2024.12 via REST API abuse.🔗 点击访问项目地址
GitHub
GitHub - Msakhana68/cve-2024-56348: Demonstrate an authentication bypass and remote code execution exploit targeting JetBrains…
Demonstrate an authentication bypass and remote code execution exploit targeting JetBrains TeamCity versions before 2024.12 via REST API abuse. - Msakhana68/cve-2024-56348
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: cve-2025-66398
👤 项目作者: showy-headteacher114
🛠 开发语言: Go
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 11:45:13
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: cve-2025-66398
👤 项目作者: showy-headteacher114
🛠 开发语言: Go
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 11:45:13
📝 项目描述:
Demonstrate exploitation of Signal K Server CVE-2025-66398 allowing unauthenticated attackers to inject backdoor and enable remote code execution.🔗 点击访问项目地址
GitHub
GitHub - showy-headteacher114/cve-2025-66398
Contribute to showy-headteacher114/cve-2025-66398 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: CVE-2025-69985
👤 项目作者: tianarsamm
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-24 17:00:02
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: CVE-2025-69985
👤 项目作者: tianarsamm
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-24 17:00:02
📝 项目描述:
Exploit CVE-2025-69985 to bypass authentication and execute remote commands on FUXA versions ≤ 1.2.8 via the /api/runscript endpoint.🔗 点击访问项目地址
GitHub
GitHub - tianarsamm/CVE-2025-69985: Exploit CVE-2025-69985 to bypass authentication and execute remote commands on FUXA versions…
Exploit CVE-2025-69985 to bypass authentication and execute remote commands on FUXA versions ≤ 1.2.8 via the /api/runscript endpoint. - tianarsamm/CVE-2025-69985
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: Wave-Remote-Code-Execution-RCE-
👤 项目作者: watdahecklol32
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-26 05:00:00
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: Wave-Remote-Code-Execution-RCE-
👤 项目作者: watdahecklol32
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-26 05:00:00
📝 项目描述:
A RCE Exploit for the "Wave" executor.🔗 点击访问项目地址
GitHub
watdahecklol32/Wave-Remote-Code-Execution-RCE-
A RCE Exploit for the "Wave" executor. Contribute to watdahecklol32/Wave-Remote-Code-Execution-RCE- development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: Python-RCE-Simulation-Tool
👤 项目作者: denizguney
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-26 12:47:18
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: Python-RCE-Simulation-Tool
👤 项目作者: denizguney
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-26 12:47:18
📝 项目描述:
A technical simulation of Remote Code Execution(RCE) via insecure system calls in Python environments. This edeucational Proof of Concept(PoC) demonstrates the critical importance of input sanitization in web-based command execution scenarios🔗 点击访问项目地址
GitHub
GitHub - denizguney/Python-RCE-Simulation-Tool: A technical simulation of Remote Code Execution(RCE) via insecure system calls…
A technical simulation of Remote Code Execution(RCE) via insecure system calls in Python environments. This edeucational Proof of Concept(PoC) demonstrates the critical importance of input sanitiza...