GitHub监控消息提醒!!!
更新了:代码审计
描述:一款基于Zjackky/CodeScan的轻量级匹配Sink点并AI审计的代码审计扫描器
URL:https://github.com/insistentleap/AICodeScan
标签:#代码审计
更新了:代码审计
描述:一款基于Zjackky/CodeScan的轻量级匹配Sink点并AI审计的代码审计扫描器
URL:https://github.com/insistentleap/AICodeScan
标签:#代码审计
GitHub监控消息提醒!!!
更新了:绕过
描述:潍科运动(潍坊科技学院)&运动助手(山东理工大学)2.0.1过虚拟机检测,模拟器跑步,绕过更新,免密码任意账号登录,集成xposed模块
URL:https://github.com/xmexg/ydwk
标签:#绕过
更新了:绕过
描述:潍科运动(潍坊科技学院)&运动助手(山东理工大学)2.0.1过虚拟机检测,模拟器跑步,绕过更新,免密码任意账号登录,集成xposed模块
URL:https://github.com/xmexg/ydwk
标签:#绕过
GitHub
xmexg/ydwk
潍科运动2.0.1过虚拟机检测,绕过更新,免密码任意账号登录,集成xposed模块. Contribute to xmexg/ydwk development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:一个好用的越权扫描工具。越权漏洞自动化检测难、易发生且危害严重,但我们仍可以尽力自动化检测一部分越权漏洞。
URL:https://github.com/illinformedc/InfiltrateX
标签:#漏洞扫描
更新了:漏洞扫描
描述:一个好用的越权扫描工具。越权漏洞自动化检测难、易发生且危害严重,但我们仍可以尽力自动化检测一部分越权漏洞。
URL:https://github.com/illinformedc/InfiltrateX
标签:#漏洞扫描
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY
URL:https://github.com/ahmedumarehman/CVE-2025-21293
标签:#CVE-2025
更新了:CVE-2025
描述:POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY
URL:https://github.com/ahmedumarehman/CVE-2025-21293
标签:#CVE-2025
GitHub
GitHub - ahmedumarehman/CVE-2025-21293: CVE-2025-21293 is an elevation of privilege vulnerability in Active Directory Domain Services.…
CVE-2025-21293 is an elevation of privilege vulnerability in Active Directory Domain Services. It allows "Network Configuration Operators" to execute code with SYSTEM privileges v...
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/Vanshuk-Bhagat/Apache-HTTP-Server-Vulnerabilities---CVE-2021-41773-and-CVE-2021-42013
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/Vanshuk-Bhagat/Apache-HTTP-Server-Vulnerabilities---CVE-2021-41773-and-CVE-2021-42013
标签:#RCE
GitHub
GitHub - Vanshuk-Bhagat/Apache-HTTP-Server-Vulnerabilities-CVE-2021-41773-and-CVE-2021-42013: In this project, I documented a detailed…
In this project, I documented a detailed penetration testing process targeting Apache HTTP Server vulnerabilities, specifically CVE-2021-41773 and CVE-2021-42013, which involve Path Traversal and R...
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/Vanshuk-Bhagat/Apache-HTTP-Server-Vulnerabilities-CVE-2021-41773-and-CVE-2021-42013
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/Vanshuk-Bhagat/Apache-HTTP-Server-Vulnerabilities-CVE-2021-41773-and-CVE-2021-42013
标签:#RCE
GitHub
GitHub - Vanshuk-Bhagat/Apache-HTTP-Server-Vulnerabilities-CVE-2021-41773-and-CVE-2021-42013: In this project, I documented a detailed…
In this project, I documented a detailed penetration testing process targeting Apache HTTP Server vulnerabilities, specifically CVE-2021-41773 and CVE-2021-42013, which involve Path Traversal and R...
GitHub监控消息提醒!!!
更新了:绕过
描述:粘贴绕过工具是一个用Rust编写的命令行应用程序,用于绕过那些禁用或监控标准粘贴操作的网站和应用程序。该工具通过模拟逐字符的键盘输入,而不是直接触发粘贴事件,从而避开粘贴检测机制。
URL:https://github.com/chenty2333/Paste-detection-bypass-tool
标签:#绕过
更新了:绕过
描述:粘贴绕过工具是一个用Rust编写的命令行应用程序,用于绕过那些禁用或监控标准粘贴操作的网站和应用程序。该工具通过模拟逐字符的键盘输入,而不是直接触发粘贴事件,从而避开粘贴检测机制。
URL:https://github.com/chenty2333/Paste-detection-bypass-tool
标签:#绕过
GitHub
GitHub - chenty2333/Paste-detection-bypass-tool: 粘贴绕过工具是一个用Rust编写的命令行应用程序,用于绕过那些禁用或监控标准粘贴操作的网站和应用程序。该工具通过模拟逐字符的键盘输入,而不是直接触发粘贴事件,从而避开粘贴检测机制。
粘贴绕过工具是一个用Rust编写的命令行应用程序,用于绕过那些禁用或监控标准粘贴操作的网站和应用程序。该工具通过模拟逐字符的键盘输入,而不是直接触发粘贴事件,从而避开粘贴检测机制。 - chenty2333/Paste-detection-bypass-tool
GitHub监控消息提醒!!!
更新了:红队
描述:两个简单的脚本,用于监测文件变化,并使用dnslog来传递和通知,适合红队渗透用
URL:https://github.com/christarcher/filechange2dnslog
标签:#红队
更新了:红队
描述:两个简单的脚本,用于监测文件变化,并使用dnslog来传递和通知,适合红队渗透用
URL:https://github.com/christarcher/filechange2dnslog
标签:#红队
GitHub
GitHub - christarcher/filechange2dnslog: 两个简单的脚本,用于监测文件变化,并使用dnslog来传递和通知,适合红队渗透用
两个简单的脚本,用于监测文件变化,并使用dnslog来传递和通知,适合红队渗透用. Contribute to christarcher/filechange2dnslog development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:KQL para deteccion de CVE-2025-21333 en Sentinel
URL:https://github.com/aleongx/KQL_sentinel_CVE-2025-21333
标签:#CVE-2025
更新了:CVE-2025
描述:KQL para deteccion de CVE-2025-21333 en Sentinel
URL:https://github.com/aleongx/KQL_sentinel_CVE-2025-21333
标签:#CVE-2025
GitHub
GitHub - aleongx/KQL_sentinel_CVE-2025-21333: KQL para deteccion de CVE-2025-21333 en Sentinel
KQL para deteccion de CVE-2025-21333 en Sentinel. Contribute to aleongx/KQL_sentinel_CVE-2025-21333 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for CVE-2025-26240
URL:https://github.com/Habuon/CVE-2025-26240
标签:#CVE-2025
更新了:CVE-2025
描述:POC for CVE-2025-26240
URL:https://github.com/Habuon/CVE-2025-26240
标签:#CVE-2025
GitHub
GitHub - Habuon/CVE-2025-26240: POC for CVE-2025-26240
POC for CVE-2025-26240. Contribute to Habuon/CVE-2025-26240 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:RCE
描述:SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)
URL:https://github.com/mohamed-ali-youssef/SOPlanning-1.52.01
标签:#RCE
更新了:RCE
描述:SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)
URL:https://github.com/mohamed-ali-youssef/SOPlanning-1.52.01
标签:#RCE
GitHub
GitHub - mohamed-ali-youssef/SOPlanning-1.52.01: SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE)…
SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) - mohamed-ali-youssef/SOPlanning-1.52.01
GitHub监控消息提醒!!!
更新了:RCE
描述:AI-Assisted Tools for RCE Vulnerability Test, Discovery & Exploitation
URL:https://github.com/Michael-Obs66/BlackClown
标签:#RCE
更新了:RCE
描述:AI-Assisted Tools for RCE Vulnerability Test, Discovery & Exploitation
URL:https://github.com/Michael-Obs66/BlackClown
标签:#RCE
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Secondary development function(毕业设计-基于Gophish的钓鱼渗透测试平台)
URL:https://github.com/L-69/gophish_2development
标签:#渗透测试
更新了:渗透测试
描述:Secondary development function(毕业设计-基于Gophish的钓鱼渗透测试平台)
URL:https://github.com/L-69/gophish_2development
标签:#渗透测试
GitHub
GitHub - L-69/gophish_2development: Secondary development function(毕业设计-基于Gophish的钓鱼渗透测试平台)
Secondary development function(毕业设计-基于Gophish的钓鱼渗透测试平台) - L-69/gophish_2development