GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025042218hvvq2ibzgpl6vy9g0kdde1
URL:https://github.com/static-web-apps-testing-org/swa2025042218hvvq2ibzgpl6vy9g0kdde1
标签:#hvv
GitHub监控消息提醒!!!
更新了:内网渗透
描述:内网渗透
URL:https://github.com/WiKi-Hub-2023/Intranet_Penetration
标签:#内网渗透
GitHub监控消息提醒!!!
更新了:反序列化
描述: 《深入JDBC安全:特殊URL构造与不出网反序列化利用技术揭秘》对应研究总结项目 \"Deep Dive into JDBC Security: Special URL Construction and Non-Networked Deserialization Exploitation Techniques Revealed\" - Research Summary Project
URL:https://github.com/Oluwaseunnn/jdbc-tricks
标签:#反序列化
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054
URL:https://github.com/helidem/CVE-2025-24054-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试中可能会用到的小工具
URL:https://github.com/yzyboring/-
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/ThreatRadarAI/TRAI-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:X4RCE is a powerful AI workforce management platform that helps you create and manage specialized teams of AI agents. These agents collaborate to accomplish your tasks and projects efficiently.
URL:https://github.com/6543216543210/x4rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:python exploit - Neo4j 3.4.18 - RMI based Remote Code Execution (RCE)
URL:https://github.com/tavgar/CVE-2021-34371
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE---PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Robust Cobalt Strike shellcode loader with multiple advanced evasion features
URL:https://github.com/Sumiran-dev/Threat-Intelligence-case-study
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:webshell
描述:为AWD竞赛开发的webshell管理器,支持扫描,探活,批量执行命令
URL:https://github.com/Rt8848666/AWD_webshell-manager
标签:#webshell
GitHub监控消息提醒!!!
更新了:RCE
描述:PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteam
URL:https://github.com/cheerfulempl/CVE-2024-4577-PHP-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:绕过
描述:卡门涡街(Kármán vortex street)是流体动力学中,当流体绕过障碍物时在其后方形成的一系列交替旋转的涡流结构。
URL:https://github.com/Chinaduanyun/karman_vortex_visualization
标签:#绕过
GitHub监控消息提醒!!!
更新了:RCE
描述:PHP 8.1.0-dev RCE exploit
URL:https://github.com/RajChowdhury240/PHP-8.1.0-dev-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:权限提升
描述:权限提升、自我复制、强制结束系统进程
URL:https://github.com/jarocheng0123/Windows-Destroyer
标签:#权限提升
GitHub监控消息提醒!!!
更新了:应急响应
描述:针对恶意程序的网络连接行为监控工具,特别适用于应急响应场景。通过监控特定 IP/域名的网络连接,快速定位潜伏的恶意程序,协助应急处理人员及时发现和清除威胁。
URL:https://github.com/jayimu/Network_Monitor
标签:#应急响应
GitHub监控消息提醒!!!
更新了:漏洞复现
描述:某输入法EncryptWall加密漏洞复现
URL:https://github.com/g1d0yu/Vulnerability-reproduction
标签:#漏洞复现
GitHub监控消息提醒!!!
更新了:RCE
描述:Unauthenticated RCE and Full Device Compromise on EKSELANS by ITS Devices
URL:https://github.com/miitro/EK_SE_LANS
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This script decodes, filters, and extracts cookies as part of the exploitation of CVE-2025-26159.
URL:https://github.com/godBADTRY/CVE-2025-26159
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/cybersecplayground/CVE-2025-43919-POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025042202hvv9latrprohyvizkrwc08
URL:https://github.com/static-web-apps-testing-org/swa2025042202hvv9latrprohyvizkrwc08
标签:#hvv
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CrushFTP CVE-2025-31161 Exploit Tool 🔓
URL:https://github.com/TX-One/CVE-2025-31161
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Patches the RCE Exploit in XWorm
URL:https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30567 - WordPress WP01 < Path traversal
URL:https://github.com/ThreatRadarAI/TRA-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:looking into CVE-2025-31200 - can't figure it out yet
URL:https://github.com/zhuowei/apple-positional-audio-codec-invalid-header
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30208 vite file read nuclei template
URL:https://github.com/imbas007/CVE-2025-30208-template
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:hvv
描述:swa2025042019f8hvvxo2xa1a5lowtk5i8k
URL:https://github.com/static-web-apps-testing-org/swa2025042019f8hvvxo2xa1a5lowtk5i8k
标签:#hvv
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-43920: Remote Command Injection via Email Subject in GNU Mailman 2.1.39
URL:https://github.com/0NYX-MY7H/CVE-2025-43920
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-43921: Unauthorized Mailing List Creation in GNU Mailman 2.1.39
URL:https://github.com/0NYX-MY7H/CVE-2025-43921
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-43919: Directory Traversal Vulnerability in GNU Mailman 2.1.39
URL:https://github.com/0NYX-MY7H/CVE-2025-43919
标签:#CVE-2025