GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨
URL:https://github.com/SkylerMC/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨
URL:https://github.com/SkylerMC/CVE-2025-32463
标签:#CVE-2025
GitHub
GitHub - SkylerMC/CVE-2025-32463: Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access.…
Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨ - SkylerMC/CVE-2025-32463
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒
URL:https://github.com/yeremeu/CVE-2025-32463_chwoot
标签:#CVE-2025
更新了:CVE-2025
描述:Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒
URL:https://github.com/yeremeu/CVE-2025-32463_chwoot
标签:#CVE-2025
GitHub
GitHub - yeremeu/CVE-2025-32463_chwoot: Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit…
Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒 - yeremeu/CVE-2025-32463_chwoot
GitHub监控消息提醒!!!
更新了:RCE
描述:A simulation tool for testing remote code execution (RCE) Bugs in the Discord desktop client
URL:https://github.com/0Rafas/Discord-RCE
标签:#RCE
更新了:RCE
描述:A simulation tool for testing remote code execution (RCE) Bugs in the Discord desktop client
URL:https://github.com/0Rafas/Discord-RCE
标签:#RCE
GitHub
GitHub - 0Rafas/Discord-RCE: A simulation tool for testing remote code execution (RCE) Bugs in the Discord desktop client
A simulation tool for testing remote code execution (RCE) Bugs in the Discord desktop client - 0Rafas/Discord-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49493
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-49493
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49493
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-49493
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-49493: CVE-2025-49493
CVE-2025-49493. Contribute to B1ack4sh/Blackash-CVE-2025-49493 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-0411
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-0411
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-0411
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-0411
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-0411: CVE-2025-0411
CVE-2025-0411. Contribute to B1ack4sh/Blackash-CVE-2025-0411 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-29927
URL:https://github.com/aest3ra/NextJS-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-29927
URL:https://github.com/aest3ra/NextJS-PoC
标签:#CVE-2025
GitHub
GitHub - aest3ra/NextJS-PoC: NextJS-PoC
NextJS-PoC. Contribute to aest3ra/NextJS-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only.
URL:https://github.com/FreeDurok/CVE-2025-32463-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only.
URL:https://github.com/FreeDurok/CVE-2025-32463-PoC
标签:#CVE-2025
GitHub
GitHub - FreeDurok/CVE-2025-32463-PoC: Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R…
Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only. - FreeDurok/CVE-2025-3246...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-4403
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-4403
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-4403
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-4403
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-4403: CVE-2025-4403
CVE-2025-4403. Contribute to Ashwesker/Blackash-CVE-2025-4403 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:(RCE) vulnerability in the Werkzeug debugger
URL:https://github.com/Sic4rio/RCE-Werkzeug-debugger
标签:#RCE
更新了:RCE
描述:(RCE) vulnerability in the Werkzeug debugger
URL:https://github.com/Sic4rio/RCE-Werkzeug-debugger
标签:#RCE
GitHub
GitHub - Sic4rio/RCE-Werkzeug-debugger: (RCE) vulnerability in the Werkzeug debugger
(RCE) vulnerability in the Werkzeug debugger . Contribute to Sic4rio/RCE-Werkzeug-debugger development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured sudoers
URL:https://github.com/cyberpoul/CVE-2025-32462-POC
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured sudoers
URL:https://github.com/cyberpoul/CVE-2025-32462-POC
标签:#CVE-2025
GitHub
GitHub - cyberpoul/CVE-2025-32462-POC: 🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured…
🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured sudoers - cyberpoul/CVE-2025-32462-POC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-20281
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-20281
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-20281
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-20281
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-20281: CVE-2025-20281
CVE-2025-20281. Contribute to B1ack4sh/Blackash-CVE-2025-20281 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This repository is for data used in the RCEL 506 Course
URL:https://github.com/derekmayon/RCEL506
标签:#RCE
更新了:RCE
描述:This repository is for data used in the RCEL 506 Course
URL:https://github.com/derekmayon/RCEL506
标签:#RCE
GitHub
GitHub - derekmayon/RCEL506: This repository is for data used in the RCEL 506 Course
This repository is for data used in the RCEL 506 Course - derekmayon/RCEL506
GitHub监控消息提醒!!!
更新了:代码审计
描述:X-SAST 替代Seay的多语言、轻量、快速、代码审计工具
URL:https://github.com/winezer0/X-SAST-PUBLIC
标签:#代码审计
更新了:代码审计
描述:X-SAST 替代Seay的多语言、轻量、快速、代码审计工具
URL:https://github.com/winezer0/X-SAST-PUBLIC
标签:#代码审计
GitHub
GitHub - winezer0/XSAST-Python: X-SAST 替代Seay的多语言、轻量、快速、代码审计工具 (Python版本)
X-SAST 替代Seay的多语言、轻量、快速、代码审计工具 (Python版本). Contribute to winezer0/XSAST-Python development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:符合 OpenForensicRules 数字取证与应急响应信息采集规则格式规范的配置文件仓库
URL:https://github.com/Just-Hack-For-Fun/NOPTrace-Configs
标签:#应急响应
更新了:应急响应
描述:符合 OpenForensicRules 数字取证与应急响应信息采集规则格式规范的配置文件仓库
URL:https://github.com/Just-Hack-For-Fun/NOPTrace-Configs
标签:#应急响应
GitHub
GitHub - Just-Hack-For-Fun/NOPTrace-Configs: 符合 OpenForensicRules 数字取证与应急响应信息采集规则格式规范的配置文件仓库
符合 OpenForensicRules 数字取证与应急响应信息采集规则格式规范的配置文件仓库. Contribute to Just-Hack-For-Fun/NOPTrace-Configs development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Docker PoC for CVE-2025-32462 & CVE-2025-32463 (sudo), based on Stratascale CRU research.
URL:https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab
标签:#CVE-2025
更新了:CVE-2025
描述:Docker PoC for CVE-2025-32462 & CVE-2025-32463 (sudo), based on Stratascale CRU research.
URL:https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab
标签:#CVE-2025
GitHub
GitHub - MAAYTHM/CVE-2025-32462_32463-Lab: Docker PoC for CVE-2025-32462 & CVE-2025-32463 (sudo), based on Stratascale CRU research.
Docker PoC for CVE-2025-32462 & CVE-2025-32463 (sudo), based on Stratascale CRU research. - MAAYTHM/CVE-2025-32462_32463-Lab
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-47812 with custom psudo shell and robust error handling.
URL:https://github.com/pevinkumar10/CVE-2025-47812
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-47812 with custom psudo shell and robust error handling.
URL:https://github.com/pevinkumar10/CVE-2025-47812
标签:#CVE-2025
GitHub
GitHub - pevinkumar10/CVE-2025-47812: Exploit for CVE-2025-47812 with custom psudo shell and robust error handling.
Exploit for CVE-2025-47812 with custom psudo shell and robust error handling. - pevinkumar10/CVE-2025-47812