GitHub监控消息提醒!!!
更新了:bypassav
描述:免杀shellcode加载器
URL:https://github.com/MentalityXt/bypassAV
标签:#bypassav
更新了:bypassav
描述:免杀shellcode加载器
URL:https://github.com/MentalityXt/bypassAV
标签:#bypassav
GitHub
GitHub - MentalityXt/bypassAV: 免杀shellcode加载器
免杀shellcode加载器. Contribute to MentalityXt/bypassAV development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:RustFly v2.0.0- Remote Code Execution (RCE)
URL:https://github.com/capture0x/RustFly-RCE
标签:#RCE
更新了:RCE
描述:RustFly v2.0.0- Remote Code Execution (RCE)
URL:https://github.com/capture0x/RustFly-RCE
标签:#RCE
GitHub
GitHub - capture0x/RustFly-RCE: RustFly v2.0.0- Remote Code Execution (RCE)
RustFly v2.0.0- Remote Code Execution (RCE) . Contribute to capture0x/RustFly-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE in backdrop_CMS using module features.
URL:https://github.com/Goultarde/Backdrop_CMS_1.27.1_RCE
标签:#RCE
更新了:RCE
描述:RCE in backdrop_CMS using module features.
URL:https://github.com/Goultarde/Backdrop_CMS_1.27.1_RCE
标签:#RCE
GitHub
Goultarde/Backdrop_CMS_1.27.1_RCE
RCE in backdrop_CMS using module features. Contribute to Goultarde/Backdrop_CMS_1.27.1_RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-46204
URL:https://github.com/spbavarva/CVE-2025-46204
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-46204
URL:https://github.com/spbavarva/CVE-2025-46204
标签:#CVE-2025
GitHub
GitHub - spbavarva/CVE-2025-46204: PoC of CVE-2025-46204
PoC of CVE-2025-46204. Contribute to spbavarva/CVE-2025-46204 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-5328 – Path Traversal in chshcms mccms 2.7
URL:https://github.com/voyagken/CVE-2025-5328
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-5328 – Path Traversal in chshcms mccms 2.7
URL:https://github.com/voyagken/CVE-2025-5328
标签:#CVE-2025
GitHub
GitHub - voyagken/CVE-2025-5328: CVE-2025-5328 – Path Traversal in chshcms mccms 2.7
CVE-2025-5328 – Path Traversal in chshcms mccms 2.7 - voyagken/CVE-2025-5328
GitHub监控消息提醒!!!
更新了:RCE
描述:ScadaFlare Authenticated RCE Exploit Framework for ScadaBR (CVE-2021-26828) OpenPLC ScadaBR
URL:https://github.com/ridpath/CVE-2021-26828-Ultimate
标签:#RCE
更新了:RCE
描述:ScadaFlare Authenticated RCE Exploit Framework for ScadaBR (CVE-2021-26828) OpenPLC ScadaBR
URL:https://github.com/ridpath/CVE-2021-26828-Ultimate
标签:#RCE
GitHub
GitHub - ridpath/CVE-2021-26828-Ultimate: ScadaFlare Authenticated RCE Exploit Framework for ScadaBR (CVE-2021-26828) OpenPLC ScadaBR
ScadaFlare Authenticated RCE Exploit Framework for ScadaBR (CVE-2021-26828) OpenPLC ScadaBR - GitHub - ridpath/CVE-2021-26828-Ultimate: ScadaFlare Authenticated RCE Exploit Framework for ScadaBR (...
GitHub监控消息提醒!!!
更新了:代码审计
描述:运维管理平台(agent端代码) ,平台是集轻量化、极简操作、高效运维为一体的智能运维平台,具备纳管、监控、巡检、自愈、支持异构网络环境、秒级执行运维作业、多云管理,运维工单、k8s集群管理,webshell,安全审计,堡垒机等功能。
URL:https://github.com/wylok/opsone-dog
标签:#代码审计
更新了:代码审计
描述:运维管理平台(agent端代码) ,平台是集轻量化、极简操作、高效运维为一体的智能运维平台,具备纳管、监控、巡检、自愈、支持异构网络环境、秒级执行运维作业、多云管理,运维工单、k8s集群管理,webshell,安全审计,堡垒机等功能。
URL:https://github.com/wylok/opsone-dog
标签:#代码审计
GitHub
GitHub - wylok/opsone-dog: 运维管理平台(agent端代码) ,平台是集轻量化、极简操作、高效运维为一体的智能运维平台,具备纳管、监控、巡检、自愈、支持异构网络环境、秒级执行运维作业、多云管理,运维工单、k8s集群管理,webshell…
运维管理平台(agent端代码) ,平台是集轻量化、极简操作、高效运维为一体的智能运维平台,具备纳管、监控、巡检、自愈、支持异构网络环境、秒级执行运维作业、多云管理,运维工单、k8s集群管理,webshell,安全审计,堡垒机等功能。 - wylok/opsone-dog
GitHub监控消息提醒!!!
更新了:RCE
描述:Peyara Remote Mouse v2.0.0- Remote Code Execution (RCE)
URL:https://github.com/capture0x/Peyara
标签:#RCE
更新了:RCE
描述:Peyara Remote Mouse v2.0.0- Remote Code Execution (RCE)
URL:https://github.com/capture0x/Peyara
标签:#RCE
GitHub
GitHub - capture0x/Peyara: Peyara Remote Mouse v2.0.0- Remote Code Execution (RCE)
Peyara Remote Mouse v2.0.0- Remote Code Execution (RCE) - GitHub - capture0x/Peyara: Peyara Remote Mouse v2.0.0- Remote Code Execution (RCE)
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-20188: Unauthenticated RCE in Cisco IOS XE WLC via Hard-Coded JWT
URL:https://github.com/voyagken/CVE-2025-20188
标签:#RCE
更新了:RCE
描述:CVE-2025-20188: Unauthenticated RCE in Cisco IOS XE WLC via Hard-Coded JWT
URL:https://github.com/voyagken/CVE-2025-20188
标签:#RCE
GitHub
GitHub - voyagken/CVE-2025-20188: CVE-2025-20188: Unauthenticated RCE in Cisco IOS XE WLC via Hard-Coded JWT
CVE-2025-20188: Unauthenticated RCE in Cisco IOS XE WLC via Hard-Coded JWT - voyagken/CVE-2025-20188
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
URL:https://github.com/mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
标签:#CVE-2025
更新了:CVE-2025
描述:Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
URL:https://github.com/mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
标签:#CVE-2025
GitHub
GitHub - mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-: Remote Code Execution via Use-After-Free in…
Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397) - mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Vbullettin RCE - CVE-2025-48827
URL:https://github.com/wiseep/CVE-2025-48827
标签:#CVE-2025
更新了:CVE-2025
描述:Vbullettin RCE - CVE-2025-48827
URL:https://github.com/wiseep/CVE-2025-48827
标签:#CVE-2025
GitHub
GitHub - wiseep/CVE-2025-48827: Vbullettin RCE - CVE-2025-48827
Vbullettin RCE - CVE-2025-48827. Contribute to wiseep/CVE-2025-48827 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/adam20222222/PEGASUS-2025
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/adam20222222/PEGASUS-2025
标签:#RCE
GitHub
GitHub - adam20222222/PEGASUS-2025: This repository offers a detailed look at Pegasus spyware and iPhone surveillance tools for…
This repository offers a detailed look at Pegasus spyware and iPhone surveillance tools for educational purposes. It aims to inform cybersecurity students and researchers about the differences betw...
GitHub监控消息提醒!!!
更新了:RCE
描述:SMB RCE 취약점 공격 절차 관련 파일
URL:https://github.com/2025CJUSIEM/smb-rce-attack
标签:#RCE
更新了:RCE
描述:SMB RCE 취약점 공격 절차 관련 파일
URL:https://github.com/2025CJUSIEM/smb-rce-attack
标签:#RCE
GitHub
GitHub - 2025CJUSIEM/smb-rce-attack: SMB RCE 취약점 공격 절차 관련 파일
SMB RCE 취약점 공격 절차 관련 파일. Contribute to 2025CJUSIEM/smb-rce-attack development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Quelvara/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Quelvara/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
标签:#CVE-2025
GitHub
GitHub - Quelvara/Anydesk-Exploit-CVE-2025-12654-RCE-Builder: Exploit development targets vulnerabilities using tools like exploitation…
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gap...
GitHub监控消息提醒!!!
更新了:反序列化
描述:一个灵活的本地存储工具, 基于 TypeScript 实现, 支持 localStorage, sessionStorage 及自定义存储; 通过 StorageCore 类, 可以方便地进行数据的序列化, 反序列化, 存储和读取。
URL:https://github.com/xiaohaiH/storage
标签:#反序列化
更新了:反序列化
描述:一个灵活的本地存储工具, 基于 TypeScript 实现, 支持 localStorage, sessionStorage 及自定义存储; 通过 StorageCore 类, 可以方便地进行数据的序列化, 反序列化, 存储和读取。
URL:https://github.com/xiaohaiH/storage
标签:#反序列化
GitHub
GitHub - xiaohaiH/storage: 一个灵活的本地存储工具, 基于 TypeScript 实现, 支持 localStorage, sessionStorage 及自定义存储; 通过 StorageCore 类, 可以方便地进行数据的序列化…
一个灵活的本地存储工具, 基于 TypeScript 实现, 支持 localStorage, sessionStorage 及自定义存储; 通过 StorageCore 类, 可以方便地进行数据的序列化, 反序列化, 存储和读取。 - xiaohaiH/storage
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team style prompt injection testing with LLMs. Built by Stacey.
URL:https://github.com/staceystantonhowes/ai-prompt-injection-lab
标签:#Red Team
更新了:Red Team
描述:Red Team style prompt injection testing with LLMs. Built by Stacey.
URL:https://github.com/staceystantonhowes/ai-prompt-injection-lab
标签:#Red Team
GitHub
GitHub - staceystantonhowes/ai-prompt-injection-lab: Red Team style prompt injection testing with LLMs. Built by Stacey.
Red Team style prompt injection testing with LLMs. Built by Stacey. - staceystantonhowes/ai-prompt-injection-lab
GitHub监控消息提醒!!!
更新了:弱口令
描述:phpmyadmin 弱口令探测脚本
URL:https://github.com/Li-YingRan/phpmyadmin-Weak-Password-Detection
标签:#弱口令
更新了:弱口令
描述:phpmyadmin 弱口令探测脚本
URL:https://github.com/Li-YingRan/phpmyadmin-Weak-Password-Detection
标签:#弱口令
GitHub
GitHub - Li-YingRan/phpmyadmin-Weak-Password-Detection: phpmyadmin 弱口令探测脚本
phpmyadmin 弱口令探测脚本. Contribute to Li-YingRan/phpmyadmin-Weak-Password-Detection development by creating an account on GitHub.