GitHub监控消息提醒!!!
更新了:漏洞利用
描述:ThinkAdmin v5 v6 任意文件读取漏洞利用,可自定义字典爆破
URL:https://github.com/simonlee-hello/CVE-2020-25540
标签:#漏洞利用
更新了:漏洞利用
描述:ThinkAdmin v5 v6 任意文件读取漏洞利用,可自定义字典爆破
URL:https://github.com/simonlee-hello/CVE-2020-25540
标签:#漏洞利用
GitHub
GitHub - simonlee-hello/CVE-2020-25540: ThinkAdmin v5 v6 任意文件读取漏洞利用,可自定义字典爆破
ThinkAdmin v5 v6 任意文件读取漏洞利用,可自定义字典爆破. Contribute to simonlee-hello/CVE-2020-25540 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:读书会,书友会小程序:书籍是人类进步的阶梯,在信息高度发达而浮躁的当下,静下心来读书成为都市人群的新趋势, 很多读书社团应运而生,那么通过小程序,把读书会搬到手机上,通过小程序了解最热门的书单和作家,可以每天组织阅读打卡和评比;书友会时常组织书友进行书友会线下活动,那么通过小程序可以方便的搞定报名、签到、活动信息收集,活动结束后还可以进行评价
URL:https://github.com/3075426724/WeReading
标签:#信息收集
更新了:信息收集
描述:读书会,书友会小程序:书籍是人类进步的阶梯,在信息高度发达而浮躁的当下,静下心来读书成为都市人群的新趋势, 很多读书社团应运而生,那么通过小程序,把读书会搬到手机上,通过小程序了解最热门的书单和作家,可以每天组织阅读打卡和评比;书友会时常组织书友进行书友会线下活动,那么通过小程序可以方便的搞定报名、签到、活动信息收集,活动结束后还可以进行评价
URL:https://github.com/3075426724/WeReading
标签:#信息收集
GitHub
GitHub - 3075426724/WeZhi: 企事业单位知识竞赛答题小程序,在信息技术迅猛发展的时代,企业和事业单位在提升员工素质和知识水平方面面临着新的挑战。为了增强员工的学习积极性、提高团队凝聚力和整体素质,越来越多的单位开始组织知识竞赛活…
企事业单位知识竞赛答题小程序,在信息技术迅猛发展的时代,企业和事业单位在提升员工素质和知识水平方面面临着新的挑战。为了增强员工的学习积极性、提高团队凝聚力和整体素质,越来越多的单位开始组织知识竞赛活动。传统的知识竞赛往往依赖于线下纸质问卷,不仅耗时耗力,还难以及时统计结果。因此知识竞赛答题小程序,能够通过数字化手段提升竞赛的效率和互动性,其主要功能如下: 分类题库:按照领域(例如生产安全、...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Burp Extension to test for CVE-2024-34102
URL:https://github.com/crynomore/CVE-2024-34102
标签:#CVE-2024
更新了:CVE-2024
描述:Burp Extension to test for CVE-2024-34102
URL:https://github.com/crynomore/CVE-2024-34102
标签:#CVE-2024
GitHub
GitHub - crynomore/CVE-2024-34102: Burp Extension to test for CVE-2024-34102
Burp Extension to test for CVE-2024-34102. Contribute to crynomore/CVE-2024-34102 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2024-6409, CVE-2006-5051, CVE-2008-4109, and 16 other CVEs.
URL:https://github.com/bigb0x/SSH-Scanner
标签:#CVE-2024
更新了:CVE-2024
描述:Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2024-6409, CVE-2006-5051, CVE-2008-4109, and 16 other CVEs.
URL:https://github.com/bigb0x/SSH-Scanner
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Perform with massive Wordpress SQLI 2 RCE
URL:https://github.com/ThatNotEasy/CVE-2024-27956
标签:#CVE-2024
更新了:CVE-2024
描述:Perform with massive Wordpress SQLI 2 RCE
URL:https://github.com/ThatNotEasy/CVE-2024-27956
标签:#CVE-2024
GitHub
GitHub - ThatNotEasy/CVE-2024-27956: Perform with massive Wordpress SQLI 2 RCE
Perform with massive Wordpress SQLI 2 RCE. Contribute to ThatNotEasy/CVE-2024-27956 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Perform with massive Wordpress SQLI 2 RCE
URL:https://github.com/ThemeHackers/CVE-2024-6387
标签:#CVE-2024
更新了:CVE-2024
描述:Perform with massive Wordpress SQLI 2 RCE
URL:https://github.com/ThemeHackers/CVE-2024-6387
标签:#CVE-2024
GitHub
GitHub - ThemeHackers/CVE-2024-6387: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)
Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) - ThemeHackers/CVE-2024-6387
GitHub监控消息提醒!!!
更新了:CVE-2024
描述: OpenSSH vulnerability CVE-2024-6387
URL:https://github.com/Sibijo/mitigate_ssh
标签:#CVE-2024
更新了:CVE-2024
描述: OpenSSH vulnerability CVE-2024-6387
URL:https://github.com/Sibijo/mitigate_ssh
标签:#CVE-2024
GitHub
GitHub - Sibijo/mitigate_ssh: OpenSSH vulnerability CVE-2024-6387
OpenSSH vulnerability CVE-2024-6387. Contribute to Sibijo/mitigate_ssh development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo \"executar como qualquer aplicativo\" que afeta as versões 12 e 13 do Android
URL:https://github.com/007CRIPTOGRAFIA/c-CVE-2024-0044
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo \"executar como qualquer aplicativo\" que afeta as versões 12 e 13 do Android
URL:https://github.com/007CRIPTOGRAFIA/c-CVE-2024-0044
标签:#CVE-2024
GitHub
GitHub - 007CRIPTOGRAFIA/c-CVE-2024-0044: CVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo "executar como qualquer…
CVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo "executar como qualquer aplicativo" que afeta as versões 12 e 13 do Android - 007CRIPTOGRAFIA/c-CVE-2024-0044
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Fix for regreSSHion CVE-2024-6387 for Ubuntu and Debian
URL:https://github.com/Passyed/regreSSHion-Fix
标签:#CVE-2024
更新了:CVE-2024
描述:Fix for regreSSHion CVE-2024-6387 for Ubuntu and Debian
URL:https://github.com/Passyed/regreSSHion-Fix
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow
URL:https://github.com/Brut-Security/CVE-2024-4879
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow
URL:https://github.com/Brut-Security/CVE-2024-4879
标签:#CVE-2024
GitHub
GitHub - Brut-Security/CVE-2024-4879: CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow
CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow - Brut-Security/CVE-2024-4879
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34102 unauthenticated RCE PoC for Magento/adobe commerce
URL:https://github.com/1mpl3ment3d/CVE-2024-34102-RCE-POC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34102 unauthenticated RCE PoC for Magento/adobe commerce
URL:https://github.com/1mpl3ment3d/CVE-2024-34102-RCE-POC
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability
URL:https://github.com/bigb0x/CVE-2024-4879
标签:#CVE-2024
更新了:CVE-2024
描述:Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability
URL:https://github.com/bigb0x/CVE-2024-4879
标签:#CVE-2024
GitHub
GitHub - bigb0x/CVE-2024-4879: Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability
Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability - bigb0x/CVE-2024-4879
GitHub监控消息提醒!!!
更新了:权限提升
描述:利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。
URL:https://github.com/314love/shiwu
标签:#权限提升
更新了:权限提升
描述:利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。
URL:https://github.com/314love/shiwu
标签:#权限提升
GitHub
GitHub - 314love/shiwu: 我主导开发了一个智能化的校园失物管理平台,采用SpringBoot+Vue框架实现前后端分离,后端技术包括SpringBoot、MyBatis-Plus、SpringMVC、SpringSecurity、…
我主导开发了一个智能化的校园失物管理平台,采用SpringBoot+Vue框架实现前后端分离,后端技术包括SpringBoot、MyBatis-Plus、SpringMVC、SpringSecurity、Redis、JWT和Java,前端使用Vue2.x、Element-UI、Axios、Vuex和VueRouter,数据库和服务器采用MySQL和Tomcat。该平台通过简洁干净的页面和快速...
GitHub监控消息提醒!!!
更新了:权限维持
描述:一款SSH批量改密,并持续监控的程序,可以实现改密时RCE,密码权限维持
URL:https://github.com/314love/wms
标签:#权限维持
更新了:权限维持
描述:一款SSH批量改密,并持续监控的程序,可以实现改密时RCE,密码权限维持
URL:https://github.com/314love/wms
标签:#权限维持
GitHub
GitHub - 314love/wms: 仓库管理系统(WMS)通过前后端分离架构实现高效管理,前端采用Vue.js和Element UI,提供注册登录、仓库和物品管理、出入库、维修、权限及系统管理等功能,通过Vue Router实现动态路由切换。后端基于Spring…
仓库管理系统(WMS)通过前后端分离架构实现高效管理,前端采用Vue.js和Element UI,提供注册登录、仓库和物品管理、出入库、维修、权限及系统管理等功能,通过Vue Router实现动态路由切换。后端基于Spring Boot,使用Spring MVC开发RESTful API,数据持久化采用MyBatisplus。设有超级管理员、管理员和普通用户三种角色,分别享有不同的权限,确保...
GitHub监控消息提醒!!!
更新了:RCE
描述:Dell Summer 2024 Project RCE
URL:https://github.com/manunicholasjacob/Unified-OS-Debugger
标签:#RCE
更新了:RCE
描述:Dell Summer 2024 Project RCE
URL:https://github.com/manunicholasjacob/Unified-OS-Debugger
标签:#RCE
GitHub
GitHub - manunicholasjacob/Unified-OS-Debugger: Dell Summer 2024 Project RCE
Dell Summer 2024 Project RCE. Contribute to manunicholasjacob/Unified-OS-Debugger development by creating an account on GitHub.