GitHub监控消息提醒!!!
更新了:应急响应
描述:高校疫情防控Web系统,采用Spring Boot与Vue技术栈构建。Spring Boot后端负责数据处理与业务逻辑,Vue前端提供直观的用户界面。该系统实现健康打卡、行程追踪、防疫知识宣传、疫情预警与应急响应等功能,助力高校精准防控疫情,保障师生健康安全。通过信息化手段,系统提高了疫情防控的效率与精准度,为高校疫情防控工作提供了强有力的技术支持。
URL:https://github.com/xunmaw001/University-Epidemic-Prevention-and-Control-Web-System
标签:#应急响应
更新了:应急响应
描述:高校疫情防控Web系统,采用Spring Boot与Vue技术栈构建。Spring Boot后端负责数据处理与业务逻辑,Vue前端提供直观的用户界面。该系统实现健康打卡、行程追踪、防疫知识宣传、疫情预警与应急响应等功能,助力高校精准防控疫情,保障师生健康安全。通过信息化手段,系统提高了疫情防控的效率与精准度,为高校疫情防控工作提供了强有力的技术支持。
URL:https://github.com/xunmaw001/University-Epidemic-Prevention-and-Control-Web-System
标签:#应急响应
GitHub
GitHub - xunmaw001/University-Epidemic-Prevention-and-Control-Web-System: 高校疫情防控Web系统,采用Spring Boot与Vue技术栈构建。Spring Boot后端负责数据…
高校疫情防控Web系统,采用Spring Boot与Vue技术栈构建。Spring Boot后端负责数据处理与业务逻辑,Vue前端提供直观的用户界面。该系统实现健康打卡、行程追踪、防疫知识宣传、疫情预警与应急响应等功能,助力高校精准防控疫情,保障师生健康安全。通过信息化手段,系统提高了疫情防控的效率与精准度,为高校疫情防控工作提供了强有力的技术支持。 - xunmaw001/Universi...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-11016-Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
URL:https://github.com/hatvix1/CVE-2024-11016
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-11016-Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
URL:https://github.com/hatvix1/CVE-2024-11016
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-47062 PoC
URL:https://github.com/saisathvik1/CVE-2024-47062
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-47062 PoC
URL:https://github.com/saisathvik1/CVE-2024-47062
标签:#CVE-2024
GitHub
GitHub - saisathvik1/CVE-2024-47062: CVE-2024-47062 PoC
CVE-2024-47062 PoC. Contribute to saisathvik1/CVE-2024-47062 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI Red Teaming (Jailbreaking) on Browser Agents
URL:https://github.com/AIM-Intelligence/Browser-Agent-Red-Teaming
标签:#Red Team
更新了:Red Team
描述:AI Red Teaming (Jailbreaking) on Browser Agents
URL:https://github.com/AIM-Intelligence/Browser-Agent-Red-Teaming
标签:#Red Team
GitHub
GitHub - AIM-Intelligence/Browser-Agent-Red-Teaming: AI Red Teaming (Jailbreaking) on Browser Agents
AI Red Teaming (Jailbreaking) on Browser Agents. Contribute to AIM-Intelligence/Browser-Agent-Red-Teaming development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Repo containing modified WRF code and analysis code for conducting convection-permitting idealized RCE simulations
URL:https://github.com/cancela24/CVE-2019-16278-Nostromo-1.9.6-RCE
标签:#RCE
更新了:RCE
描述:Repo containing modified WRF code and analysis code for conducting convection-permitting idealized RCE simulations
URL:https://github.com/cancela24/CVE-2019-16278-Nostromo-1.9.6-RCE
标签:#RCE
GitHub
GitHub - cancela24/CVE-2019-16278-Nostromo-1.9.6-RCE: This repository contains an exploit for CVE-2019-16278 in Nostromo Web Server…
This repository contains an exploit for CVE-2019-16278 in Nostromo Web Server 1.9.6, allowing remote code execution via a directory traversal vulnerability. The script uses pwntools to establish a ...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC Script for CVE-2024-45827: Exploits a remote command injection vulnerability in SoftBank RP562B mesh device.
URL:https://github.com/0xNslabs/CVE-2024-45827-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:PoC Script for CVE-2024-45827: Exploits a remote command injection vulnerability in SoftBank RP562B mesh device.
URL:https://github.com/0xNslabs/CVE-2024-45827-PoC
标签:#CVE-2024
GitHub
0xNslabs/CVE-2024-45827-PoC
PoC Script for CVE-2024-45827: Exploits a remote command injection vulnerability in SoftBank RP562B mesh device. - 0xNslabs/CVE-2024-45827-PoC
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC Script for CVE-2024-45827: Exploits a remote command injection vulnerability in SoftBank RP562B mesh device.
URL:https://github.com/0xNslabs/SoftBankMeshAPI
标签:#CVE-2024
更新了:CVE-2024
描述:PoC Script for CVE-2024-45827: Exploits a remote command injection vulnerability in SoftBank RP562B mesh device.
URL:https://github.com/0xNslabs/SoftBankMeshAPI
标签:#CVE-2024
GitHub
GitHub - 0xNslabs/SoftBankMeshAPI: PoC API that exploits multiple vulnerabilities in SoftBank RP562B mesh device.
PoC API that exploits multiple vulnerabilities in SoftBank RP562B mesh device. - 0xNslabs/SoftBankMeshAPI
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Attempt at making the CVE-2024-3400 initial exploit (for educational purposes)
URL:https://github.com/workshop748/CVE-2024-3400
标签:#CVE-2024
更新了:CVE-2024
描述:Attempt at making the CVE-2024-3400 initial exploit (for educational purposes)
URL:https://github.com/workshop748/CVE-2024-3400
标签:#CVE-2024
GitHub
GitHub - workshop748/CVE-2024-3400: Attempt at making the CVE-2024-3400 initial exploit (for educational purposes)
Attempt at making the CVE-2024-3400 initial exploit (for educational purposes) - workshop748/CVE-2024-3400
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Explorations of CVE-2024-49368 + Exploit Development
URL:https://github.com/Aashay221999/CVE-2024-49368
标签:#CVE-2024
更新了:CVE-2024
描述:Explorations of CVE-2024-49368 + Exploit Development
URL:https://github.com/Aashay221999/CVE-2024-49368
标签:#CVE-2024
GitHub
GitHub - Aashay221999/CVE-2024-49368: Explorations of CVE-2024-49368 + Exploit Development
Explorations of CVE-2024-49368 + Exploit Development - Aashay221999/CVE-2024-49368
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop
URL:https://github.com/Ajcdn11/AJCDN-CLOUD-SERVER
标签:#渗透测试
更新了:渗透测试
描述:Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop
URL:https://github.com/Ajcdn11/AJCDN-CLOUD-SERVER
标签:#渗透测试
GitHub
Ajcdn11/AJCDN-CLOUD-SERVER
防网络追踪系统:通过多层防护机制(如HTTP代理、VPN等),保障用户的网络隐私和数据安全。 跳板机系统:结合VPN和跳板机系统,提供基本的网络安全。 云服务器:提供多地区高性能云服务器,支持国内和国际区域。 国际云开户充值:为阿里云、腾讯云、Google云、Amazon云等提供折扣充值服务,免实名。 伪造服务器:模拟IP地址和网络服务,支持发包和DNS放大攻击。 Kali三层镜像:预装渗透...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:前端加密对抗练习靶场,包含非对称加密、对称加密以及加签的测试场景,比如AES、DES、RSA,用于渗透测试练习
URL:https://github.com/SwagXz/encrypt-ENV
标签:#渗透测试
更新了:渗透测试
描述:前端加密对抗练习靶场,包含非对称加密、对称加密以及加签的测试场景,比如AES、DES、RSA,用于渗透测试练习
URL:https://github.com/SwagXz/encrypt-ENV
标签:#渗透测试
GitHub
GitHub - SwagXz/encrypt-labs: 前端加密对抗练习靶场,包含非对称加密、对称加密、加签以及禁止重放的测试场景,比如AES、DES、RSA,用于渗透测试练习
前端加密对抗练习靶场,包含非对称加密、对称加密、加签以及禁止重放的测试场景,比如AES、DES、RSA,用于渗透测试练习 - SwagXz/encrypt-labs
GitHub监控消息提醒!!!
更新了:渗透测试
描述:前端加密对抗练习靶场,包含非对称加密、对称加密以及加签的测试场景,比如AES、DES、RSA,用于渗透测试练习
URL:https://github.com/SwagXz/encrypt-labs
标签:#渗透测试
更新了:渗透测试
描述:前端加密对抗练习靶场,包含非对称加密、对称加密以及加签的测试场景,比如AES、DES、RSA,用于渗透测试练习
URL:https://github.com/SwagXz/encrypt-labs
标签:#渗透测试
GitHub
GitHub - SwagXz/encrypt-labs: 前端加密对抗练习靶场,包含非对称加密、对称加密、加签以及禁止重放的测试场景,比如AES、DES、RSA,用于渗透测试练习
前端加密对抗练习靶场,包含非对称加密、对称加密、加签以及禁止重放的测试场景,比如AES、DES、RSA,用于渗透测试练习 - SwagXz/encrypt-labs
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC for CVE-2024-25292
URL:https://github.com/EQSTLab/CVE-2024-25292
标签:#CVE-2024
更新了:CVE-2024
描述:PoC for CVE-2024-25292
URL:https://github.com/EQSTLab/CVE-2024-25292
标签:#CVE-2024
GitHub
GitHub - EQSTLab/CVE-2024-25292: XSS to RCE in RenderTune v1.1.4 exploit
XSS to RCE in RenderTune v1.1.4 exploit. Contribute to EQSTLab/CVE-2024-25292 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:本文旨在如何运用翻墙软件绕过GFW自由访问国际互联网
URL:https://github.com/Yang-SyZng/Skipping-the-Fucking-GFW
标签:#绕过
更新了:绕过
描述:本文旨在如何运用翻墙软件绕过GFW自由访问国际互联网
URL:https://github.com/Yang-SyZng/Skipping-the-Fucking-GFW
标签:#绕过
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Python POC for CVE-2024-32640 Mura CMS SQLi
URL:https://github.com/pizza-power/CVE-2024-32640
标签:#CVE-2024
更新了:CVE-2024
描述:Python POC for CVE-2024-32640 Mura CMS SQLi
URL:https://github.com/pizza-power/CVE-2024-32640
标签:#CVE-2024
GitHub
GitHub - pizza-power/CVE-2024-32640: Python POC for CVE-2024-32640 Mura CMS SQLi
Python POC for CVE-2024-32640 Mura CMS SQLi. Contribute to pizza-power/CVE-2024-32640 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:RCE
描述:Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE
URL:https://github.com/XiaomingX/exploit-Citrix-Virtual-Apps-XEN
标签:#RCE
更新了:RCE
描述:Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE
URL:https://github.com/XiaomingX/exploit-Citrix-Virtual-Apps-XEN
标签:#RCE
GitHub
GitHub - XiaomingX/cve-2024-8069-exp-Citrix-Virtual-Apps-XEN: Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE
Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE - XiaomingX/cve-2024-8069-exp-Citrix-Virtual-Apps-XEN
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Close-range Penetration Test / 近源渗透测试
URL:https://github.com/Push3AX/Close-Range-Penetration
标签:#渗透测试
更新了:渗透测试
描述:Close-range Penetration Test / 近源渗透测试
URL:https://github.com/Push3AX/Close-Range-Penetration
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:RCE
描述:Perform a Blind RCE Exfiltration by converting the output to binary
URL:https://github.com/CryptoSecEd/blind_rce_exfil
标签:#RCE
更新了:RCE
描述:Perform a Blind RCE Exfiltration by converting the output to binary
URL:https://github.com/CryptoSecEd/blind_rce_exfil
标签:#RCE
GitHub
GitHub - CryptoSecEd/blind_rce_exfil: Perform a Blind RCE Exfiltration by converting the output to binary
Perform a Blind RCE Exfiltration by converting the output to binary - CryptoSecEd/blind_rce_exfil