GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-2395: Tar race file collision
URL:https://github.com/dajneem23/CVE-2026-2395
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-2395: Tar race file collision
URL:https://github.com/dajneem23/CVE-2026-2395
标签:#CVE-2026
GitHub
GitHub - dajneem23/CVE-2026-2395: CVE-2026-2395: Tar race file collision
CVE-2026-2395: Tar race file collision . Contribute to dajneem23/CVE-2026-2395 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Production-grade tool for detecting & remediating CVE-2026-0622 (Ghost Admin privilege escalation & master key exposure in 5G core software).
URL:https://github.com/cyberdudebivash/CYBERDUDEBIVASH-5G-Core-Key-Rotation-Ghost-Admin-Auditor
标签:#CVE-2026
更新了:CVE-2026
描述:Production-grade tool for detecting & remediating CVE-2026-0622 (Ghost Admin privilege escalation & master key exposure in 5G core software).
URL:https://github.com/cyberdudebivash/CYBERDUDEBIVASH-5G-Core-Key-Rotation-Ghost-Admin-Auditor
标签:#CVE-2026
GitHub
GitHub - cyberdudebivash/CYBERDUDEBIVASH-5G-Core-Key-Rotation-Ghost-Admin-Auditor: Production-grade tool for detecting & remediating…
Production-grade tool for detecting & remediating CVE-2026-0622 (Ghost Admin privilege escalation & master key exposure in 5G core software). - cyberdudebivash/CYBERDUDEBIVASH-5G-Co...
GitHub监控消息提醒!!!
更新了:漏洞挖掘
描述:移动安全漏洞挖掘专家SKILL,基于 HackerOne 真实报告的移动安全漏洞挖掘知识库,提供 Android 和 iOS 应用的漏洞挖掘手法、技术细节和代码模式分析。
URL:https://github.com/s7safe/android-h1
标签:#漏洞挖掘
更新了:漏洞挖掘
描述:移动安全漏洞挖掘专家SKILL,基于 HackerOne 真实报告的移动安全漏洞挖掘知识库,提供 Android 和 iOS 应用的漏洞挖掘手法、技术细节和代码模式分析。
URL:https://github.com/s7safe/android-h1
标签:#漏洞挖掘
GitHub
GitHub - s7safe/android-h1: 移动安全漏洞挖掘专家SKILL,基于 HackerOne 真实报告的移动安全漏洞挖掘知识库,提供 Android 和 iOS 应用的漏洞挖掘手法、技术细节和代码模式分析。
移动安全漏洞挖掘专家SKILL,基于 HackerOne 真实报告的移动安全漏洞挖掘知识库,提供 Android 和 iOS 应用的漏洞挖掘手法、技术细节和代码模式分析。 - s7safe/android-h1
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24061 Batch Scanning Tool
URL:https://github.com/TryA9ain/CVE-2026-24061
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24061 Batch Scanning Tool
URL:https://github.com/TryA9ain/CVE-2026-24061
标签:#CVE-2026
GitHub
GitHub - TryA9ain/CVE-2026-24061: CVE-2026-24061 Batch Scanning Tool
CVE-2026-24061 Batch Scanning Tool. Contribute to TryA9ain/CVE-2026-24061 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:攻防
描述:红岸网络空间安全对抗平台 - 网络安全攻防演练实验室
URL:https://github.com/Hfirstxlovef/cyberlab
标签:#攻防
更新了:攻防
描述:红岸网络空间安全对抗平台 - 网络安全攻防演练实验室
URL:https://github.com/Hfirstxlovef/cyberlab
标签:#攻防
GitHub
GitHub - Hfirstxlovef/cyberlab: 红岸网络空间安全对抗平台 - 网络安全攻防演练实验室
红岸网络空间安全对抗平台 - 网络安全攻防演练实验室. Contribute to Hfirstxlovef/cyberlab development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:SMBv1: CVE-2017-0143, gravedad 8.8, de ejecucion remota de codigo (RCE), en Windows con SMBv1 (ms17-010)
URL:https://github.com/hackingyseguridad/smb
标签:#RCE
更新了:RCE
描述:SMBv1: CVE-2017-0143, gravedad 8.8, de ejecucion remota de codigo (RCE), en Windows con SMBv1 (ms17-010)
URL:https://github.com/hackingyseguridad/smb
标签:#RCE
GitHub
GitHub - hackingyseguridad/smb: SMBv1: CVE-2017-0143, gravedad 8.8, de ejecucion remota de codigo (RCE), en Windows con SMBv1 (ms17…
SMBv1: CVE-2017-0143, gravedad 8.8, de ejecucion remota de codigo (RCE), en Windows con SMBv1 (ms17-010) - hackingyseguridad/smb
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-20045
URL:https://github.com/Ashwesker/Ashwesker-CVE-2026-20045
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-20045
URL:https://github.com/Ashwesker/Ashwesker-CVE-2026-20045
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:基于cve-2026-24061 telnet远程认证绕过漏洞的批量检测工具
URL:https://github.com/parameciumzhang/Tell-Me-Root
标签:#CVE-2026
更新了:CVE-2026
描述:基于cve-2026-24061 telnet远程认证绕过漏洞的批量检测工具
URL:https://github.com/parameciumzhang/Tell-Me-Root
标签:#CVE-2026
GitHub
GitHub - parameciumzhang/Tell-Me-Root: 基于cve-2026-24061 telnet远程认证绕过漏洞的批量检测利用工具
基于cve-2026-24061 telnet远程认证绕过漏洞的批量检测利用工具. Contribute to parameciumzhang/Tell-Me-Root development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:矩阵云安全平台(MXSec Platform) 是一套集成 EDR、CWPP、基线安全、漏洞扫描、应用安全于一体的新一代云原生安全中台。
URL:https://github.com/imkerbos/mxsec-platform
标签:#漏洞扫描
更新了:漏洞扫描
描述:矩阵云安全平台(MXSec Platform) 是一套集成 EDR、CWPP、基线安全、漏洞扫描、应用安全于一体的新一代云原生安全中台。
URL:https://github.com/imkerbos/mxsec-platform
标签:#漏洞扫描
GitHub
GitHub - imkerbos/mxsec-platform: 企业级主机与容器安全管理平台。覆盖安全基线、资产管理、漏洞扫描、病毒查杀、文件完整性监控、运行时检测、容器安全、威胁情报与告警响应,面向安全运营团队提供统一管控视图。
企业级主机与容器安全管理平台。覆盖安全基线、资产管理、漏洞扫描、病毒查杀、文件完整性监控、运行时检测、容器安全、威胁情报与告警响应,面向安全运营团队提供统一管控视图。 - imkerbos/mxsec-platform
GitHub监控消息提醒!!!
更新了:RCE
描述:Command Injection / Remote Code Execution (RCE) via Insecure Deserialization in load() of predictor.py in Vertex AI SDK v1.121.0 - (github.com/googleapis/python-aiplatform)
URL:https://github.com/JoshuaProvoste/Command-Injection-RCE-Vertex-AI-SDK-v1.121.0
标签:#RCE
更新了:RCE
描述:Command Injection / Remote Code Execution (RCE) via Insecure Deserialization in load() of predictor.py in Vertex AI SDK v1.121.0 - (github.com/googleapis/python-aiplatform)
URL:https://github.com/JoshuaProvoste/Command-Injection-RCE-Vertex-AI-SDK-v1.121.0
标签:#RCE
GitHub
GitHub - googleapis/python-aiplatform: A Python SDK for Vertex AI, a fully managed, end-to-end platform for data science and machine…
A Python SDK for Vertex AI, a fully managed, end-to-end platform for data science and machine learning. - googleapis/python-aiplatform
GitHub监控消息提醒!!!
更新了:绕过
描述:基于 Python + GitHub Actions 的博客更新监控工具,支持 Cloudflare 绕过和微信推送
URL:https://github.com/zhuyikai2002/MyPythonMoniter
标签:#绕过
更新了:绕过
描述:基于 Python + GitHub Actions 的博客更新监控工具,支持 Cloudflare 绕过和微信推送
URL:https://github.com/zhuyikai2002/MyPythonMoniter
标签:#绕过
GitHub
GitHub - zhuyikai2002/MyPythonMoniter: 基于 Python + GitHub Actions 的博客更新监控工具,支持 Cloudflare 绕过和微信推送
基于 Python + GitHub Actions 的博客更新监控工具,支持 Cloudflare 绕过和微信推送 - zhuyikai2002/MyPythonMoniter
GitHub监控消息提醒!!!
更新了:webshell
描述:🛠 Manage and deploy webshell tools for Linux using Vue 3 and Python, featuring custom traffic formats for stealthy operation.
URL:https://github.com/Richietoreck/MatouWebshell
标签:#webshell
更新了:webshell
描述:🛠 Manage and deploy webshell tools for Linux using Vue 3 and Python, featuring custom traffic formats for stealthy operation.
URL:https://github.com/Richietoreck/MatouWebshell
标签:#webshell
GitHub
GitHub - Richietoreck/MatouWebshell: 🛠 Manage and deploy webshell tools for Linux using Vue 3 and Python, featuring custom traffic…
🛠 Manage and deploy webshell tools for Linux using Vue 3 and Python, featuring custom traffic formats for stealthy operation. - Richietoreck/MatouWebshell
GitHub监控消息提醒!!!
更新了:RCE
描述:Command Injection / Remote Code Execution (RCE) via Insecure Deserialization in _load_ccd_pickle_cached() of chemical_components.py in AlphaFold 3 (v3.0.1) - (github.com/google-deepmind/alphafold3)
URL:https://github.com/JoshuaProvoste/Command-Injection-RCE-AlphaFold-v3.0.1
标签:#RCE
更新了:RCE
描述:Command Injection / Remote Code Execution (RCE) via Insecure Deserialization in _load_ccd_pickle_cached() of chemical_components.py in AlphaFold 3 (v3.0.1) - (github.com/google-deepmind/alphafold3)
URL:https://github.com/JoshuaProvoste/Command-Injection-RCE-AlphaFold-v3.0.1
标签:#RCE
GitHub
GitHub - google-deepmind/alphafold3: AlphaFold 3 inference pipeline.
AlphaFold 3 inference pipeline. Contribute to google-deepmind/alphafold3 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:GNU InetUtils telnetd 远程身份认证绕过漏洞(CVE-2026-24061),此漏洞主要影响 telnetd 在调用系统 /usr/bin/login 程序时,未对从客户端 USER 环境变量传入的用户名做过滤,直接拼接到 login 命令行。未经授权的远程攻击者可利用该缺陷,在无需任何口令的情况下直接获取目标主机的 root shell。
URL:https://github.com/yanxinwu946/CVE-2026-24061--telnetd
标签:#CVE-2026
更新了:CVE-2026
描述:GNU InetUtils telnetd 远程身份认证绕过漏洞(CVE-2026-24061),此漏洞主要影响 telnetd 在调用系统 /usr/bin/login 程序时,未对从客户端 USER 环境变量传入的用户名做过滤,直接拼接到 login 命令行。未经授权的远程攻击者可利用该缺陷,在无需任何口令的情况下直接获取目标主机的 root shell。
URL:https://github.com/yanxinwu946/CVE-2026-24061--telnetd
标签:#CVE-2026
GitHub
GitHub - yanxinwu946/CVE-2026-24061--telnetd: GNU InetUtils telnetd 远程身份认证绕过漏洞(CVE-2026-24061),此漏洞主要影响 telnetd 在调用系统 /usr/bin/login…
GNU InetUtils telnetd 远程身份认证绕过漏洞(CVE-2026-24061),此漏洞主要影响 telnetd 在调用系统 /usr/bin/login 程序时,未对从客户端 USER 环境变量传入的用户名做过滤,直接拼接到 login 命令行。未经授权的远程攻击者可利用该缺陷,在无需任何口令的情况下直接获取目标主机的 root shell。 - yanxinwu946/C...
GitHub监控消息提醒!!!
更新了:RCE
描述:Repositorio para la aplicación de ingesta del RCE
URL:https://github.com/emailesc/ASIGH_IW
标签:#RCE
更新了:RCE
描述:Repositorio para la aplicación de ingesta del RCE
URL:https://github.com/emailesc/ASIGH_IW
标签:#RCE
GitHub
emailesc/ASIGH_IW
Repositorio para la aplicación de ingesta del RCE - emailesc/ASIGH_IW
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/LeirBaGMC/RUCKUS-Security-Research
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/LeirBaGMC/RUCKUS-Security-Research
标签:#RCE
GitHub
GitHub - LeirBaGMC/RUCKUS-Security-Research: Academic research on critical RUCKUS wireless vulnerabilities (RCE & Auth Bypass)…
Academic research on critical RUCKUS wireless vulnerabilities (RCE & Auth Bypass) in university networks. Features a strategic mitigation roadmap and a data-driven CISO Dashboard for risk m...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:PoC for CVE-2026-22444: Apache Solr 8.6-9.10.0 Windows standalone mode RCE/NTLM hash disclosure
URL:https://github.com/dptsec/CVE-2026-22444
标签:#CVE-2026
更新了:CVE-2026
描述:PoC for CVE-2026-22444: Apache Solr 8.6-9.10.0 Windows standalone mode RCE/NTLM hash disclosure
URL:https://github.com/dptsec/CVE-2026-22444
标签:#CVE-2026
GitHub
GitHub - dptsec/CVE-2026-22444: PoC for CVE-2026-22444: Apache Solr 8.6-9.10.0 Windows standalone mode RCE/NTLM hash disclosure
PoC for CVE-2026-22444: Apache Solr 8.6-9.10.0 Windows standalone mode RCE/NTLM hash disclosure - dptsec/CVE-2026-22444
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-51793
标签:#RCE
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-51793
标签:#RCE
GitHub
GitHub - JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-51793: Unauthenticated 0-click RCE exploit for CVE-2024-51793. Exploits…
Unauthenticated 0-click RCE exploit for CVE-2024-51793. Exploits an arbitrary file upload vulnerability via admin-ajax.php to upload a PHP payload and achieve remote command execution on vulnerable...
GitHub监控消息提醒!!!
更新了:RCE
描述:Mirage uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50526
标签:#RCE
更新了:RCE
描述:Mirage uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50526
标签:#RCE
GitHub
GitHub - JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50526: Unauthenticated 0-click RCE exploit for CVE-2024-50526. Exploits…
Unauthenticated 0-click RCE exploit for CVE-2024-50526. Exploits an arbitrary file upload vulnerability in a vulnerable WordPress form plugin to upload a PHP payload, verify its location, detect th...