GitHub监控消息提醒!!!
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例
URL:https://github.com/CJackHwang/AIstudioProxyAPI
标签:#绕过
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例
URL:https://github.com/CJackHwang/AIstudioProxyAPI
标签:#绕过
GitHub
GitHub - CJackHwang/AIstudioProxyAPI: 一个基于 Python + FastAPI + Playwright + Camoufox 的代理服务器,兼容 OpenAI API 支持参数转发设置,将请求转发到 Google…
一个基于 Python + FastAPI + Playwright + Camoufox 的代理服务器,兼容 OpenAI API 支持参数转发设置,将请求转发到 Google AI Studio 网页版的对话,并同样按照标准格式返回输出的工具。课余时间有限,周更 - CJackHwang/AIstudioProxyAPI
GitHub监控消息提醒!!!
更新了:反序列化
描述:以阅读权限设置为示例,包括jackson多态反序列化、数据库单表多态映射、mapstruct使用等
URL:https://github.com/lemon-piepie/read-permission-demo
标签:#反序列化
更新了:反序列化
描述:以阅读权限设置为示例,包括jackson多态反序列化、数据库单表多态映射、mapstruct使用等
URL:https://github.com/lemon-piepie/read-permission-demo
标签:#反序列化
GitHub
GitHub - lemon-piepie/read-permission-demo: 以阅读权限设置为示例,包括jackson多态反序列化、数据库单表多态映射、mapstruct使用等
以阅读权限设置为示例,包括jackson多态反序列化、数据库单表多态映射、mapstruct使用等. Contribute to lemon-piepie/read-permission-demo development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CraftCMS RCE Checker (CVE-2025-32432)
URL:https://github.com/Chocapikk/CVE-2025-32432
标签:#CVE-2025
更新了:CVE-2025
描述:CraftCMS RCE Checker (CVE-2025-32432)
URL:https://github.com/Chocapikk/CVE-2025-32432
标签:#CVE-2025
GitHub
GitHub - Chocapikk/CVE-2025-32432: CraftCMS RCE Checker (CVE-2025-32432)
CraftCMS RCE Checker (CVE-2025-32432). Contribute to Chocapikk/CVE-2025-32432 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32433 Summary and Attack Overview
URL:https://github.com/MrDreamReal/CVE-2025-32433
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32433 Summary and Attack Overview
URL:https://github.com/MrDreamReal/CVE-2025-32433
标签:#CVE-2025
GitHub
GitHub - MrDreamReal/CVE-2025-32433: CVE-2025-32433 Summary and Attack Overview
CVE-2025-32433 Summary and Attack Overview. Contribute to MrDreamReal/CVE-2025-32433 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-3248 Langflow 사전 인증 원격 코드 실행 취약점 PoC
URL:https://github.com/minxxcozy/CVE-2025-3248-langflow-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-3248 Langflow 사전 인증 원격 코드 실행 취약점 PoC
URL:https://github.com/minxxcozy/CVE-2025-3248-langflow-RCE
标签:#CVE-2025
GitHub
minxxcozy/CVE-2025-3248-langflow-RCE
CVE-2025-3248 Langflow 사전 인증 원격 코드 실행 취약점 PoC. Contribute to minxxcozy/CVE-2025-3248-langflow-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054
URL:https://github.com/ClementNjeru/CVE-2025-24054-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054
URL:https://github.com/ClementNjeru/CVE-2025-24054-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054
URL:https://github.com/Sachinart/CVE-2025-32432
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054
URL:https://github.com/Sachinart/CVE-2025-32432
标签:#CVE-2025
GitHub
GitHub - Sachinart/CVE-2025-32432: This repository contains a proof-of-concept exploit script for CVE-2025-32432, a pre-authentication…
This repository contains a proof-of-concept exploit script for CVE-2025-32432, a pre-authentication Remote Code Execution (RCE) vulnerability affecting CraftCMS versions 4.x and 5.x. The vulnerabil...
GitHub监控消息提醒!!!
更新了:蓝队
描述:该知识库是一些网络安全的文档,主要偏向蓝队的使用,尤其是在面对甲方的时候。
URL:https://github.com/Ms-yin/Network
标签:#蓝队
更新了:蓝队
描述:该知识库是一些网络安全的文档,主要偏向蓝队的使用,尤其是在面对甲方的时候。
URL:https://github.com/Ms-yin/Network
标签:#蓝队
GitHub
GitHub - Ms-yin/Network: 该知识库是一些网络安全的文档,主要偏向蓝队的使用,尤其是在面对甲方的时候。
该知识库是一些网络安全的文档,主要偏向蓝队的使用,尤其是在面对甲方的时候。. Contribute to Ms-yin/Network development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32432 checker and exploit
URL:https://github.com/ibrahimsql/CVE-2025-32432
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32432 checker and exploit
URL:https://github.com/ibrahimsql/CVE-2025-32432
标签:#CVE-2025
GitHub
GitHub - ibrahimsql/CVE-2025-32432: CVE-2025-32432 checker and exploit
CVE-2025-32432 checker and exploit . Contribute to ibrahimsql/CVE-2025-32432 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat.
URL:https://github.com/hakankarabacak/CVE-2025-24813
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat.
URL:https://github.com/hakankarabacak/CVE-2025-24813
标签:#CVE-2025
GitHub
GitHub - hakankarabacak/CVE-2025-24813: Proof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat.
Proof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat. - hakankarabacak/CVE-2025-24813
GitHub监控消息提醒!!!
更新了:钓鱼
描述:这里是游戏官网的超级收纳站,Steam、Epic 等 PC 平台,PlayStation Store、Xbox Store 等主机平台,以及 iOS App Store、Google Play 等移动端平台官网,云游戏平台也一个不落。网站界面简洁,输入平台名或关键词,瞬间就能精准找到官网链接。所有链接都经严格筛查,定期核验,为你挡住钓鱼风险,放心开启游戏探索之旅,快来试试吧 。
URL:https://github.com/JiuDaoman/GameLink
标签:#钓鱼
更新了:钓鱼
描述:这里是游戏官网的超级收纳站,Steam、Epic 等 PC 平台,PlayStation Store、Xbox Store 等主机平台,以及 iOS App Store、Google Play 等移动端平台官网,云游戏平台也一个不落。网站界面简洁,输入平台名或关键词,瞬间就能精准找到官网链接。所有链接都经严格筛查,定期核验,为你挡住钓鱼风险,放心开启游戏探索之旅,快来试试吧 。
URL:https://github.com/JiuDaoman/GameLink
标签:#钓鱼
GitHub
GitHub - JiuDaoman/GameLink: 这里是游戏官网的超级收纳站,Steam、Epic 等 PC 平台,PlayStation Store、Xbox Store 等主机平台,以及 iOS App Store、Google Play …
这里是游戏官网的超级收纳站,Steam、Epic 等 PC 平台,PlayStation Store、Xbox Store 等主机平台,以及 iOS App Store、Google Play 等移动端平台官网,云游戏平台也一个不落。网站界面简洁,输入平台名或关键词,瞬间就能精准找到官网链接。所有链接都经严格筛查,定期核验,为你挡住钓鱼风险,放心开启游戏探索之旅,快来试试吧 。 - JiuD...
GitHub监控消息提醒!!!
更新了:burp
描述:output burp body only and auto pretiffy
URL:https://github.com/rikeshbaniya/bodyonly
标签:#burp
更新了:burp
描述:output burp body only and auto pretiffy
URL:https://github.com/rikeshbaniya/bodyonly
标签:#burp
GitHub
GitHub - rikeshbaniya/bodyonly: output burp body only and auto pretiffy
output burp body only and auto pretiffy. Contribute to rikeshbaniya/bodyonly development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2023-46818 Python3 Exploit for Backdrop CMS <= 1.22.0 Authenticated Remote Command Execution (RCE)
URL:https://github.com/ajdumanhug/CVE-2022-42092
标签:#RCE
更新了:RCE
描述:CVE-2023-46818 Python3 Exploit for Backdrop CMS <= 1.22.0 Authenticated Remote Command Execution (RCE)
URL:https://github.com/ajdumanhug/CVE-2022-42092
标签:#RCE
GitHub
GitHub - ajdumanhug/CVE-2022-42092: CVE-2023-46818 Python3 Exploit for Backdrop CMS <= 1.22.0 Authenticated Remote Command Execution…
CVE-2023-46818 Python3 Exploit for Backdrop CMS <= 1.22.0 Authenticated Remote Command Execution (RCE) - ajdumanhug/CVE-2022-42092
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025042721ijvq9tmixa7mt5hvvrbgsw
URL:https://github.com/static-web-apps-testing-org/swa2025042721ijvq9tmixa7mt5hvvrbgsw
标签:#hvv
更新了:hvv
描述:swa2025042721ijvq9tmixa7mt5hvvrbgsw
URL:https://github.com/static-web-apps-testing-org/swa2025042721ijvq9tmixa7mt5hvvrbgsw
标签:#hvv
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:SAP PoC para CVE-2025-31324
URL:https://github.com/moften/CVE-2025-31324
标签:#CVE-2025
更新了:CVE-2025
描述:SAP PoC para CVE-2025-31324
URL:https://github.com/moften/CVE-2025-31324
标签:#CVE-2025
GitHub
GitHub - moften/CVE-2025-31324: SAP PoC para CVE-2025-31324
SAP PoC para CVE-2025-31324. Contribute to moften/CVE-2025-31324 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29927
URL:https://github.com/hed1ad/my-CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29927
URL:https://github.com/hed1ad/my-CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - hed1ad/my-CVE-2025-29927: CVE-2025-29927
CVE-2025-29927. Contribute to hed1ad/my-CVE-2025-29927 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29927
URL:https://github.com/hed1ad/CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29927
URL:https://github.com/hed1ad/CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - hed1ad/CVE-2025-29927: CVE-2025-29927
CVE-2025-29927. Contribute to hed1ad/CVE-2025-29927 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:The first proof of concept of the Contao CMS RCE
URL:https://github.com/SystemVll/CVE-2022-26265
标签:#RCE
更新了:RCE
描述:The first proof of concept of the Contao CMS RCE
URL:https://github.com/SystemVll/CVE-2022-26265
标签:#RCE
GitHub
GitHub - SystemVll/CVE-2022-26265: The first proof of concept of the Contao CMS RCE
The first proof of concept of the Contao CMS RCE. Contribute to SystemVll/CVE-2022-26265 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32433 is a vuln of ssh
URL:https://github.com/Know56/CVE-2025-32433
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32433 is a vuln of ssh
URL:https://github.com/Know56/CVE-2025-32433
标签:#CVE-2025
GitHub
GitHub - Know56/CVE-2025-32433: CVE-2025-32433 is a vuln of ssh
CVE-2025-32433 is a vuln of ssh. Contribute to Know56/CVE-2025-32433 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader
URL:https://github.com/ODST-Forge/CVE-2025-31324_PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader
URL:https://github.com/ODST-Forge/CVE-2025-31324_PoC
标签:#CVE-2025
GitHub
GitHub - ODST-Forge/CVE-2025-31324_PoC: Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in SAP NetWeaver Visual Composer…
Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader - ODST-Forge/CVE-2025-31324_PoC