🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: cve-2025-66398
👤 项目作者: showy-headteacher114
🛠 开发语言: Go
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 11:45:13
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: cve-2025-66398
👤 项目作者: showy-headteacher114
🛠 开发语言: Go
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 11:45:13
📝 项目描述:
Demonstrate exploitation of Signal K Server CVE-2025-66398 allowing unauthenticated attackers to inject backdoor and enable remote code execution.🔗 点击访问项目地址
GitHub
GitHub - showy-headteacher114/cve-2025-66398: Demonstrate exploitation of Signal K Server CVE-2025-66398 allowing unauthenticated…
Demonstrate exploitation of Signal K Server CVE-2025-66398 allowing unauthenticated attackers to inject backdoor and enable remote code execution. - showy-headteacher114/cve-2025-66398
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: CVE-2025-69985
👤 项目作者: tianarsamm
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-24 17:00:02
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: CVE-2025-69985
👤 项目作者: tianarsamm
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-24 17:00:02
📝 项目描述:
Exploit CVE-2025-69985 to bypass authentication and execute remote commands on FUXA versions ≤ 1.2.8 via the /api/runscript endpoint.🔗 点击访问项目地址
GitHub
GitHub - tianarsamm/CVE-2025-69985: Exploit CVE-2025-69985 to bypass authentication and execute remote commands on FUXA versions…
Exploit CVE-2025-69985 to bypass authentication and execute remote commands on FUXA versions ≤ 1.2.8 via the /api/runscript endpoint. - tianarsamm/CVE-2025-69985
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: Wave-Remote-Code-Execution-RCE-
👤 项目作者: watdahecklol32
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-26 05:00:00
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: Wave-Remote-Code-Execution-RCE-
👤 项目作者: watdahecklol32
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-26 05:00:00
📝 项目描述:
A RCE Exploit for the "Wave" executor.🔗 点击访问项目地址
GitHub
watdahecklol32/Wave-Remote-Code-Execution-RCE-
A RCE Exploit for the "Wave" executor. Contribute to watdahecklol32/Wave-Remote-Code-Execution-RCE- development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: Python-RCE-Simulation-Tool
👤 项目作者: denizguney
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-26 12:47:18
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: Python-RCE-Simulation-Tool
👤 项目作者: denizguney
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-26 12:47:18
📝 项目描述:
A technical simulation of Remote Code Execution(RCE) via insecure system calls in Python environments. This edeucational Proof of Concept(PoC) demonstrates the critical importance of input sanitization in web-based command execution scenarios🔗 点击访问项目地址
GitHub
GitHub - denizguney/Python-RCE-Simulation-Tool: A technical simulation of Remote Code Execution(RCE) via insecure system calls…
A technical simulation of Remote Code Execution(RCE) via insecure system calls in Python environments. This edeucational Proof of Concept(PoC) demonstrates the critical importance of input sanitiza...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: IA-Autonomous-RCE-Lab
👤 项目作者: LordMatalas
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-27 18:56:16
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: IA-Autonomous-RCE-Lab
👤 项目作者: LordMatalas
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-27 18:56:16
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - LordMatalas/IA-Autonomous-RCE-Lab
Contribute to LordMatalas/IA-Autonomous-RCE-Lab development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: Telegram-0-Click-RCE-SECURITY-VULNERABILITY-ANALYSIS-REPORT
👤 项目作者: gameworkerkim
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-30 08:49:19
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: Telegram-0-Click-RCE-SECURITY-VULNERABILITY-ANALYSIS-REPORT
👤 项目作者: gameworkerkim
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-30 08:49:19
📝 项目描述:
I have submitted a report on the Telegram sticker vulnerability, SECURITY VULNERABILITY ANALYSIS REPORT Telegram 0-Click RCE vulnerability ZDI-CAN-30207 | CVSS 9.8 CRITICAL.🔗 点击访问项目地址
GitHub
GitHub - gameworkerkim/Telegram-0-Click-RCE-SECURITY-VULNERABILITY-ANALYSIS-REPORT: I have submitted a report on the Telegram sticker…
I have submitted a report on the Telegram sticker vulnerability, SECURITY VULNERABILITY ANALYSIS REPORT Telegram 0-Click RCE vulnerability ZDI-CAN-30207 | CVSS 9.8 CRITICAL. - gameworkerkim/Telegra...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: SQLi-to-RCE-Pipeline
👤 项目作者: melthem23
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-05 01:54:11
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: SQLi-to-RCE-Pipeline
👤 项目作者: melthem23
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-05 01:54:11
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - melthem23/SQLi-to-RCE-Pipeline
Contribute to melthem23/SQLi-to-RCE-Pipeline development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: CodeStrike
👤 项目作者: csejobaer
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-05 12:58:34
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: CodeStrike
👤 项目作者: csejobaer
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-05 12:58:34
📝 项目描述:
AI-Powered Ethical RCE Risk Analyzer🔗 点击访问项目地址
GitHub
csejobaer/CodeStrike
AI-Powered Ethical RCE Risk Analyzer. Contribute to csejobaer/CodeStrike development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: rce_upload_always
👤 项目作者: NULL200OK
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-05 19:57:49
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: rce_upload_always
👤 项目作者: NULL200OK
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-05 19:57:49
📝 项目描述:
🧩 RCE Upload‑Always – LFI + Automated Polyglot Upload Automated Remote Code Execution via LFI & File Upload – with Double Encryption (AES‑256 + XOR) & Key Rotation🔗 点击访问项目地址
GitHub
GitHub - NULL200OK/rce_upload_always: 🧩 RCE Upload‑Always – LFI + Automated Polyglot Upload Automated Remote Code Execution via…
🧩 RCE Upload‑Always – LFI + Automated Polyglot Upload Automated Remote Code Execution via LFI & File Upload – with Double Encryption (AES‑256 + XOR) & Key Rotation - NULL200OK/rce_u...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: AntiDarkSword-TrollStore
👤 项目作者: EolnMsuk
🛠 开发语言: Logos
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-08 08:51:30
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: AntiDarkSword-TrollStore
👤 项目作者: EolnMsuk
🛠 开发语言: Logos
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-08 08:51:30
📝 项目描述:
A localized security framework that mitigates zero-click payloads and browser RCEs through granular WebKit isolation.🔗 点击访问项目地址
GitHub
GitHub - EolnMsuk/AntiDarkSword-TrollStore: A localized security framework that mitigates zero-click payloads and browser RCEs…
A localized security framework that mitigates zero-click payloads and browser RCEs through granular WebKit isolation. - EolnMsuk/AntiDarkSword-TrollStore
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: web-application-penetration-test
👤 项目作者: sampurangill
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-09 14:59:08
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: web-application-penetration-test
👤 项目作者: sampurangill
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-09 14:59:08
📝 项目描述:
Performed a comprehensive web application penetration test identifying critical vulnerabilities including SQL injection, command injection, RCE, and XXE, aligned with OWASP Top 10.🔗 点击访问项目地址
GitHub
GitHub - sampurangill/web-application-penetration-test: Performed a comprehensive web application penetration test identifying…
Performed a comprehensive web application penetration test identifying critical vulnerabilities including SQL injection, command injection, RCE, and XXE, aligned with OWASP Top 10. - sampurangill/w...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: CVE-2023-6553-RCE-Fancy-Exploit
👤 项目作者: Aliyankhan-source
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-10 13:59:49
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: CVE-2023-6553-RCE-Fancy-Exploit
👤 项目作者: Aliyankhan-source
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-10 13:59:49
📝 项目描述:
The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file.🔗 点击访问项目地址
GitHub
GitHub - Aliyankhan-source/CVE-2023-6553-RCE-Fancy-Exploit: The Backup Migration plugin for WordPress is vulnerable to Remote Code…
The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. - Aliyankhan-source/CVE-2023-65...