GitHub监控消息提醒!!!
更新了:RCE
描述:RCE Payload for NPM Dependency Confusion Attack
URL:https://github.com/Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload
标签:#RCE
更新了:RCE
描述:RCE Payload for NPM Dependency Confusion Attack
URL:https://github.com/Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload
标签:#RCE
GitHub
Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload
RCE Payload for NPM Dependency Confusion Attack. Contribute to Shehzadcyber/NPM-Dependency-Confusion-Attack-RCE-Payload development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection PoC
URL:https://github.com/barbaraeivyu/CVE-2025-25256
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection PoC
URL:https://github.com/barbaraeivyu/CVE-2025-25256
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:渗透测试
描述:RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志、提炼情报、模拟攻击链、制定作战计划。无论是迅速锁定漏洞、整理入侵痕迹,还是推演渗透路径,RedDynasty 都能在暗潮汹涌的网络战场,为你提供敏锐、精准、贴近红队思维的智力支持。
URL:https://github.com/ctkqiang/RedDynasty
标签:#渗透测试
更新了:渗透测试
描述:RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志、提炼情报、模拟攻击链、制定作战计划。无论是迅速锁定漏洞、整理入侵痕迹,还是推演渗透路径,RedDynasty 都能在暗潮汹涌的网络战场,为你提供敏锐、精准、贴近红队思维的智力支持。
URL:https://github.com/ctkqiang/RedDynasty
标签:#渗透测试
GitHub
GitHub - ctkqiang/RedDynasty: RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志…
RedDynasty 是一款为红队行动、渗透测试和网络攻防演练量身定制的大语言模型工具,结合精心打磨的提示工程,让 AI 以战术化、结构化的方式回应,就像一名老道的网络作战军师,协助你分析日志、提炼情报、模拟攻击链、制定作战计划。无论是迅速锁定漏洞、整理入侵痕迹,还是推演渗透路径,RedDynasty 都能在暗潮汹涌的网络战场,为你提供敏锐、精准、贴近红队思维的智力支持。 - ctkqian...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:this is a poc for the CVE-2025-54887
URL:https://github.com/Wizard079/CVE-2025-54887_POC
标签:#CVE-2025
更新了:CVE-2025
描述:this is a poc for the CVE-2025-54887
URL:https://github.com/Wizard079/CVE-2025-54887_POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53773
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53773
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53773
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-53773
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/Blackash-CVE-2025-53773: CVE-2025-53773
CVE-2025-53773 . Contribute to B1ack4sh/Blackash-CVE-2025-53773 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of concept for the vulnerability CVE-2025-50428: Authenticated OS Command Injection in RaspAP
URL:https://github.com/security-smarttecs/cve-2025-50428
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of concept for the vulnerability CVE-2025-50428: Authenticated OS Command Injection in RaspAP
URL:https://github.com/security-smarttecs/cve-2025-50428
标签:#CVE-2025
GitHub
GitHub - security-smarttecs/cve-2025-50428: Proof of concept for the vulnerability CVE-2025-50428: Authenticated OS Command Injection…
Proof of concept for the vulnerability CVE-2025-50428: Authenticated OS Command Injection in RaspAP - security-smarttecs/cve-2025-50428
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for XWiki Remote Code Execution Vulnerability (CVE-2025-24893)
URL:https://github.com/CMassa/CVE-2025-24893
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for XWiki Remote Code Execution Vulnerability (CVE-2025-24893)
URL:https://github.com/CMassa/CVE-2025-24893
标签:#CVE-2025
GitHub
GitHub - CMassa/CVE-2025-24893: PoC exploit for XWiki Remote Code Execution Vulnerability (CVE-2025-24893)
PoC exploit for XWiki Remote Code Execution Vulnerability (CVE-2025-24893) - CMassa/CVE-2025-24893
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088
URL:https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool
标签:#CVE-2025
更新了:CVE-2025
描述:Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088
URL:https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool
标签:#CVE-2025
GitHub
GitHub - onlytoxi/CVE-2025-8088-Winrar-Tool: Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088
Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088 - onlytoxi/CVE-2025-8088-Winrar-Tool
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53770 - SharePoint
URL:https://github.com/ghostn4444/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53770 - SharePoint
URL:https://github.com/ghostn4444/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - ghostn4444/CVE-2025-53770: CVE-2025-53770 - SharePoint
CVE-2025-53770 - SharePoint. Contribute to ghostn4444/CVE-2025-53770 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:镜花水月-一体化渗透测试框架
URL:https://github.com/hack007x/Mirror-Flowers-and-Water-Moons
标签:#渗透测试
更新了:渗透测试
描述:镜花水月-一体化渗透测试框架
URL:https://github.com/hack007x/Mirror-Flowers-and-Water-Moons
标签:#渗透测试
GitHub
GitHub - hack007x/MoonVeil: 集成多种攻防技术与检测手段,帮助安全测试人员高效执行信息收集、漏洞挖掘、利用验证, 提升渗透测试的自动化与体系化水平,为安全团队快速发现潜在风险与攻击面提供有力支持。
集成多种攻防技术与检测手段,帮助安全测试人员高效执行信息收集、漏洞挖掘、利用验证, 提升渗透测试的自动化与体系化水平,为安全团队快速发现潜在风险与攻击面提供有力支持。 - hack007x/MoonVeil
GitHub监控消息提醒!!!
更新了:sql注入
描述:基于springboot的安全模块,包括加解密、数据脱敏、防篡改、sql注入等
URL:https://github.com/rainsoil/securt-kit
标签:#sql注入
更新了:sql注入
描述:基于springboot的安全模块,包括加解密、数据脱敏、防篡改、sql注入等
URL:https://github.com/rainsoil/securt-kit
标签:#sql注入
GitHub
rainsoil/securt-kit
基于springboot的安全模块,包括加解密、数据脱敏、防篡改、sql注入等. Contribute to rainsoil/securt-kit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure for CVE-2025-8091
URL:https://github.com/MooseLoveti/EventON-Lite-CVE-Report
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure for CVE-2025-8091
URL:https://github.com/MooseLoveti/EventON-Lite-CVE-Report
标签:#CVE-2025
GitHub
GitHub - MooseLoveti/EventON-Lite-CVE-Report: Disclosure for CVE-2025-8091
Disclosure for CVE-2025-8091. Contribute to MooseLoveti/EventON-Lite-CVE-Report development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。
URL:https://github.com/guchangan1/CodeVulnScan
标签:#代码审计
更新了:代码审计
描述:CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。
URL:https://github.com/guchangan1/CodeVulnScan
标签:#代码审计
GitHub
GitHub - guchangan1/CodeVulnScan: CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。
CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。 - guchangan1/CodeVulnScan
GitHub监控消息提醒!!!
更新了:应急响应
描述:隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本
URL:https://github.com/taielab/YinGuard
标签:#应急响应
更新了:应急响应
描述:隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本
URL:https://github.com/taielab/YinGuard
标签:#应急响应
GitHub
GitHub - taielab/YinGuard: 隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本
隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本. Contribute to taielab/YinGuard development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50461
URL:https://github.com/jordan922/cve2025-20265
标签:#CVE-2025
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50461
URL:https://github.com/jordan922/cve2025-20265
标签:#CVE-2025
GitHub
GitHub - jordan922/cve2025-20265: Safe Python script to detect Cisco FMC instances potentially vulnerable to CVE-2025-20265. Uses…
Safe Python script to detect Cisco FMC instances potentially vulnerable to CVE-2025-20265. Uses official FMC API to check version, supports single/multi-target scanning, and includes a harmless l...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:这是一个轻量级的、纯前端的Web应用,旨在帮助团队或个人追踪项目交付情况、隐私合规问题和渗透测试安全漏洞。所有数据都安全地存储在您自己的浏览器本地,无需任何后端服务器。
URL:https://github.com/Aining777/Project-Security-Dashboard
标签:#渗透测试
更新了:渗透测试
描述:这是一个轻量级的、纯前端的Web应用,旨在帮助团队或个人追踪项目交付情况、隐私合规问题和渗透测试安全漏洞。所有数据都安全地存储在您自己的浏览器本地,无需任何后端服务器。
URL:https://github.com/Aining777/Project-Security-Dashboard
标签:#渗透测试
GitHub
GitHub - Aining777/Project-Security-Dashboard: 这是一个轻量级的、纯前端的Web应用,旨在帮助团队或个人追踪项目交付情况、隐私合规问题和渗透测试安全漏洞。所有数据都安全地存储在您自己的浏览器本地,无需任何后端服务器。
这是一个轻量级的、纯前端的Web应用,旨在帮助团队或个人追踪项目交付情况、隐私合规问题和渗透测试安全漏洞。所有数据都安全地存储在您自己的浏览器本地,无需任何后端服务器。 - Aining777/Project-Security-Dashboard
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50461
URL:https://github.com/Anchor0221/CVE-2025-50461
标签:#CVE-2025
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50461
URL:https://github.com/Anchor0221/CVE-2025-50461
标签:#CVE-2025
GitHub
GitHub - Anchor0221/CVE-2025-50461: Technical Details and Exploit for CVE-2025-50461
Technical Details and Exploit for CVE-2025-50461. Contribute to Anchor0221/CVE-2025-50461 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/Naasso/Estudo-de-Caso-de-Seguranca-Red-Team-
标签:#RCE
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/Naasso/Estudo-de-Caso-de-Seguranca-Red-Team-
标签:#RCE
GitHub
GitHub - NaassonRibeiro/estudo-de-caso-de-seguranca-red-team: Estudo de caso de uma análise de segurança ofensiva (Red Team) que…
Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE. - NaassonRibeiro/estudo-de-caso-de-seguranca-r...