GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal RCE vulnerability affecting versions 7.11 and earlier
URL:https://github.com/Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal RCE vulnerability affecting versions 7.11 and earlier
URL:https://github.com/Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC
标签:#CVE-2025
GitHub
GitHub - Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC: Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal…
Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal RCE vulnerability affecting versions 7.11 and earlier - Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/SoftAndoWetto/CVE-2025-24367-PoC-Cacti
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/SoftAndoWetto/CVE-2025-24367-PoC-Cacti
标签:#CVE-2025
GitHub
GitHub - SoftAndoWetto/CVE-2025-24367-PoC-Cacti: Authenticated RCE PoC for Cacti (CVE‑2025‑24367). Uses graph template injection…
Authenticated RCE PoC for Cacti (CVE‑2025‑24367). Uses graph template injection to write and execute a payload via the “Unix – Logged in Users” template. Intended for labs and controlled testing on...
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:一款现代化的企业级漏洞扫描与资产管理平台 提供自动化安全检测、资产发现、漏洞管理等功能
URL:https://github.com/uf9n1x/ZScan
标签:#漏洞检测
更新了:漏洞检测
描述:一款现代化的企业级漏洞扫描与资产管理平台 提供自动化安全检测、资产发现、漏洞管理等功能
URL:https://github.com/uf9n1x/ZScan
标签:#漏洞检测
GitHub
GitHub - uf9n1x/ZScan: 一款现代化的企业级漏洞扫描与资产管理平台 提供自动化安全检测、资产发现、漏洞管理等功能
一款现代化的企业级漏洞扫描与资产管理平台 提供自动化安全检测、资产发现、漏洞管理等功能. Contribute to uf9n1x/ZScan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de malwares, axé sur C et C++
URL:https://github.com/VzlRus/C-Cpp_for_Malware_Development
标签:#Red Team
更新了:Red Team
描述:C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de malwares, axé sur C et C++
URL:https://github.com/VzlRus/C-Cpp_for_Malware_Development
标签:#Red Team
GitHub
GitHub - VzlRus/C-Cpp_for_Malware_Development: C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de…
C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de malwares, axé sur C et C++ - VzlRus/C-Cpp_for_Malware_Development
GitHub监控消息提醒!!!
更新了:绕过
描述:基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit (P2WSH) 机制,将任意数据伪装成标准的区块链地址,从而实现绕过 OP_RETURN 限制的永久数据存证。
URL:https://github.com/Forlingham/ScashDataAddressProtocol
标签:#绕过
更新了:绕过
描述:基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit (P2WSH) 机制,将任意数据伪装成标准的区块链地址,从而实现绕过 OP_RETURN 限制的永久数据存证。
URL:https://github.com/Forlingham/ScashDataAddressProtocol
标签:#绕过
GitHub
GitHub - Forlingham/ScashDataAddressProtocol: 基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit…
基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit (P2WSH) 机制,将任意数据伪装成标准的区块链地址,从而实现绕过 OP_RETURN 限制的永久数据存证。 - Forlingham/ScashDataAddressProtocol
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-45805
URL:https://github.com/mohammed-alsaqqaf/CVE-2025-45805
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-45805
URL:https://github.com/mohammed-alsaqqaf/CVE-2025-45805
标签:#CVE-2025
GitHub
GitHub - mohammed-alsaqqaf/CVE-2025-45805: PoC of CVE-2025-45805
PoC of CVE-2025-45805. Contribute to mohammed-alsaqqaf/CVE-2025-45805 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A script for exploiting a vulnerability in PyTorch with subsequent RCE in library versions < 2.6.0
URL:https://github.com/B1tBit/CVE-2025-32434-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:A script for exploiting a vulnerability in PyTorch with subsequent RCE in library versions < 2.6.0
URL:https://github.com/B1tBit/CVE-2025-32434-exploit
标签:#CVE-2025
GitHub
GitHub - B1tBit/CVE-2025-32434-exploit: A script for exploiting a vulnerability in PyTorch with subsequent RCE in library versions…
A script for exploiting a vulnerability in PyTorch with subsequent RCE in library versions < 2.6.0 - B1tBit/CVE-2025-32434-exploit
GitHub监控消息提醒!!!
更新了:RCE
描述:Educational web security labs: SQLi, Brute Force, File Upload, RCE
URL:https://github.com/olgacmustafa/web-security-learning
标签:#RCE
更新了:RCE
描述:Educational web security labs: SQLi, Brute Force, File Upload, RCE
URL:https://github.com/olgacmustafa/web-security-learning
标签:#RCE
GitHub
GitHub - olgacmustafa/web-security-learning: Educational web security labs: SQLi, Brute Force, File Upload, RCE
Educational web security labs: SQLi, Brute Force, File Upload, RCE - olgacmustafa/web-security-learning
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection of CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039
URL:https://github.com/rxerium/FreePBX-Vulns-December-25
标签:#CVE-2025
更新了:CVE-2025
描述:Detection of CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039
URL:https://github.com/rxerium/FreePBX-Vulns-December-25
标签:#CVE-2025
GitHub
GitHub - rxerium/FreePBX-Vulns-December-25: Detection for CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039
Detection for CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039 - rxerium/FreePBX-Vulns-December-25
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repo contains the scripts you can execute to simulate the (CVE-2025-55182) along with next.js server
URL:https://github.com/premdanav/react2shelldemo
标签:#CVE-2025
更新了:CVE-2025
描述:This repo contains the scripts you can execute to simulate the (CVE-2025-55182) along with next.js server
URL:https://github.com/premdanav/react2shelldemo
标签:#CVE-2025
GitHub
GitHub - premdanav/react2shelldemo: This repo contains the scripts you can execute to simulate the (CVE-2025-55182) along with…
This repo contains the scripts you can execute to simulate the (CVE-2025-55182) along with next.js server - premdanav/react2shelldemo
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-12163
URL:https://github.com/SnailSploit/CVE-2025-12163
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-12163
URL:https://github.com/SnailSploit/CVE-2025-12163
标签:#CVE-2025
GitHub
GitHub - SnailSploit/CVE-2025-12163: CVE-2025-12163
CVE-2025-12163. Contribute to SnailSploit/CVE-2025-12163 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Security advisory for CVE-2025-65855
URL:https://github.com/LuisMirandaAcebedo/CVE-2025-65855
标签:#CVE-2025
更新了:CVE-2025
描述:Security advisory for CVE-2025-65855
URL:https://github.com/LuisMirandaAcebedo/CVE-2025-65855
标签:#CVE-2025
GitHub
GitHub - LuisMirandaAcebedo/CVE-2025-65855: Security advisory for CVE-2025-65855
Security advisory for CVE-2025-65855. Contribute to LuisMirandaAcebedo/CVE-2025-65855 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is a python PoC scripts for CVE-2025-24071 which is a vulnerability in Windows File Explorer that allows unauthorized access to sensitive information like NTLM Exposure.
URL:https://github.com/Abdelrahman0Sayed/CVE-2025-24071
标签:#CVE-2025
更新了:CVE-2025
描述:This is a python PoC scripts for CVE-2025-24071 which is a vulnerability in Windows File Explorer that allows unauthorized access to sensitive information like NTLM Exposure.
URL:https://github.com/Abdelrahman0Sayed/CVE-2025-24071
标签:#CVE-2025
GitHub
GitHub - Abdelrahman0Sayed/CVE-2025-24071: This is a python PoC scripts for CVE-2025-24071 which is a vulnerability in Windows…
This is a python PoC scripts for CVE-2025-24071 which is a vulnerability in Windows File Explorer that allows unauthorized access to sensitive information like NTLM Exposure. - Abdelrahman0Sayed/CV...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Documentation of CVE-2025-68116
URL:https://github.com/x0root/CVE-2025-68116
标签:#CVE-2025
更新了:CVE-2025
描述:A Documentation of CVE-2025-68116
URL:https://github.com/x0root/CVE-2025-68116
标签:#CVE-2025
GitHub
GitHub - x0root/CVE-2025-68116: A Documentation of CVE-2025-68116
A Documentation of CVE-2025-68116. Contribute to x0root/CVE-2025-68116 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:webshell编码工具 支持 jsp net php asp编码免杀
URL:https://github.com/hackerxj007/Bypass_Webshell
标签:#免杀
更新了:免杀
描述:webshell编码工具 支持 jsp net php asp编码免杀
URL:https://github.com/hackerxj007/Bypass_Webshell
标签:#免杀
GitHub
GitHub - hackerxj007/Bypass_Webshell: webshell编码工具 支持 jsp net php asp编码免杀
webshell编码工具 支持 jsp net php asp编码免杀. Contribute to hackerxj007/Bypass_Webshell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65427: Missing rate limiting in Dbit N300 T1 Pro router login API allows brute-force attacks
URL:https://github.com/kirubel-cve/CVE-2025-65427
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65427: Missing rate limiting in Dbit N300 T1 Pro router login API allows brute-force attacks
URL:https://github.com/kirubel-cve/CVE-2025-65427
标签:#CVE-2025
GitHub
GitHub - kirubel-cve/CVE-2025-65427: CVE-2025-65427: Missing rate limiting in Dbit N300 T1 Pro router login API allows brute-force…
CVE-2025-65427: Missing rate limiting in Dbit N300 T1 Pro router login API allows brute-force attacks - kirubel-cve/CVE-2025-65427
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/cyberleelawat/FreePBX-Multiple-CVEs-2025
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/cyberleelawat/FreePBX-Multiple-CVEs-2025
标签:#CVE-2025
GitHub
GitHub - cyberleelawat/FreePBX-Multiple-CVEs-2025: This repository documents three security vulnerabilities discovered in FreePBX…
This repository documents three security vulnerabilities discovered in FreePBX (CVE-2025-66039, CVE-2025-61678, CVE-2025-61675), including analysis, impact, and proof-of-concept details for securit...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is my own written POC on the xmlrpc-pingback vulnerabiity found on wordpress. CVE-2025-54352. This vulnerability affects wordpress 3.5 all through 6.8.2
URL:https://github.com/crypcky/XML-RPC-Pingback-Vulnerability
标签:#CVE-2025
更新了:CVE-2025
描述:This is my own written POC on the xmlrpc-pingback vulnerabiity found on wordpress. CVE-2025-54352. This vulnerability affects wordpress 3.5 all through 6.8.2
URL:https://github.com/crypcky/XML-RPC-Pingback-Vulnerability
标签:#CVE-2025
GitHub
GitHub - crypcky/XML-RPC-Pingback-Vulnerability: This is my own written POC on the xmlrpc-pingback vulnerabiity found on wordpress.…
This is my own written POC on the xmlrpc-pingback vulnerabiity found on wordpress. CVE-2025-54352. This vulnerability affects wordpress 3.5 all through 6.8.2 - crypcky/XML-RPC-Pingback-Vulnerability
GitHub监控消息提醒!!!
更新了:内存马
描述:一款用于springmvc、springboot的内存马查杀类,快速部署,可视化……
URL:https://github.com/h3ll0yoyo9527-tech/MemShell_Scanner-Killer
标签:#内存马
更新了:内存马
描述:一款用于springmvc、springboot的内存马查杀类,快速部署,可视化……
URL:https://github.com/h3ll0yoyo9527-tech/MemShell_Scanner-Killer
标签:#内存马
GitHub
GitHub - h3ll0yoyo9527-tech/MemShell_Scanner-Killer: 一款用于springmvc、springboot的内存马查杀类,快速部署,可视化……
一款用于springmvc、springboot的内存马查杀类,快速部署,可视化……. Contribute to h3ll0yoyo9527-tech/MemShell_Scanner-Killer development by creating an account on GitHub.