🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: ai-security-labs
👤 项目作者: aftabkhan-3
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-21 13:53:19
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: ai-security-labs
👤 项目作者: aftabkhan-3
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-21 13:53:19
📝 项目描述:
This repository documents my hands-on learning in AI + Agent Security, focusing on real-world vulnerability patterns such as: Tool Injection Execution Injection (RCE) Instruction Injection Data Leakage Auth & Privilege Failures🔗 点击访问项目地址
GitHub
GitHub - aftabkhan-3/ai-security-labs: This repository documents my hands-on learning in AI + Agent Security, focusing on real…
This repository documents my hands-on learning in AI + Agent Security, focusing on real-world vulnerability patterns such as: Tool Injection Execution Injection (RCE) Instruction Injection Data Le...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: DCS-935L-HNAP-Service-CVE
👤 项目作者: 0xcc12138
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-22 07:56:56
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: DCS-935L-HNAP-Service-CVE
👤 项目作者: 0xcc12138
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-22 07:56:56
📝 项目描述:
This vulnerability exists in the HNAP service handler of the D-Link DCS-935L firmware. An attacker can exploit a flaw in `AESDecrypt` and its underlying decoding function by sending a specially crafted malicious XML request, triggering a stack-based buffer overflow and subsequently achieving Remote Code Execution (RCE).🔗 点击访问项目地址
GitHub
GitHub - 0xcc12138/DCS-935L-HNAP-Service-CVE: This vulnerability exists in the HNAP service handler of the D-Link DCS-935L firmware.…
This vulnerability exists in the HNAP service handler of the D-Link DCS-935L firmware. An attacker can exploit a flaw in `AESDecrypt` and its underlying decoding function by sending a specially cra...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: flight-risk
👤 项目作者: joaoreis13
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-22 12:58:28
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: flight-risk
👤 项目作者: joaoreis13
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-22 12:58:28
📝 项目描述:
Security toolkit for CVE-2025-55182 (React2Shell) — scan, detect, correlate, and test React Server Components RCE vulnerability🔗 点击访问项目地址
GitHub
GitHub - joaoreis13/flight-risk: Security toolkit for CVE-2025-55182 (React2Shell) — scan, detect, correlate, and test React Server…
Security toolkit for CVE-2025-55182 (React2Shell) — scan, detect, correlate, and test React Server Components RCE vulnerability - joaoreis13/flight-risk
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: IMF-1-walkthrough
👤 项目作者: smrayyans
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-24 15:53:12
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: IMF-1-walkthrough
👤 项目作者: smrayyans
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-24 15:53:12
📝 项目描述:
VulnHub IMF: 1 Boot2Root walkthrough — web recon, PHP strcmp bypass, SQL injection, file upload WAF bypass, RCE, and 32-bit buffer overflow to root🔗 点击访问项目地址
GitHub
GitHub - smrayyans/IMF-1-walkthrough: VulnHub IMF: 1 Boot2Root walkthrough — web recon, PHP strcmp bypass, SQL injection, file…
VulnHub IMF: 1 Boot2Root walkthrough — web recon, PHP strcmp bypass, SQL injection, file upload WAF bypass, RCE, and 32-bit buffer overflow to root - smrayyans/IMF-1-walkthrough
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: DVWA-File-Upload-RCE
👤 项目作者: danarhirany300-ctrl
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-25 10:56:34
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: DVWA-File-Upload-RCE
👤 项目作者: danarhirany300-ctrl
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-25 10:56:34
📝 项目描述:
File Upload to Remote Command Execution and Privilege Escalation (DVWA Lab)🔗 点击访问项目地址
GitHub
GitHub - danarhirany300-ctrl/DVWA-File-Upload-RCE: File Upload to Remote Command Execution and Privilege Escalation (DVWA Lab)
File Upload to Remote Command Execution and Privilege Escalation (DVWA Lab) - danarhirany300-ctrl/DVWA-File-Upload-RCE
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: meok-mcp-injection-scan-mcp
👤 项目作者: CSOAI-ORG
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-26 15:59:22
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: meok-mcp-injection-scan-mcp
👤 项目作者: CSOAI-ORG
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-26 15:59:22
📝 项目描述:
MCP injection-scanner — 30+ canonical detection rules across 5 severity tiers for the April 2026 Anthropic MCP RCE class. By MEOK AI Labs.🔗 点击访问项目地址
GitHub
GitHub - CSOAI-ORG/meok-mcp-injection-scan-mcp: MCP injection-scanner — 30+ canonical detection rules across 5 severity tiers for…
MCP injection-scanner — 30+ canonical detection rules across 5 severity tiers for the April 2026 Anthropic MCP RCE class. By MEOK AI Labs. - CSOAI-ORG/meok-mcp-injection-scan-mcp
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: CVE-2024-47176
👤 项目作者: deancooreman
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-26 20:56:57
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: CVE-2024-47176
👤 项目作者: deancooreman
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-26 20:56:57
📝 项目描述:
Automated VirtualBox lab environment to exploit CVE-2024-47176 — an unauthenticated RCE vulnerability in CUPS — using a custom Python exploit and Kali Linux.🔗 点击访问项目地址
GitHub
GitHub - deancooreman/CVE-2024-47176: Automated VirtualBox lab environment to exploit CVE-2024-47176 — an unauthenticated RCE vulnerability…
Automated VirtualBox lab environment to exploit CVE-2024-47176 — an unauthenticated RCE vulnerability in CUPS — using a custom Python exploit and Kali Linux. - deancooreman/CVE-2024-47176
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: Web-App-Pentest-Hammer
👤 项目作者: HarryVuthy
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-27 07:51:59
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: Web-App-Pentest-Hammer
👤 项目作者: HarryVuthy
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-27 07:51:59
📝 项目描述:
Full web application penetration testing project including exploitation of JWT, RCE, and authentication flaws🔗 点击访问项目地址
GitHub
GitHub - HarryVuthy/Web-App-Pentest-Hammer: Full web application penetration testing project including exploitation of JWT, RCE…
Full web application penetration testing project including exploitation of JWT, RCE, and authentication flaws - HarryVuthy/Web-App-Pentest-Hammer
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #执行 #Remote
📦 项目名称: BUUCTF.GeekGrandChallenge_2019_RCEME
👤 项目作者: hengdonghui
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-29 04:54:52
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #执行 #Remote
📦 项目名称: BUUCTF.GeekGrandChallenge_2019_RCEME
👤 项目作者: hengdonghui
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-29 04:54:52
📝 项目描述:
BUUCTF.GeekGrandChallenge_2019_RCEME🔗 点击访问项目地址
GitHub
GitHub - hengdonghui/BUUCTF.GeekGrandChallenge_2019_RCEME: BUUCTF.GeekGrandChallenge_2019_RCEME
BUUCTF.GeekGrandChallenge_2019_RCEME. Contribute to hengdonghui/BUUCTF.GeekGrandChallenge_2019_RCEME development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: SSRF_Redis_RCE
👤 项目作者: Manlware
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-30 17:55:37
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: SSRF_Redis_RCE
👤 项目作者: Manlware
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-30 17:55:37
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - Manlware/SSRF_Redis_RCE
Contribute to Manlware/SSRF_Redis_RCE development by creating an account on GitHub.