GitHub监控消息提醒!!!
更新了:CVE-2025
描述:EXPLOIT CVE-2025-3102
URL:https://github.com/xxmarcosrobertoxx/vanda-CVE-2025-3102
标签:#CVE-2025
更新了:CVE-2025
描述:EXPLOIT CVE-2025-3102
URL:https://github.com/xxmarcosrobertoxx/vanda-CVE-2025-3102
标签:#CVE-2025
GitHub
GitHub - itsismarcos/vanda-CVE-2025-3102: EXPLOIT CVE-2025-3102
EXPLOIT CVE-2025-3102 . Contribute to itsismarcos/vanda-CVE-2025-3102 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-22457
URL:https://github.com/sfewer-r7/CVE-2025-22457
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-22457
URL:https://github.com/sfewer-r7/CVE-2025-22457
标签:#CVE-2025
GitHub
GitHub - sfewer-r7/CVE-2025-22457: PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti…
PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA Gateways - sfewer-r7/CVE-2025-22457
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025041217w78hvvhh6a10vxrybjcuyt
URL:https://github.com/static-web-apps-testing-org/swa2025041217w78hvvhh6a10vxrybjcuyt
标签:#hvv
更新了:hvv
描述:swa2025041217w78hvvhh6a10vxrybjcuyt
URL:https://github.com/static-web-apps-testing-org/swa2025041217w78hvvhh6a10vxrybjcuyt
标签:#hvv
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24813-Scanner
URL:https://github.com/Mattb709/CVE-2025-24813-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24813-Scanner
URL:https://github.com/Mattb709/CVE-2025-24813-Scanner
标签:#CVE-2025
GitHub
GitHub - Mattb709/CVE-2025-24813-Scanner: CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat…
CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code executi...
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025041223cwjdfyo22l9hvvqkzg13hm
URL:https://github.com/static-web-apps-testing-org/swa2025041223cwjdfyo22l9hvvqkzg13hm
标签:#hvv
更新了:hvv
描述:swa2025041223cwjdfyo22l9hvvqkzg13hm
URL:https://github.com/static-web-apps-testing-org/swa2025041223cwjdfyo22l9hvvqkzg13hm
标签:#hvv
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:SSRF to XSS - XSS to RCE Moodle
URL:https://github.com/Astroo18/PoC-CVE-2025-26529
标签:#CVE-2025
更新了:CVE-2025
描述:SSRF to XSS - XSS to RCE Moodle
URL:https://github.com/Astroo18/PoC-CVE-2025-26529
标签:#CVE-2025
GitHub
GitHub - Astroo18/PoC-CVE-2025-26529: SSRF to XSS - XSS to RCE Moodle
SSRF to XSS - XSS to RCE Moodle. Contribute to Astroo18/PoC-CVE-2025-26529 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC CVE-2025-29927
URL:https://github.com/ethanol1310/POC-CVE-2025-29927-
标签:#CVE-2025
更新了:CVE-2025
描述:POC CVE-2025-29927
URL:https://github.com/ethanol1310/POC-CVE-2025-29927-
标签:#CVE-2025
GitHub
GitHub - ethanol1310/POC-CVE-2025-29927-: POC CVE-2025-29927
POC CVE-2025-29927. Contribute to ethanol1310/POC-CVE-2025-29927- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Magento RCE Exploit script optimized for python3
URL:https://github.com/minanagehsalalma/Magento-RCE-Exploit-v3
标签:#RCE
更新了:RCE
描述:Magento RCE Exploit script optimized for python3
URL:https://github.com/minanagehsalalma/Magento-RCE-Exploit-v3
标签:#RCE
GitHub
GitHub - minanagehsalalma/Magento-Shoplift-SQLI-v3: Magento-Shoplift-SQLI Exploit script optimized for python3
Magento-Shoplift-SQLI Exploit script optimized for python3 - minanagehsalalma/Magento-Shoplift-SQLI-v3
GitHub监控消息提醒!!!
更新了:绕过
描述:自动生成多种文件上传绕过技术的Payload 进行测试 界面化设计
URL:https://github.com/7797777977/Upload_Super_Fuzz_Gui
标签:#绕过
更新了:绕过
描述:自动生成多种文件上传绕过技术的Payload 进行测试 界面化设计
URL:https://github.com/7797777977/Upload_Super_Fuzz_Gui
标签:#绕过
GitHub
GitHub - 7797777977/Upload_Super_Fuzz_Gui: 自动生成多种文件上传绕过技术的Payload 进行测试 界面化设计
自动生成多种文件上传绕过技术的Payload 进行测试 界面化设计. Contribute to 7797777977/Upload_Super_Fuzz_Gui development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Beacon Object File implementation of Yaxser's Backstab for use with Cobalt Strike
URL:https://github.com/Fauzan-Aldi/Backstap
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Beacon Object File implementation of Yaxser's Backstab for use with Cobalt Strike
URL:https://github.com/Fauzan-Aldi/Backstap
标签:#Cobalt Strike
GitHub
GitHub - Fauzan-Aldi/Backstap: Beacon Object File implementation of Yaxser's Backstab for use with Cobalt Strike
Beacon Object File implementation of Yaxser's Backstab for use with Cobalt Strike - Fauzan-Aldi/Backstap
GitHub监控消息提醒!!!
更新了:RCE
描述:Simulate SMB vulnerability in Windows 11 for remote code execution (RCE) using.
URL:https://github.com/kaledaljebur/smb-attack
标签:#RCE
更新了:RCE
描述:Simulate SMB vulnerability in Windows 11 for remote code execution (RCE) using.
URL:https://github.com/kaledaljebur/smb-attack
标签:#RCE
GitHub
GitHub - kaledaljebur/smb-attack: Simulate SMB vulnerability in Windows 11 for remote code execution (RCE) using.
Simulate SMB vulnerability in Windows 11 for remote code execution (RCE) using. - kaledaljebur/smb-attack
👍1
GitHub监控消息提醒!!!
更新了:Red Team
描述:Educational Red Team C2 framework in Python — control remote bots, run commands, and simulate post-exploitation tasks.
URL:https://github.com/Kaorast/ShellCode-Encrypt-Tool-Xor-Aes-Fud-Stable
标签:#Red Team
更新了:Red Team
描述:Educational Red Team C2 framework in Python — control remote bots, run commands, and simulate post-exploitation tasks.
URL:https://github.com/Kaorast/ShellCode-Encrypt-Tool-Xor-Aes-Fud-Stable
标签:#Red Team
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:基于Python的自动化Web漏洞扫描器
URL:https://github.com/zhaolin98/web-vuln-scanner
标签:#漏洞扫描
更新了:漏洞扫描
描述:基于Python的自动化Web漏洞扫描器
URL:https://github.com/zhaolin98/web-vuln-scanner
标签:#漏洞扫描
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025041400cymfpzn3hvvc86l9oj1fon
URL:https://github.com/static-web-apps-testing-org/swa2025041400cymfpzn3hvvc86l9oj1fon
标签:#hvv
更新了:hvv
描述:swa2025041400cymfpzn3hvvc86l9oj1fon
URL:https://github.com/static-web-apps-testing-org/swa2025041400cymfpzn3hvvc86l9oj1fon
标签:#hvv
GitHub监控消息提醒!!!
更新了:信息收集
描述:一款集成多种安全功能的工具箱,旨在帮助用户快速进行威胁情报查询、网络排查、主机信息收集、主机日志分析、IP类处理等安全相关操作
URL:https://github.com/semeateh/Semeatech-Technology-Sensors
标签:#信息收集
更新了:信息收集
描述:一款集成多种安全功能的工具箱,旨在帮助用户快速进行威胁情报查询、网络排查、主机信息收集、主机日志分析、IP类处理等安全相关操作
URL:https://github.com/semeateh/Semeatech-Technology-Sensors
标签:#信息收集
GitHub监控消息提醒!!!
更新了:信息收集
描述:用于转换BurpSuite上无敌的Hae信息收集插件的配置规则为yakit使用
URL:https://github.com/ph0ebus/Hae2Yakit
标签:#信息收集
更新了:信息收集
描述:用于转换BurpSuite上无敌的Hae信息收集插件的配置规则为yakit使用
URL:https://github.com/ph0ebus/Hae2Yakit
标签:#信息收集
GitHub
GitHub - ph0ebus/Hae2Yakit: 用于转换BurpSuite上无敌的Hae信息收集插件的配置规则为yakit使用
用于转换BurpSuite上无敌的Hae信息收集插件的配置规则为yakit使用. Contribute to ph0ebus/Hae2Yakit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:WSJ FT 彭博 付费墙 绕过 bypass paywall clean
URL:https://github.com/mhdnews/index
标签:#绕过
更新了:绕过
描述:WSJ FT 彭博 付费墙 绕过 bypass paywall clean
URL:https://github.com/mhdnews/index
标签:#绕过
GitHub
GitHub - mhdnews/index: WSJ FT 彭博 付费墙 绕过 bypass paywall clean
WSJ FT 彭博 付费墙 绕过 bypass paywall clean. Contribute to mhdnews/index development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A tool to exploit Local File Inclusion (LFI) vulnerabilities for Remote Code Execution (RCE)
URL:https://github.com/OssamaN7/LFI_Racer
标签:#RCE
更新了:RCE
描述:A tool to exploit Local File Inclusion (LFI) vulnerabilities for Remote Code Execution (RCE)
URL:https://github.com/OssamaN7/LFI_Racer
标签:#RCE
GitHub
GitHub - OssamaN7/LFI_Racer: A tool to exploit Local File Inclusion (LFI) vulnerabilities for Remote Code Execution (RCE)
A tool to exploit Local File Inclusion (LFI) vulnerabilities for Remote Code Execution (RCE) - OssamaN7/LFI_Racer
GitHub监控消息提醒!!!
更新了:红队
描述:专为红队蒸馏的推理型GPT,目前已知适用场景:断网情况下的网络安全大赛。
URL:https://github.com/Bouquets-ai/StrikeGPT-R1-Zero
标签:#红队
更新了:红队
描述:专为红队蒸馏的推理型GPT,目前已知适用场景:断网情况下的网络安全大赛。
URL:https://github.com/Bouquets-ai/StrikeGPT-R1-Zero
标签:#红队
GitHub
GitHub - Bouquets-ai/StrikeGPT-R1-Zero: 基于DeepSeek-R1黑盒蒸馏的网络安全渗透领域推理模型。可高效的应对断网情况下的网络安全大赛。简介写完整了,图片加载不出来看看是否梯子挂好了。2025.5.14更新英文数据集
基于DeepSeek-R1黑盒蒸馏的网络安全渗透领域推理模型。可高效的应对断网情况下的网络安全大赛。简介写完整了,图片加载不出来看看是否梯子挂好了。2025.5.14更新英文数据集 - Bouquets-ai/StrikeGPT-R1-Zero