GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-47533 Clobber RCE
URL:https://github.com/NiteeshPujari/CVE-2025-32433-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-47533 Clobber RCE
URL:https://github.com/NiteeshPujari/CVE-2025-32433-PoC
标签:#CVE-2025
GitHub
GitHub - NiteeshPujari/CVE-2025-32433-PoC: CVE-2025-32433 PoC: Unauthenticated Remote Code Execution (RCE) in Erlang/OTP SSH. A…
CVE-2025-32433 PoC: Unauthenticated Remote Code Execution (RCE) in Erlang/OTP SSH. A proof-of-concept exploit for CVE-2025-32433 - NiteeshPujari/CVE-2025-32433-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for CVE-2025-50154, a Zero Day Vulnerability Leaking NTLM Challenge in 0 Click. It is a bypass for the CVE-2025-24054 Security Patch
URL:https://github.com/rubenformation/CVE-2025-50154
标签:#CVE-2025
更新了:CVE-2025
描述:POC for CVE-2025-50154, a Zero Day Vulnerability Leaking NTLM Challenge in 0 Click. It is a bypass for the CVE-2025-24054 Security Patch
URL:https://github.com/rubenformation/CVE-2025-50154
标签:#CVE-2025
GitHub
GitHub - rubenformation/CVE-2025-50154: POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer…
POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interaction. It is a bypass for the CVE-2025-24054 Security Patch - ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit)
URL:https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit)
URL:https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
标签:#CVE-2025
GitHub
GitHub - sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-: CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit)
CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit) - sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE Payload for NPM Dependency Confusion Attack
URL:https://github.com/Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload
标签:#RCE
更新了:RCE
描述:RCE Payload for NPM Dependency Confusion Attack
URL:https://github.com/Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload
标签:#RCE
GitHub
Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload
RCE Payload for NPM Dependency Confusion Attack. Contribute to Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection PoC
URL:https://github.com/barbaraeivyu/CVE-2025-25256
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection PoC
URL:https://github.com/barbaraeivyu/CVE-2025-25256
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:渗透测试
描述:RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志、提炼情报、模拟攻击链、制定作战计划。无论是迅速锁定漏洞、整理入侵痕迹,还是推演渗透路径,RedDynasty 都能在暗潮汹涌的网络战场,为你提供敏锐、精准、贴近红队思维的智力支持。
URL:https://github.com/ctkqiang/RedDynasty
标签:#渗透测试
更新了:渗透测试
描述:RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志、提炼情报、模拟攻击链、制定作战计划。无论是迅速锁定漏洞、整理入侵痕迹,还是推演渗透路径,RedDynasty 都能在暗潮汹涌的网络战场,为你提供敏锐、精准、贴近红队思维的智力支持。
URL:https://github.com/ctkqiang/RedDynasty
标签:#渗透测试
GitHub
GitHub - ctkqiang/RedDynasty: RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志…
RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志、提炼情报、模拟攻击链、制定作战计划。无论是迅速锁定漏洞、整理入侵痕迹,还是推演渗透路径,RedDynasty 都能在暗潮汹涌的网络战场,为你提供敏锐、精准、贴近红队思维的智力支持。 - ctkqian...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:this is a poc for the CVE-2025-54887
URL:https://github.com/Wizard079/CVE-2025-54887_POC
标签:#CVE-2025
更新了:CVE-2025
描述:this is a poc for the CVE-2025-54887
URL:https://github.com/Wizard079/CVE-2025-54887_POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53773
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53773
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53773
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53773
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-53773: CVE-2025-53773
CVE-2025-53773 . Contribute to B1ack4sh/Blackash-CVE-2025-53773 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of concept for the vulnerability CVE-2025-50428: Authenticated OS Command Injection in RaspAP
URL:https://github.com/security-smarttecs/cve-2025-50428
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of concept for the vulnerability CVE-2025-50428: Authenticated OS Command Injection in RaspAP
URL:https://github.com/security-smarttecs/cve-2025-50428
标签:#CVE-2025
GitHub
GitHub - security-smarttecs/cve-2025-50428: Proof of concept for the vulnerability CVE-2025-50428: Authenticated OS Command Injection…
Proof of concept for the vulnerability CVE-2025-50428: Authenticated OS Command Injection in RaspAP - security-smarttecs/cve-2025-50428
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for XWiki Remote Code Execution Vulnerability (CVE-2025-24893)
URL:https://github.com/CMassa/CVE-2025-24893
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for XWiki Remote Code Execution Vulnerability (CVE-2025-24893)
URL:https://github.com/CMassa/CVE-2025-24893
标签:#CVE-2025
GitHub
GitHub - CMassa/CVE-2025-24893: PoC exploit for XWiki Remote Code Execution Vulnerability (CVE-2025-24893)
PoC exploit for XWiki Remote Code Execution Vulnerability (CVE-2025-24893) - CMassa/CVE-2025-24893
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088
URL:https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool
标签:#CVE-2025
更新了:CVE-2025
描述:Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088
URL:https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool
标签:#CVE-2025
GitHub
GitHub - onlytoxi/CVE-2025-8088-Winrar-Tool: Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088
Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088 - onlytoxi/CVE-2025-8088-Winrar-Tool
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53770 - SharePoint
URL:https://github.com/ghostn4444/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53770 - SharePoint
URL:https://github.com/ghostn4444/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - ghostn4444/CVE-2025-53770: CVE-2025-53770 - SharePoint
CVE-2025-53770 - SharePoint. Contribute to ghostn4444/CVE-2025-53770 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:镜花水月-一体化渗透测试框架
URL:https://github.com/hack007x/Mirror-Flowers-and-Water-Moons
标签:#渗透测试
更新了:渗透测试
描述:镜花水月-一体化渗透测试框架
URL:https://github.com/hack007x/Mirror-Flowers-and-Water-Moons
标签:#渗透测试
GitHub
GitHub - hack007x/MoonVeil: 集成多种攻防技术与检测手段,帮助安全测试人员高效执行信息收集、漏洞挖掘、利用验证, 提升渗透测试的自动化与体系化水平,为安全团队快速发现潜在风险与攻击面提供有力支持。
集成多种攻防技术与检测手段,帮助安全测试人员高效执行信息收集、漏洞挖掘、利用验证, 提升渗透测试的自动化与体系化水平,为安全团队快速发现潜在风险与攻击面提供有力支持。 - hack007x/MoonVeil
GitHub监控消息提醒!!!
更新了:sql注入
描述:基于springboot的安全模块,包括加解密、数据脱敏、防篡改、sql注入等
URL:https://github.com/rainsoil/securt-kit
标签:#sql注入
更新了:sql注入
描述:基于springboot的安全模块,包括加解密、数据脱敏、防篡改、sql注入等
URL:https://github.com/rainsoil/securt-kit
标签:#sql注入
GitHub
rainsoil/securt-kit
基于springboot的安全模块,包括加解密、数据脱敏、防篡改、sql注入等. Contribute to rainsoil/securt-kit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure for CVE-2025-8091
URL:https://github.com/MooseLoveti/EventON-Lite-CVE-Report
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure for CVE-2025-8091
URL:https://github.com/MooseLoveti/EventON-Lite-CVE-Report
标签:#CVE-2025
GitHub
GitHub - MooseLoveti/EventON-Lite-CVE-Report: Disclosure for CVE-2025-8091
Disclosure for CVE-2025-8091. Contribute to MooseLoveti/EventON-Lite-CVE-Report development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。
URL:https://github.com/guchangan1/CodeVulnScan
标签:#代码审计
更新了:代码审计
描述:CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。
URL:https://github.com/guchangan1/CodeVulnScan
标签:#代码审计
GitHub
GitHub - guchangan1/CodeVulnScan: CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。
CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。 - guchangan1/CodeVulnScan
GitHub监控消息提醒!!!
更新了:应急响应
描述:隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本
URL:https://github.com/taielab/YinGuard
标签:#应急响应
更新了:应急响应
描述:隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本
URL:https://github.com/taielab/YinGuard
标签:#应急响应
GitHub
GitHub - taielab/YinGuard: 隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本
隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本. Contribute to taielab/YinGuard development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50461
URL:https://github.com/jordan922/cve2025-20265
标签:#CVE-2025
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50461
URL:https://github.com/jordan922/cve2025-20265
标签:#CVE-2025
GitHub
GitHub - jordan922/cve2025-20265: Safe Python script to detect Cisco FMC instances potentially vulnerable to CVE-2025-20265. Uses…
Safe Python script to detect Cisco FMC instances potentially vulnerable to CVE-2025-20265. Uses official FMC API to check version, supports single/multi-target scanning, and includes a harmless l...