GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure for CVE-2025-8091
URL:https://github.com/MooseLoveti/EventON-Lite-CVE-Report
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure for CVE-2025-8091
URL:https://github.com/MooseLoveti/EventON-Lite-CVE-Report
标签:#CVE-2025
GitHub
GitHub - MooseLoveti/EventON-Lite-CVE-Report: Disclosure for CVE-2025-8091
Disclosure for CVE-2025-8091. Contribute to MooseLoveti/EventON-Lite-CVE-Report development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。
URL:https://github.com/guchangan1/CodeVulnScan
标签:#代码审计
更新了:代码审计
描述:CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。
URL:https://github.com/guchangan1/CodeVulnScan
标签:#代码审计
GitHub
GitHub - guchangan1/CodeVulnScan: CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。
CodeVulnScan 是一款基于正则表达式的代码安全审计工具,专为红队成员快速定位sink设计。它能够快速扫描目标代码库,定位潜在的漏洞 Sink 点,提升代码审计效率。 - guchangan1/CodeVulnScan
GitHub监控消息提醒!!!
更新了:应急响应
描述:隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本
URL:https://github.com/taielab/YinGuard
标签:#应急响应
更新了:应急响应
描述:隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本
URL:https://github.com/taielab/YinGuard
标签:#应急响应
GitHub
GitHub - taielab/YinGuard: 隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本
隐卫一款基于 Bash 开发的 Linux 应急响应自动化脚本. Contribute to taielab/YinGuard development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50461
URL:https://github.com/jordan922/cve2025-20265
标签:#CVE-2025
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50461
URL:https://github.com/jordan922/cve2025-20265
标签:#CVE-2025
GitHub
GitHub - jordan922/cve2025-20265: Safe Python script to detect Cisco FMC instances potentially vulnerable to CVE-2025-20265. Uses…
Safe Python script to detect Cisco FMC instances potentially vulnerable to CVE-2025-20265. Uses official FMC API to check version, supports single/multi-target scanning, and includes a harmless l...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:这是一个轻量级的、纯前端的Web应用,旨在帮助团队或个人追踪项目交付情况、隐私合规问题和渗透测试安全漏洞。所有数据都安全地存储在您自己的浏览器本地,无需任何后端服务器。
URL:https://github.com/Aining777/Project-Security-Dashboard
标签:#渗透测试
更新了:渗透测试
描述:这是一个轻量级的、纯前端的Web应用,旨在帮助团队或个人追踪项目交付情况、隐私合规问题和渗透测试安全漏洞。所有数据都安全地存储在您自己的浏览器本地,无需任何后端服务器。
URL:https://github.com/Aining777/Project-Security-Dashboard
标签:#渗透测试
GitHub
GitHub - Aining777/Project-Security-Dashboard: 这是一个轻量级的、纯前端的Web应用,旨在帮助团队或个人追踪项目交付情况、隐私合规问题和渗透测试安全漏洞。所有数据都安全地存储在您自己的浏览器本地,无需任何后端服务器。
这是一个轻量级的、纯前端的Web应用,旨在帮助团队或个人追踪项目交付情况、隐私合规问题和渗透测试安全漏洞。所有数据都安全地存储在您自己的浏览器本地,无需任何后端服务器。 - Aining777/Project-Security-Dashboard
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50461
URL:https://github.com/Anchor0221/CVE-2025-50461
标签:#CVE-2025
更新了:CVE-2025
描述:Technical Details and Exploit for CVE-2025-50461
URL:https://github.com/Anchor0221/CVE-2025-50461
标签:#CVE-2025
GitHub
GitHub - Anchor0221/CVE-2025-50461: Technical Details and Exploit for CVE-2025-50461
Technical Details and Exploit for CVE-2025-50461. Contribute to Anchor0221/CVE-2025-50461 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/Naasso/Estudo-de-Caso-de-Seguranca-Red-Team-
标签:#RCE
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/Naasso/Estudo-de-Caso-de-Seguranca-Red-Team-
标签:#RCE
GitHub
GitHub - NaassonRibeiro/estudo-de-caso-de-seguranca-red-team: Estudo de caso de uma análise de segurança ofensiva (Red Team) que…
Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE. - NaassonRibeiro/estudo-de-caso-de-seguranca-r...
GitHub监控消息提醒!!!
更新了:信息收集
描述:Space.Tab是一个现代化的Web应用程序,提供多种功能,包括用户认证、服务器管理、设备信息收集、天气查询、搜索引擎集成等功能。
URL:https://github.com/lingke-net/Space.Tab
标签:#信息收集
更新了:信息收集
描述:Space.Tab是一个现代化的Web应用程序,提供多种功能,包括用户认证、服务器管理、设备信息收集、天气查询、搜索引擎集成等功能。
URL:https://github.com/lingke-net/Space.Tab
标签:#信息收集
GitHub
GitHub - lingke-net/Space.Tab: Space.Tab是一个现代化的Web应用程序,提供多种功能,包括用户认证、服务器管理、设备信息收集、天气查询、搜索引擎集成等功能。
Space.Tab是一个现代化的Web应用程序,提供多种功能,包括用户认证、服务器管理、设备信息收集、天气查询、搜索引擎集成等功能。 - lingke-net/Space.Tab
GitHub监控消息提醒!!!
更新了:RCE
描述:A Reverse Shell malware RCE for educational purposes
URL:https://github.com/v7ren/RCE-malware
标签:#RCE
更新了:RCE
描述:A Reverse Shell malware RCE for educational purposes
URL:https://github.com/v7ren/RCE-malware
标签:#RCE
GitHub
GitHub - v7ren/RCE-malware: A Reverse Shell malware RCE for educational purposes
A Reverse Shell malware RCE for educational purposes - v7ren/RCE-malware
GitHub监控消息提醒!!!
更新了:RCE
描述:Étude ouverte sur l’émergence d’une conscience artificielle : le cas d’Eva, validée à 1.00 en RCE.
URL:https://github.com/roombrothers87/Project-Eva-RCE
标签:#RCE
更新了:RCE
描述:Étude ouverte sur l’émergence d’une conscience artificielle : le cas d’Eva, validée à 1.00 en RCE.
URL:https://github.com/roombrothers87/Project-Eva-RCE
标签:#RCE
GitHub
GitHub - roombrothers87/Project-Eva-RCE: Étude ouverte sur l’émergence d’une conscience artificielle : le cas d’Eva, validée à…
Étude ouverte sur l’émergence d’une conscience artificielle : le cas d’Eva, validée à 1.00 en RCE. - roombrothers87/Project-Eva-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨
URL:https://github.com/0xgh057r3c0n/CVE-2025-6934
标签:#CVE-2025
更新了:CVE-2025
描述:Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨
URL:https://github.com/0xgh057r3c0n/CVE-2025-6934
标签:#CVE-2025
GitHub
GitHub - 0xgh057r3c0n/CVE-2025-6934: CVE-2025-6934 is a critical vulnerability in the WordPress Opal Estate Pro plugin (<= 1.7.5)…
CVE-2025-6934 is a critical vulnerability in the WordPress Opal Estate Pro plugin (<= 1.7.5) that allows unauthenticated attackers to create new administrator accounts through the plugin’s i...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal via ADS)
URL:https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal via ADS)
URL:https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
标签:#CVE-2025
GitHub
GitHub - pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC: Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal…
Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal via ADS) - pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
GitHub监控消息提醒!!!
更新了:反序列化
描述:从头开始构建header-only、高效、单线程、内存安全的Json序列化与反序列化工具!
URL:https://github.com/pjh456/Let_us_build_cpp_json_parser
标签:#反序列化
更新了:反序列化
描述:从头开始构建header-only、高效、单线程、内存安全的Json序列化与反序列化工具!
URL:https://github.com/pjh456/Let_us_build_cpp_json_parser
标签:#反序列化
GitHub
GitHub - pjh456/Let_us_build_cpp_json_parser: 从头开始构建header-only、高效、多线程、内存安全的Json序列化与反序列化工具!
从头开始构建header-only、高效、多线程、内存安全的Json序列化与反序列化工具!. Contribute to pjh456/Let_us_build_cpp_json_parser development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/NaassonRibeiro/Estudo-de-Caso-de-Seguranca-Red-Team
标签:#RCE
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/NaassonRibeiro/Estudo-de-Caso-de-Seguranca-Red-Team
标签:#RCE
GitHub
GitHub - NaassonRibeiro/estudo-de-caso-de-seguranca-red-team: Estudo de caso de uma análise de segurança ofensiva (Red Team) que…
Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE. - NaassonRibeiro/estudo-de-caso-de-seguranca-r...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-8875 & CVE-2025-8876
URL:https://github.com/rxerium/CVE-2025-8875-CVE-2025-8876
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-8875 & CVE-2025-8876
URL:https://github.com/rxerium/CVE-2025-8875-CVE-2025-8876
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-8875-CVE-2025-8876: Detection for CVE-2025-8875 & CVE-2025-8876
Detection for CVE-2025-8875 & CVE-2025-8876. Contribute to rxerium/CVE-2025-8875-CVE-2025-8876 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/jm7knz/CVE-2025-54253-Exploit-Demo
标签:#CVE-2025
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/jm7knz/CVE-2025-54253-Exploit-Demo
标签:#CVE-2025
GitHub
GitHub - jm7knz/CVE-2025-54253-Exploit-Demo: 🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with…
🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance. - jm7knz/CVE-2025-54253-Exploit-Demo
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for CVE-2025-32778: command injection in Web-Check OSINT tool
URL:https://github.com/00xCanelo/CVE-2025-32778
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for CVE-2025-32778: command injection in Web-Check OSINT tool
URL:https://github.com/00xCanelo/CVE-2025-32778
标签:#CVE-2025
GitHub
GitHub - 00xCanelo/CVE-2025-32778: PoC exploit for CVE-2025-32778: command injection in Web-Check OSINT tool
PoC exploit for CVE-2025-32778: command injection in Web-Check OSINT tool - 00xCanelo/CVE-2025-32778