👍1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:SQL Injection in Dietiqa App v1.0.20 (CVE-2025-28009) – Unauthenticated remote data access via vulnerable parameter.
URL:https://github.com/beardenx/CVE-2025-28009
标签:#CVE-2025
更新了:CVE-2025
描述:SQL Injection in Dietiqa App v1.0.20 (CVE-2025-28009) – Unauthenticated remote data access via vulnerable parameter.
URL:https://github.com/beardenx/CVE-2025-28009
标签:#CVE-2025
GitHub
GitHub - 0xs4h4/CVE-2025-28009: SQL Injection in Dietiqa App v1.0.20 (CVE-2025-28009) – Unauthenticated remote data access via…
SQL Injection in Dietiqa App v1.0.20 (CVE-2025-28009) – Unauthenticated remote data access via vulnerable parameter. - 0xs4h4/CVE-2025-28009
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:本工具是一个自动化PWN利用框架,专为CTF比赛和二进制漏洞利用设计,集成了栈溢出、格式化字符串等多种漏洞利用技术,支持32位和64位程序的自动化分析利用。(About ctf一键栈溢出、格式化字符串pwn工具/一键pwn利用工具)
URL:https://github.com/heimao-box/pwnpasi
标签:#漏洞利用
更新了:漏洞利用
描述:本工具是一个自动化PWN利用框架,专为CTF比赛和二进制漏洞利用设计,集成了栈溢出、格式化字符串等多种漏洞利用技术,支持32位和64位程序的自动化分析利用。(About ctf一键栈溢出、格式化字符串pwn工具/一键pwn利用工具)
URL:https://github.com/heimao-box/pwnpasi
标签:#漏洞利用
GitHub
GitHub - heimao-box/pwnpasi: This tool is an automated PWN exploitation framework designed for CTF competitions and binary vulnerability…
This tool is an automated PWN exploitation framework designed for CTF competitions and binary vulnerability exploitation. It integrates various exploitation techniques such as stack overflow and fo...
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025041712fq680pjiut91hvv6142icw
URL:https://github.com/static-web-apps-testing-org/swa2025041712fq680pjiut91hvv6142icw
标签:#hvv
更新了:hvv
描述:swa2025041712fq680pjiut91hvv6142icw
URL:https://github.com/static-web-apps-testing-org/swa2025041712fq680pjiut91hvv6142icw
标签:#hvv
GitHub
GitHub - static-web-apps-testing-org/swa2025041712fq680pjiut91hvv6142icw: swa2025041712fq680pjiut91hvv6142icw
swa2025041712fq680pjiut91hvv6142icw. Contribute to static-web-apps-testing-org/swa2025041712fq680pjiut91hvv6142icw development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.
URL:https://github.com/lukehebe/CVE-2023-27163
标签:#RCE
更新了:RCE
描述:Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.
URL:https://github.com/lukehebe/CVE-2023-27163
标签:#RCE
GitHub
GitHub - lukehebe/CVE-2023-27163: CVE-2023-27163 Request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery…
CVE-2023-27163 Request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access netwo...
GitHub监控消息提醒!!!
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/ViFDevv/scout
标签:#信息收集
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/ViFDevv/scout
标签:#信息收集
GitHub
GitHub - ViFDevv/scout: Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web…
Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。 - ViFDevv/scout
GitHub监控消息提醒!!!
更新了:绕过
描述:一个用于绕过体适能应用(com.bxkj.student)的Xposed模块,移除广告并绕过各种安全检测。
URL:https://github.com/pansoul1/Fuck-TSN
标签:#绕过
更新了:绕过
描述:一个用于绕过体适能应用(com.bxkj.student)的Xposed模块,移除广告并绕过各种安全检测。
URL:https://github.com/pansoul1/Fuck-TSN
标签:#绕过
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025041801314hvvt6h9r3qval6nwzmz
URL:https://github.com/static-web-apps-testing-org/swa2025041801314hvvt6h9r3qval6nwzmz
标签:#hvv
更新了:hvv
描述:swa2025041801314hvvt6h9r3qval6nwzmz
URL:https://github.com/static-web-apps-testing-org/swa2025041801314hvvt6h9r3qval6nwzmz
标签:#hvv
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32395-POC
URL:https://github.com/ruiwenya/CVE-2025-32395
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32395-POC
URL:https://github.com/ruiwenya/CVE-2025-32395
标签:#CVE-2025
GitHub
GitHub - ruiwenya/CVE-2025-32395: CVE-2025-32395-POC
CVE-2025-32395-POC. Contribute to ruiwenya/CVE-2025-32395 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Security research on Erlang/OTP SSH CVE-2025-32433.
URL:https://github.com/darses/CVE-2025-32433.py
标签:#CVE-2025
更新了:CVE-2025
描述:Security research on Erlang/OTP SSH CVE-2025-32433.
URL:https://github.com/darses/CVE-2025-32433.py
标签:#CVE-2025
GitHub
GitHub - darses/CVE-2025-32433: Security research on Erlang/OTP SSH CVE-2025-32433.
Security research on Erlang/OTP SSH CVE-2025-32433. - darses/CVE-2025-32433
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Security research on Erlang/OTP SSH CVE-2025-32433.
URL:https://github.com/darses/CVE-2025-32433
标签:#CVE-2025
更新了:CVE-2025
描述:Security research on Erlang/OTP SSH CVE-2025-32433.
URL:https://github.com/darses/CVE-2025-32433
标签:#CVE-2025
GitHub
GitHub - darses/CVE-2025-32433: Security research on Erlang/OTP SSH CVE-2025-32433.
Security research on Erlang/OTP SSH CVE-2025-32433. - darses/CVE-2025-32433
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24813的vulhub环境的POC脚本
URL:https://github.com/Erosion2020/CVE-2025-24813-vulhub
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24813的vulhub环境的POC脚本
URL:https://github.com/Erosion2020/CVE-2025-24813-vulhub
标签:#CVE-2025
GitHub
GitHub - Erosion2020/CVE-2025-24813-vulhub: CVE-2025-24813的vulhub环境的POC脚本
CVE-2025-24813的vulhub环境的POC脚本. Contribute to Erosion2020/CVE-2025-24813-vulhub development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:PHP CGI Parameter Injection Vulnerability (RCE: Remote Code Execution)
URL:https://github.com/Gill-Singh-A/CVE-2024-4577-Exploit
标签:#RCE
更新了:RCE
描述:PHP CGI Parameter Injection Vulnerability (RCE: Remote Code Execution)
URL:https://github.com/Gill-Singh-A/CVE-2024-4577-Exploit
标签:#RCE
GitHub
GitHub - Gill-Singh-A/CVE-2024-4577-Exploit: PHP CGI Parameter Injection Vulnerability (RCE: Remote Code Execution)
PHP CGI Parameter Injection Vulnerability (RCE: Remote Code Execution) - Gill-Singh-A/CVE-2024-4577-Exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC - CVE-2025-24071 / CVE-2025-24054, NTMLv2 hash'leri alınabilen bir vulnerability
URL:https://github.com/xigney/CVE-2025-24054_PoC
标签:#CVE-2025
更新了:CVE-2025
描述:PoC - CVE-2025-24071 / CVE-2025-24054, NTMLv2 hash'leri alınabilen bir vulnerability
URL:https://github.com/xigney/CVE-2025-24054_PoC
标签:#CVE-2025
GitHub
GitHub - basekilll/CVE-2025-24054_PoC: PoC - CVE-2025-24071 / CVE-2025-24054, NTMLv2 hash'leri alınabilen bir vulnerability
PoC - CVE-2025-24071 / CVE-2025-24054, NTMLv2 hash'leri alınabilen bir vulnerability - basekilll/CVE-2025-24054_PoC
👍1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:EXPLOIT CVE-2025-3102
URL:https://github.com/itsismarcos/vanda-CVE-2025-3102
标签:#CVE-2025
更新了:CVE-2025
描述:EXPLOIT CVE-2025-3102
URL:https://github.com/itsismarcos/vanda-CVE-2025-3102
标签:#CVE-2025
GitHub
GitHub - itsismarcos/vanda-CVE-2025-3102: EXPLOIT CVE-2025-3102
EXPLOIT CVE-2025-3102 . Contribute to itsismarcos/vanda-CVE-2025-3102 development by creating an account on GitHub.