GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Updated PoC for CVE-2025-27410, since the one publicly available in the security advisory is prone to failing.
URL:https://github.com/shreyas-malhotra/CVE-2025-27410
标签:#CVE-2025
更新了:CVE-2025
描述:Updated PoC for CVE-2025-27410, since the one publicly available in the security advisory is prone to failing.
URL:https://github.com/shreyas-malhotra/CVE-2025-27410
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:metasploit module for the CVE-2025-24071
URL:https://github.com/FOLKS-iwd/CVE-2025-24071-msfvenom
标签:#CVE-2025
更新了:CVE-2025
描述:metasploit module for the CVE-2025-24071
URL:https://github.com/FOLKS-iwd/CVE-2025-24071-msfvenom
标签:#CVE-2025
GitHub
GitHub - FOLKS-iwd/CVE-2025-24071-msfvenom: metasploit module for the CVE-2025-24071
metasploit module for the CVE-2025-24071. Contribute to FOLKS-iwd/CVE-2025-24071-msfvenom development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:sql注入
描述:一个基于机器学习的Web漏洞扫描和检测系统,旨在识别常见的Web安全漏洞,如SQL注入、XSS攻击、CSRF等。
URL:https://github.com/pnegLO/web_scan
标签:#sql注入
更新了:sql注入
描述:一个基于机器学习的Web漏洞扫描和检测系统,旨在识别常见的Web安全漏洞,如SQL注入、XSS攻击、CSRF等。
URL:https://github.com/pnegLO/web_scan
标签:#sql注入
GitHub
pnegLO/web_scan
一个基于机器学习的Web漏洞扫描和检测系统,旨在识别常见的Web安全漏洞,如SQL注入、XSS攻击、CSRF等。 - pnegLO/web_scan
GitHub监控消息提醒!!!
更新了:信息收集
描述:一款新式的信息收集软件,它将利用mcp,尽可能的实现自动化。
URL:https://github.com/ocybers-dev/ocyber
标签:#信息收集
更新了:信息收集
描述:一款新式的信息收集软件,它将利用mcp,尽可能的实现自动化。
URL:https://github.com/ocybers-dev/ocyber
标签:#信息收集
GitHub
GitHub - ocybers-dev/ocyber: 一款新式的信息收集软件,它将利用mcp,尽可能的实现自动化。
一款新式的信息收集软件,它将利用mcp,尽可能的实现自动化。. Contribute to ocybers-dev/ocyber development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers
URL:https://github.com/0xRedpoll/ludus_cobaltstrike_teamserver
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers
URL:https://github.com/0xRedpoll/ludus_cobaltstrike_teamserver
标签:#Cobalt Strike
GitHub
GitHub - 0xRedpoll/ludus_cobaltstrike_teamserver: Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers
Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers - 0xRedpoll/ludus_cobaltstrike_teamserver
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Koha CVE-2025-22954: SQL Injection in lateissues-export.pl
URL:https://github.com/RandomRobbieBF/CVE-2025-22954
标签:#CVE-2025
更新了:CVE-2025
描述:Koha CVE-2025-22954: SQL Injection in lateissues-export.pl
URL:https://github.com/RandomRobbieBF/CVE-2025-22954
标签:#CVE-2025
GitHub
GitHub - RandomRobbieBF/CVE-2025-22954: Koha CVE-2025-22954: SQL Injection in lateissues-export.pl
Koha CVE-2025-22954: SQL Injection in lateissues-export.pl - RandomRobbieBF/CVE-2025-22954
GitHub监控消息提醒!!!
更新了:反序列化
描述:Java漏洞复现,包括反序列化、XXE、JNDI注入等
URL:https://github.com/Minshenyao/java-security-hub
标签:#反序列化
更新了:反序列化
描述:Java漏洞复现,包括反序列化、XXE、JNDI注入等
URL:https://github.com/Minshenyao/java-security-hub
标签:#反序列化
GitHub
GitHub - Minshenyao/java-security-hub: Java漏洞复现,包括反序列化、XXE、JNDI注入等
Java漏洞复现,包括反序列化、XXE、JNDI注入等. Contribute to Minshenyao/java-security-hub development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Apache Tomcat Vulnerability POC (CVE-2025-24813)
URL:https://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813-
标签:#CVE-2025
更新了:CVE-2025
描述:Apache Tomcat Vulnerability POC (CVE-2025-24813)
URL:https://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813-
标签:#CVE-2025
GitHub
GitHub - michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813: Apache Tomcat Vulnerability POC (CVE-2025-24813)
Apache Tomcat Vulnerability POC (CVE-2025-24813). Contribute to michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Apache Tomcat Vulnerability POC (CVE-2025-24813)
URL:https://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813
标签:#CVE-2025
更新了:CVE-2025
描述:Apache Tomcat Vulnerability POC (CVE-2025-24813)
URL:https://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813
标签:#CVE-2025
GitHub
GitHub - michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813: Apache Tomcat Vulnerability POC (CVE-2025-24813)
Apache Tomcat Vulnerability POC (CVE-2025-24813). Contribute to michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)
URL:https://github.com/aleongx/CVE-2025-24071
标签:#CVE-2025
更新了:CVE-2025
描述:Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)
URL:https://github.com/aleongx/CVE-2025-24071
标签:#CVE-2025
GitHub
GitHub - aleongx/CVE-2025-24071: Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)
Windows File Explorer Spoofing Vulnerability (CVE-2025-24071) - aleongx/CVE-2025-24071
GitHub监控消息提醒!!!
更新了:绕过
描述:【Hello-CTF labs】新手向的ssrf靶场,从协议,场景,绕过等多个ssrf攻击的基础维度展开。
URL:https://github.com/ProbiusOfficial/hello-ssrf
标签:#绕过
更新了:绕过
描述:【Hello-CTF labs】新手向的ssrf靶场,从协议,场景,绕过等多个ssrf攻击的基础维度展开。
URL:https://github.com/ProbiusOfficial/hello-ssrf
标签:#绕过
GitHub
GitHub - ProbiusOfficial/hello-ssrf: 【Hello-CTF labs】新手向的ssrf靶场,从协议,场景,绕过等多个ssrf攻击的基础维度展开。
【Hello-CTF labs】新手向的ssrf靶场,从协议,场景,绕过等多个ssrf攻击的基础维度展开。 - ProbiusOfficial/hello-ssrf
GitHub监控消息提醒!!!
更新了:越权
描述:一款通过被动代理方式,利用主流 AI(如 Kimi、DeepSeek、GPT 等)检测越权漏洞的工具。其核心检测功能依托相关 AI 引擎的开放 API 构建,支持 HTTPS 协议的数据传输与交互。
URL:https://github.com/Brandy467/xinzigodie
标签:#越权
更新了:越权
描述:一款通过被动代理方式,利用主流 AI(如 Kimi、DeepSeek、GPT 等)检测越权漏洞的工具。其核心检测功能依托相关 AI 引擎的开放 API 构建,支持 HTTPS 协议的数据传输与交互。
URL:https://github.com/Brandy467/xinzigodie
标签:#越权
GitHub
GitHub - Brandy467/xinzigodie: 起初是有个朋友在小红书问这个导师怎么样,有个别网友发了他的避雷,本来帖子没什么人看,结果导师本人当天注册账号,和网友通宵对骂,从第一天下午骂到了第二天早上。最后发现越骂越火,个性签名改成了“…
起初是有个朋友在小红书问这个导师怎么样,有个别网友发了他的避雷,本来帖子没什么人看,结果导师本人当天注册账号,和网友通宵对骂,从第一天下午骂到了第二天早上。最后发现越骂越火,个性签名改成了“别跑,已报警”并且注销了账号,开始举报各种有他照片的帖子,理由是侵犯肖像权or名誉权,后所有帖子被删,成为香港中文大学历史上的光辉一战。该贴最后观战网友上万,点赞上千,收藏上百。你或许见过很多垃圾导师,但...
👎1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Alternativa CVE-2025-24071_PoC
URL:https://github.com/ctabango/CVE-2025-24071_PoCExtra
标签:#CVE-2025
更新了:CVE-2025
描述:Alternativa CVE-2025-24071_PoC
URL:https://github.com/ctabango/CVE-2025-24071_PoCExtra
标签:#CVE-2025
GitHub
GitHub - ctabango/CVE-2025-24071_PoCExtra: Alternativa CVE-2025-24071_PoC
Alternativa CVE-2025-24071_PoC. Contribute to ctabango/CVE-2025-24071_PoCExtra development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Arbitrary file write in Gibbon LMS can leverage to RCE
URL:https://github.com/jrbH4CK/GibbonLMS-FileWrite-RCE
标签:#RCE
更新了:RCE
描述:Arbitrary file write in Gibbon LMS can leverage to RCE
URL:https://github.com/jrbH4CK/GibbonLMS-FileWrite-RCE
标签:#RCE
GitHub
GitHub - jrbH4CK/GibbonLMS-FileWrite-RCE: Arbitrary file write in Gibbon LMS can leverage to RCE
Arbitrary file write in Gibbon LMS can leverage to RCE - jrbH4CK/GibbonLMS-FileWrite-RCE
GitHub监控消息提醒!!!
更新了:webshell
描述:Simple webshell cli written in Python for CTFs
URL:https://github.com/Hoopshaker/simple-wbeshell-cli
标签:#webshell
更新了:webshell
描述:Simple webshell cli written in Python for CTFs
URL:https://github.com/Hoopshaker/simple-wbeshell-cli
标签:#webshell
GitHub
GitHub - Hoopshaker/simple-wbeshell-cli: Simple webshell cli written in Python for CTFs
Simple webshell cli written in Python for CTFs. Contribute to Hoopshaker/simple-wbeshell-cli development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File
URL:https://github.com/0x6rss/CVE-2025-24071_PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File
URL:https://github.com/0x6rss/CVE-2025-24071_PoC
标签:#CVE-2025
GitHub
GitHub - 0x6rss/CVE-2025-24071_PoC: CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File
CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File - 0x6rss/CVE-2025-24071_PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for CVE-2025-24813 using Spring-Boot
URL:https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813
标签:#CVE-2025
更新了:CVE-2025
描述:POC for CVE-2025-24813 using Spring-Boot
URL:https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813
标签:#CVE-2025
GitHub
GitHub - n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813: POC for CVE-2025-24813 using Spring-Boot
POC for CVE-2025-24813 using Spring-Boot. Contribute to n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813 development by creating an account on GitHub.