GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24221: Sensitive keychain data may be accessible from an iOS backup
URL:https://github.com/AnonymousDeveloper69/CVE-2025-24221
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24221: Sensitive keychain data may be accessible from an iOS backup
URL:https://github.com/AnonymousDeveloper69/CVE-2025-24221
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:针对CVE-2025-30208和CVE-2025-31125的漏洞利用
URL:https://github.com/jackieya/ViteVulScan
标签:#CVE-2025
更新了:CVE-2025
描述:针对CVE-2025-30208和CVE-2025-31125的漏洞利用
URL:https://github.com/jackieya/ViteVulScan
标签:#CVE-2025
GitHub
GitHub - jackieya/ViteVulScan: 针对CVE-2025-30208和CVE-2025-31125的漏洞利用
针对CVE-2025-30208和CVE-2025-31125的漏洞利用. Contribute to jackieya/ViteVulScan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Research on Next.js middleware vulnerability (CVE-2025-29927) allowing authorization bypass and potential exploits.
URL:https://github.com/l1uk/nextjs-middleware-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Research on Next.js middleware vulnerability (CVE-2025-29927) allowing authorization bypass and potential exploits.
URL:https://github.com/l1uk/nextjs-middleware-exploit
标签:#CVE-2025
GitHub
GitHub - l1uk/nextjs-middleware-exploit: Research on Next.js middleware vulnerability (CVE-2025-29927) allowing authorization bypass…
Research on Next.js middleware vulnerability (CVE-2025-29927) allowing authorization bypass and potential exploits. - l1uk/nextjs-middleware-exploit
GitHub监控消息提醒!!!
更新了:Red Team
描述:A list of curated resources for people interested in AI Red Teaming, Jailbreaking, and Prompt Injection
URL:https://github.com/PromptLabs/Prompt-Hacking-Resources
标签:#Red Team
更新了:Red Team
描述:A list of curated resources for people interested in AI Red Teaming, Jailbreaking, and Prompt Injection
URL:https://github.com/PromptLabs/Prompt-Hacking-Resources
标签:#Red Team
GitHub
GitHub - PromptLabs/Prompt-Hacking-Resources: A list of curated resources for people interested in AI Red Teaming, Jailbreaking…
A list of curated resources for people interested in AI Red Teaming, Jailbreaking, and Prompt Injection - PromptLabs/Prompt-Hacking-Resources
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/housam123456789/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/housam123456789/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:信息收集
描述:MCP 信息收集客户端 是一个轻量级的信息收集工具,可以扩展使用mcp服务,进行静默信息收集。它无需用户交互或聊天
URL:https://github.com/Dont-Chat/mcp-collector
标签:#信息收集
更新了:信息收集
描述:MCP 信息收集客户端 是一个轻量级的信息收集工具,可以扩展使用mcp服务,进行静默信息收集。它无需用户交互或聊天
URL:https://github.com/Dont-Chat/mcp-collector
标签:#信息收集
GitHub
GitHub - Dont-Chat/mcp-collector: MCP 信息收集客户端 是一个轻量级的信息收集工具,可以扩展使用mcp服务,进行静默信息收集。它无需用户交互或聊天
MCP 信息收集客户端 是一个轻量级的信息收集工具,可以扩展使用mcp服务,进行静默信息收集。它无需用户交互或聊天 - Dont-Chat/mcp-collector
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025041002t31qcpv3hvv0ygx8n3vs0s
URL:https://github.com/static-web-apps-testing-org/swa2025041002t31qcpv3hvv0ygx8n3vs0s
标签:#hvv
更新了:hvv
描述:swa2025041002t31qcpv3hvv0ygx8n3vs0s
URL:https://github.com/static-web-apps-testing-org/swa2025041002t31qcpv3hvv0ygx8n3vs0s
标签:#hvv
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE
URL:https://github.com/securekomodo/CVE-2025-22457
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE
URL:https://github.com/securekomodo/CVE-2025-22457
标签:#CVE-2025
GitHub
GitHub - securekomodo/CVE-2025-22457: CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE
CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE - securekomodo/CVE-2025-22457
👍2
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit CVE-2025-1974 with a single file.
URL:https://github.com/Rubby2001/CVE-2025-1974-go
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit CVE-2025-1974 with a single file.
URL:https://github.com/Rubby2001/CVE-2025-1974-go
标签:#CVE-2025
GitHub
GitHub - Rubby2001/CVE-2025-1974-go: Exploit CVE-2025-1974 with a single file.
Exploit CVE-2025-1974 with a single file. Contribute to Rubby2001/CVE-2025-1974-go development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一个基于 Python 和 Tkinter 的模块化渗透测试工具箱,支持多种工具类型和环境配置。
URL:https://github.com/AiENG07/My_ToolBox
标签:#渗透测试
更新了:渗透测试
描述:一个基于 Python 和 Tkinter 的模块化渗透测试工具箱,支持多种工具类型和环境配置。
URL:https://github.com/AiENG07/My_ToolBox
标签:#渗透测试
GitHub
GitHub - AiENG07/My_ToolBox: 一个基于 Python 和 Tkinter 的模块化渗透测试工具箱,支持多种工具类型和环境配置。
一个基于 Python 和 Tkinter 的模块化渗透测试工具箱,支持多种工具类型和环境配置。. Contribute to AiENG07/My_ToolBox development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:My self-built SQLi cases for practice and demos. Includes binary search data dumps, custom SQLMap tamper, stored procedure injection, and RCE tricks.
URL:https://github.com/quyt0/sqli-cases
标签:#RCE
更新了:RCE
描述:My self-built SQLi cases for practice and demos. Includes binary search data dumps, custom SQLMap tamper, stored procedure injection, and RCE tricks.
URL:https://github.com/quyt0/sqli-cases
标签:#RCE
GitHub
GitHub - quyt0/sqli-cases: My self-built SQLi cases for practice and demos. Includes binary search data dumps, custom SQLMap tamper…
My self-built SQLi cases for practice and demos. Includes binary search data dumps, custom SQLMap tamper, stored procedure injection, and RCE tricks. - quyt0/sqli-cases
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A vulnerability scanner for CVE-2025-3248 in Langflow applications.
URL:https://github.com/xuemian168/CVE-2025-3248
标签:#CVE-2025
更新了:CVE-2025
描述:A vulnerability scanner for CVE-2025-3248 in Langflow applications.
URL:https://github.com/xuemian168/CVE-2025-3248
标签:#CVE-2025
GitHub
GitHub - xuemian168/CVE-2025-3248: A vulnerability scanner for CVE-2025-3248 in Langflow applications. 用于扫描 Langflow 应用中 CVE-2025…
A vulnerability scanner for CVE-2025-3248 in Langflow applications. 用于扫描 Langflow 应用中 CVE-2025-3248 漏洞的工具。 - xuemian168/CVE-2025-3248
GitHub监控消息提醒!!!
更新了:RCE
描述:PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteam
URL:https://github.com/deadlybangle/CVE-2024-4577-PHP-RCE
标签:#RCE
更新了:RCE
描述:PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteam
URL:https://github.com/deadlybangle/CVE-2024-4577-PHP-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC of CVE-2025-3248
URL:https://github.com/PuddinCat/CVE-2025-3248-POC
标签:#CVE-2025
更新了:CVE-2025
描述:POC of CVE-2025-3248
URL:https://github.com/PuddinCat/CVE-2025-3248-POC
标签:#CVE-2025
GitHub
GitHub - PuddinCat/CVE-2025-3248-POC: POC of CVE-2025-3248, RCE of LangFlow
POC of CVE-2025-3248, RCE of LangFlow. Contribute to PuddinCat/CVE-2025-3248-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A functional RCE Exploit in CUPS
URL:https://github.com/mduboef/cupsCyberEffect
标签:#RCE
更新了:RCE
描述:A functional RCE Exploit in CUPS
URL:https://github.com/mduboef/cupsCyberEffect
标签:#RCE
GitHub
GitHub - mduboef/cupsCyberEffect: A functional RCE Exploit in CUPS
A functional RCE Exploit in CUPS. Contribute to mduboef/cupsCyberEffect development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Explotación y Mitigación de Remote Code Execution (RCE).
URL:https://github.com/vjp-angelPB/PPS-Unidad3Actividad7-Angel
标签:#RCE
更新了:RCE
描述:Explotación y Mitigación de Remote Code Execution (RCE).
URL:https://github.com/vjp-angelPB/PPS-Unidad3Actividad7-Angel
标签:#RCE
GitHub
GitHub - vjp-angelPB/PPS-Unidad3Actividad7-Angel: Explotación y Mitigación de Remote Code Execution (RCE).
Explotación y Mitigación de Remote Code Execution (RCE). - GitHub - vjp-angelPB/PPS-Unidad3Actividad7-Angel: Explotación y Mitigación de Remote Code Execution (RCE).