GitHub监控消息提醒!!!
更新了:CVE-2024
描述:is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)
URL:https://github.com/geniuszlyy/CVE-2024-0582
标签:#CVE-2024
更新了:CVE-2024
描述:is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)
URL:https://github.com/geniuszlyy/CVE-2024-0582
标签:#CVE-2024
GitHub
GitHub - geniuszlyy/CVE-2024-0582: is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)
is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582) - geniuszlyy/CVE-2024-0582
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Nortek Linear eMerge E3 Pre-Auth RCE PoC (CVE-2024-9441)
URL:https://github.com/adhikara13/CVE-2024-9441
标签:#CVE-2024
更新了:CVE-2024
描述:Nortek Linear eMerge E3 Pre-Auth RCE PoC (CVE-2024-9441)
URL:https://github.com/adhikara13/CVE-2024-9441
标签:#CVE-2024
GitHub
GitHub - adhikara13/CVE-2024-9441: Nortek Linear eMerge E3 Pre-Auth RCE PoC (CVE-2024-9441)
Nortek Linear eMerge E3 Pre-Auth RCE PoC (CVE-2024-9441) - adhikara13/CVE-2024-9441
GitHub监控消息提醒!!!
更新了:bypass av
描述:webshell bypass AV
URL:https://github.com/villanitamosephadwgab/1ah-Avid-Pro-Toolsh
标签:#bypass av
更新了:bypass av
描述:webshell bypass AV
URL:https://github.com/villanitamosephadwgab/1ah-Avid-Pro-Toolsh
标签:#bypass av
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Unauthenticated RCE on cups-browsed (exploit)
URL:https://github.com/l0n3m4n/CVE-2024-47176
标签:#CVE-2024
更新了:CVE-2024
描述:Unauthenticated RCE on cups-browsed (exploit)
URL:https://github.com/l0n3m4n/CVE-2024-47176
标签:#CVE-2024
GitHub
GitHub - l0n3m4n/CVE-2024-47176: Unauthenticated RCE on cups-browsed (exploit and nuclei template)
Unauthenticated RCE on cups-browsed (exploit and nuclei template) - l0n3m4n/CVE-2024-47176
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE and XSS exploits testing
URL:https://github.com/thefizzyfish/CVE-2023-41425-wonderCMS_RCE
标签:#RCE
更新了:RCE
描述:RCE and XSS exploits testing
URL:https://github.com/thefizzyfish/CVE-2023-41425-wonderCMS_RCE
标签:#RCE
GitHub
GitHub - thefizzyfish/CVE-2023-41425-wonderCMS_RCE: CVE-2023-41425 - Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru…
CVE-2023-41425 - Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule componen...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.
URL:https://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481
标签:#CVE-2024
更新了:CVE-2024
描述:TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.
URL:https://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481
标签:#CVE-2024
GitHub
GitHub - PeterGabaldon/CVE-2024-7479_CVE-2024-7481: TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE…
TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006. - PeterGabaldon/CVE-2024-7479_CVE-2024-7481
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-29050 is a vulnerability found in the Windows Cryptographic Services.
URL:https://github.com/Akrachli/CVE-2024-29050
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-29050 is a vulnerability found in the Windows Cryptographic Services.
URL:https://github.com/Akrachli/CVE-2024-29050
标签:#CVE-2024
GitHub
GitHub - Akrachli/CVE-2024-29050: CVE-2024-29050 is a vulnerability found in the Windows Cryptographic Services.
CVE-2024-29050 is a vulnerability found in the Windows Cryptographic Services. - Akrachli/CVE-2024-29050
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE in pyload prior to 0.5.0b3.dev31.
URL:https://github.com/S4MY9/CVE-2023-0297
标签:#RCE
更新了:RCE
描述:RCE in pyload prior to 0.5.0b3.dev31.
URL:https://github.com/S4MY9/CVE-2023-0297
标签:#RCE
GitHub
GitHub - S4MY9/CVE-2023-0297: RCE in pyload prior to 0.5.0b3.dev31.
RCE in pyload prior to 0.5.0b3.dev31. Contribute to S4MY9/CVE-2023-0297 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability in PHP-CGI.
URL:https://github.com/JeninSutradhar/CVE-2024-4577-checker
标签:#CVE-2024
更新了:CVE-2024
描述:A Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability in PHP-CGI.
URL:https://github.com/JeninSutradhar/CVE-2024-4577-checker
标签:#CVE-2024
GitHub
GitHub - JeninSutradhar/CVE-2024-4577-checker: A Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability…
A Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability in PHP-CGI. - JeninSutradhar/CVE-2024-4577-checker
GitHub监控消息提醒!!!
更新了:代码审计
描述:一款通过危险函数匹配,辅助java代码审计的小工具
URL:https://github.com/jianjian88806/042_houserent2-public
标签:#代码审计
更新了:代码审计
描述:一款通过危险函数匹配,辅助java代码审计的小工具
URL:https://github.com/jianjian88806/042_houserent2-public
标签:#代码审计
GitHub监控消息提醒!!!
更新了:代码审计
描述:一款通过危险函数匹配,辅助java代码审计的小工具
URL:https://github.com/jianjian88806/114_laboratoryPublic
标签:#代码审计
更新了:代码审计
描述:一款通过危险函数匹配,辅助java代码审计的小工具
URL:https://github.com/jianjian88806/114_laboratoryPublic
标签:#代码审计
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:CVE-2021-25646 一键化漏洞扫描和利用工具
URL:https://github.com/luobai8/CVE-2021-25646-exp
标签:#漏洞利用
更新了:漏洞利用
描述:CVE-2021-25646 一键化漏洞扫描和利用工具
URL:https://github.com/luobai8/CVE-2021-25646-exp
标签:#漏洞利用
GitHub
GitHub - k7pro/CVE-2021-25646-exp: CVE-2021-25646 Apache Druid 远程代码执行 漏洞检测和利用工具
CVE-2021-25646 Apache Druid 远程代码执行 漏洞检测和利用工具. Contribute to k7pro/CVE-2021-25646-exp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:WooCommerce plugin POC of RCE
URL:https://github.com/masm3264/woocommerce-poc
标签:#RCE
更新了:RCE
描述:WooCommerce plugin POC of RCE
URL:https://github.com/masm3264/woocommerce-poc
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:POC for RCE with CVE-2020-35489
URL:https://github.com/aitech66/poc-CVE-2020-35489
标签:#RCE
更新了:RCE
描述:POC for RCE with CVE-2020-35489
URL:https://github.com/aitech66/poc-CVE-2020-35489
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Materials for CVE-2024-30052.
URL:https://github.com/ynwarcs/CVE-2024-30052
标签:#CVE-2024
更新了:CVE-2024
描述:Materials for CVE-2024-30052.
URL:https://github.com/ynwarcs/CVE-2024-30052
标签:#CVE-2024
GitHub
GitHub - ynwarcs/CVE-2024-30052: Materials for CVE-2024-30052.
Materials for CVE-2024-30052. Contribute to ynwarcs/CVE-2024-30052 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Simple hash cracker for Apache Shiro hashes written in Golang. Useful for exploiting CVE-2024-4956.
URL:https://github.com/An00bRektn/shirocrack
标签:#CVE-2024
更新了:CVE-2024
描述:Simple hash cracker for Apache Shiro hashes written in Golang. Useful for exploiting CVE-2024-4956.
URL:https://github.com/An00bRektn/shirocrack
标签:#CVE-2024
GitHub
GitHub - An00bRektn/shirocrack: Simple hash cracker for Apache Shiro hashes written in Golang. Useful for exploiting CVE-2024-4956.
Simple hash cracker for Apache Shiro hashes written in Golang. Useful for exploiting CVE-2024-4956. - An00bRektn/shirocrack
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Zimbra - Remote Command Execution (CVE-2024-45519)
URL:https://github.com/Chocapikk/CVE-2024-45519
标签:#CVE-2024
更新了:CVE-2024
描述:Zimbra - Remote Command Execution (CVE-2024-45519)
URL:https://github.com/Chocapikk/CVE-2024-45519
标签:#CVE-2024
GitHub
GitHub - Chocapikk/CVE-2024-45519: Zimbra - Remote Command Execution (CVE-2024-45519)
Zimbra - Remote Command Execution (CVE-2024-45519) - Chocapikk/CVE-2024-45519
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-26304 is a critical vulnerability (CVSS score of 9.8) affecting ArubaOS
URL:https://github.com/X-Projetion/CVE-2024-26304-RCE-exploit
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-26304 is a critical vulnerability (CVSS score of 9.8) affecting ArubaOS
URL:https://github.com/X-Projetion/CVE-2024-26304-RCE-exploit
标签:#CVE-2024
GitHub
GitHub - X-Projetion/CVE-2024-26304-RCE-exploit: CVE-2024-26304 is a critical vulnerability (CVSS score of 9.8) affecting ArubaOS
CVE-2024-26304 is a critical vulnerability (CVSS score of 9.8) affecting ArubaOS - X-Projetion/CVE-2024-26304-RCE-exploit
GitHub监控消息提醒!!!
更新了:代码审计
描述:一款通过危险函数匹配,辅助java代码审计的小工具
URL:https://github.com/jianjian88807/042_houserent2-public
标签:#代码审计
更新了:代码审计
描述:一款通过危险函数匹配,辅助java代码审计的小工具
URL:https://github.com/jianjian88807/042_houserent2-public
标签:#代码审计
GitHub监控消息提醒!!!
更新了:代码审计
描述:一款通过危险函数匹配,辅助java代码审计的小工具
URL:https://github.com/jianjian88807/114_laboratoryPublic
标签:#代码审计
更新了:代码审计
描述:一款通过危险函数匹配,辅助java代码审计的小工具
URL:https://github.com/jianjian88807/114_laboratoryPublic
标签:#代码审计
GitHub
GitHub - jianjian88807/114_laboratoryPublic: 基于Java+Springboot+Vue的实验室预约系统(源代码+数据库) 本项目前后端分离,本系统分为管理员、教师、学生三种角色 ### 1、学生: 1.登录,注册…
基于Java+Springboot+Vue的实验室预约系统(源代码+数据库) 本项目前后端分离,本系统分为管理员、教师、学生三种角色 ### 1、学生: 1.登录,注册 2.实验室列表 3.实验室预约 4.查看预约进度并取消 5.查看公告 6.订阅课程 7.实验室报修 8.修改个人信息 2、教师: 1.查看并审核预约申请 2.查看已审核预约 3.实验室设备管理,报修 4.查看实验室统计情况 ...