GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49493
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-49493
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49493
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-49493
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-49493: CVE-2025-49493
CVE-2025-49493. Contribute to B1ack4sh/Blackash-CVE-2025-49493 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-0411
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-0411
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-0411
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-0411
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-0411: CVE-2025-0411
CVE-2025-0411. Contribute to B1ack4sh/Blackash-CVE-2025-0411 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-29927
URL:https://github.com/aest3ra/NextJS-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-29927
URL:https://github.com/aest3ra/NextJS-PoC
标签:#CVE-2025
GitHub
GitHub - aest3ra/NextJS-PoC: NextJS-PoC
NextJS-PoC. Contribute to aest3ra/NextJS-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only.
URL:https://github.com/FreeDurok/CVE-2025-32463-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only.
URL:https://github.com/FreeDurok/CVE-2025-32463-PoC
标签:#CVE-2025
GitHub
GitHub - FreeDurok/CVE-2025-32463-PoC: Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R…
Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only. - FreeDurok/CVE-2025-3246...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-4403
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-4403
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-4403
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-4403
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-4403: CVE-2025-4403
CVE-2025-4403. Contribute to Ashwesker/Blackash-CVE-2025-4403 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:(RCE) vulnerability in the Werkzeug debugger
URL:https://github.com/Sic4rio/RCE-Werkzeug-debugger
标签:#RCE
更新了:RCE
描述:(RCE) vulnerability in the Werkzeug debugger
URL:https://github.com/Sic4rio/RCE-Werkzeug-debugger
标签:#RCE
GitHub
GitHub - Sic4rio/RCE-Werkzeug-debugger: (RCE) vulnerability in the Werkzeug debugger
(RCE) vulnerability in the Werkzeug debugger . Contribute to Sic4rio/RCE-Werkzeug-debugger development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured sudoers
URL:https://github.com/cyberpoul/CVE-2025-32462-POC
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured sudoers
URL:https://github.com/cyberpoul/CVE-2025-32462-POC
标签:#CVE-2025
GitHub
GitHub - cyberpoul/CVE-2025-32462-POC: 🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured…
🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured sudoers - cyberpoul/CVE-2025-32462-POC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-20281
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-20281
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-20281
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-20281
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-20281: CVE-2025-20281
CVE-2025-20281. Contribute to B1ack4sh/Blackash-CVE-2025-20281 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This repository is for data used in the RCEL 506 Course
URL:https://github.com/derekmayon/RCEL506
标签:#RCE
更新了:RCE
描述:This repository is for data used in the RCEL 506 Course
URL:https://github.com/derekmayon/RCEL506
标签:#RCE
GitHub
GitHub - derekmayon/RCEL506: This repository is for data used in the RCEL 506 Course
This repository is for data used in the RCEL 506 Course - derekmayon/RCEL506
GitHub监控消息提醒!!!
更新了:代码审计
描述:X-SAST 替代Seay的多语言、轻量、快速、代码审计工具
URL:https://github.com/winezer0/X-SAST-PUBLIC
标签:#代码审计
更新了:代码审计
描述:X-SAST 替代Seay的多语言、轻量、快速、代码审计工具
URL:https://github.com/winezer0/X-SAST-PUBLIC
标签:#代码审计
GitHub
GitHub - winezer0/XSAST-Python: X-SAST 替代Seay的多语言、轻量、快速、代码审计工具 (Python版本)
X-SAST 替代Seay的多语言、轻量、快速、代码审计工具 (Python版本). Contribute to winezer0/XSAST-Python development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:符合 OpenForensicRules 数字取证与应急响应信息采集规则格式规范的配置文件仓库
URL:https://github.com/Just-Hack-For-Fun/NOPTrace-Configs
标签:#应急响应
更新了:应急响应
描述:符合 OpenForensicRules 数字取证与应急响应信息采集规则格式规范的配置文件仓库
URL:https://github.com/Just-Hack-For-Fun/NOPTrace-Configs
标签:#应急响应
GitHub
GitHub - Just-Hack-For-Fun/NOPTrace-Configs: 符合 OpenForensicRules 数字取证与应急响应信息采集规则格式规范的配置文件仓库
符合 OpenForensicRules 数字取证与应急响应信息采集规则格式规范的配置文件仓库. Contribute to Just-Hack-For-Fun/NOPTrace-Configs development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Docker PoC for CVE-2025-32462 & CVE-2025-32463 (sudo), based on Stratascale CRU research.
URL:https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab
标签:#CVE-2025
更新了:CVE-2025
描述:Docker PoC for CVE-2025-32462 & CVE-2025-32463 (sudo), based on Stratascale CRU research.
URL:https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab
标签:#CVE-2025
GitHub
GitHub - MAAYTHM/CVE-2025-32462_32463-Lab: Docker PoC for CVE-2025-32462 & CVE-2025-32463 (sudo), based on Stratascale CRU research.
Docker PoC for CVE-2025-32462 & CVE-2025-32463 (sudo), based on Stratascale CRU research. - MAAYTHM/CVE-2025-32462_32463-Lab
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-47812 with custom psudo shell and robust error handling.
URL:https://github.com/pevinkumar10/CVE-2025-47812
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-47812 with custom psudo shell and robust error handling.
URL:https://github.com/pevinkumar10/CVE-2025-47812
标签:#CVE-2025
GitHub
GitHub - pevinkumar10/CVE-2025-47812: Exploit for CVE-2025-47812 with custom psudo shell and robust error handling.
Exploit for CVE-2025-47812 with custom psudo shell and robust error handling. - pevinkumar10/CVE-2025-47812
GitHub监控消息提醒!!!
更新了:RCE
描述:A PoC for CVE-2025-48703 (CWP RCE) with intelligent user dictionary generation based on domain names to maximize the reliability of successful exploitation.
URL:https://github.com/Sq-CC/CVE-2025-48703
标签:#RCE
更新了:RCE
描述:A PoC for CVE-2025-48703 (CWP RCE) with intelligent user dictionary generation based on domain names to maximize the reliability of successful exploitation.
URL:https://github.com/Sq-CC/CVE-2025-48703
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Authenticated RCE in Grafana (v11.0) via SQL Expressions - PoC Exploit
URL:https://github.com/rvizx/CVE-2024-9264
标签:#RCE
更新了:RCE
描述:Authenticated RCE in Grafana (v11.0) via SQL Expressions - PoC Exploit
URL:https://github.com/rvizx/CVE-2024-9264
标签:#RCE
GitHub
GitHub - rvizx/CVE-2024-9264: Authenticated RCE in Grafana (v11.0) via SQL Expressions - PoC Exploit
Authenticated RCE in Grafana (v11.0) via SQL Expressions - PoC Exploit - rvizx/CVE-2024-9264
GitHub监控消息提醒!!!
更新了:代码审计
描述:6万字奶爸级WebGoat8.X代码审计大全,全文均可复现,适合刚学完JAVASE准备开始代码审计的师傅🌟
URL:https://github.com/d0ctorsec/WebGoatVulnerabilityRangeCodeAudit
标签:#代码审计
更新了:代码审计
描述:6万字奶爸级WebGoat8.X代码审计大全,全文均可复现,适合刚学完JAVASE准备开始代码审计的师傅🌟
URL:https://github.com/d0ctorsec/WebGoatVulnerabilityRangeCodeAudit
标签:#代码审计
GitHub
GitHub - d0ctorsec/WebGoatVulnerabilityRangeCodeAudit: 6万字奶爸级WebGoat8.X代码审计大全,全文均可复现,适合刚学完JAVASE准备开始代码审计的师傅🌟
6万字奶爸级WebGoat8.X代码审计大全,全文均可复现,适合刚学完JAVASE准备开始代码审计的师傅🌟 - d0ctorsec/WebGoatVulnerabilityRangeCodeAudit