监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-61882
URL:https://github.com/rxerium/CVE-2025-61882
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-61882
URL:https://github.com/rxerium/CVE-2025-61882
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Apache (CVE-2025-24813) GOExploiter Checker & Exploiter very Fast
URL:https://github.com/drcrypterdotru/Apache-GOExploiter
标签:#CVE-2025
更新了:CVE-2025
描述:Apache (CVE-2025-24813) GOExploiter Checker & Exploiter very Fast
URL:https://github.com/drcrypterdotru/Apache-GOExploiter
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:WP-CVE-2025-6934 | Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation
URL:https://github.com/Jenderal92/WP-CVE-2025-6934
标签:#CVE-2025
更新了:CVE-2025
描述:WP-CVE-2025-6934 | Opal Estate Pro <= 1.7.5 - Unauthenticated Privilege Escalation
URL:https://github.com/Jenderal92/WP-CVE-2025-6934
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:信息收集
描述:基于micronaut框架完成的一个硬件资源信息收集。可通过GraalVM工具打包成本地可执行文件。
URL:https://github.com/xminj/monitor-agent
标签:#信息收集
更新了:信息收集
描述:基于micronaut框架完成的一个硬件资源信息收集。可通过GraalVM工具打包成本地可执行文件。
URL:https://github.com/xminj/monitor-agent
标签:#信息收集
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: This repository contains a proof-of-concept exploit script for CVE-2025-1338
URL:https://github.com/jxcaxtc/CVE-2025-1338
标签:#CVE-2025
更新了:CVE-2025
描述: This repository contains a proof-of-concept exploit script for CVE-2025-1338
URL:https://github.com/jxcaxtc/CVE-2025-1338
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/Creksz/web-vuln-scanner
标签:#RCE
更新了:RCE
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/Creksz/web-vuln-scanner
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem.
URL:https://github.com/farazsth98/exploit-CVE-2025-39946
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem.
URL:https://github.com/farazsth98/exploit-CVE-2025-39946
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:bypass av
描述:免杀木马样本
URL:https://github.com/batuhan-arda/Direct-Syscall-APC-Injection-PoC-Malware
标签:#bypass av
更新了:bypass av
描述:免杀木马样本
URL:https://github.com/batuhan-arda/Direct-Syscall-APC-Injection-PoC-Malware
标签:#bypass av
GitHub监控消息提醒!!!
更新了:RCE
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/ivy2320/CTF-event
标签:#RCE
更新了:RCE
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/ivy2320/CTF-event
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Classic Web shell upload techniques & Web RCE techniques
URL:https://github.com/JFR-C/Webshell-Upload-and-Web-RCE-Techniques
标签:#RCE
更新了:RCE
描述:Classic Web shell upload techniques & Web RCE techniques
URL:https://github.com/JFR-C/Webshell-Upload-and-Web-RCE-Techniques
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Simple script to attempt a Bypass on a server possibly vulnerable to CVE-2025-29927 (Next.js Middleware)
URL:https://github.com/diogolourencodev/middleforce
标签:#CVE-2025
更新了:CVE-2025
描述:Simple script to attempt a Bypass on a server possibly vulnerable to CVE-2025-29927 (Next.js Middleware)
URL:https://github.com/diogolourencodev/middleforce
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:sql injection PoC for CVE-2025-7558. authored by i-Corner
URL:https://github.com/rundas-r00t/CVE-2025-7558-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:sql injection PoC for CVE-2025-7558. authored by i-Corner
URL:https://github.com/rundas-r00t/CVE-2025-7558-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-60787 Poc - RCE - MotionEye <= 0.43.1b4
URL:https://github.com/prabhatverma47/CVE-2025-60787
标签:#RCE
更新了:RCE
描述:CVE-2025-60787 Poc - RCE - MotionEye <= 0.43.1b4
URL:https://github.com/prabhatverma47/CVE-2025-60787
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/NVIDIA/product-security
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/NVIDIA/product-security
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59489 POC For android games
URL:https://github.com/RealtekDotSys/Meteor
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59489 POC For android games
URL:https://github.com/RealtekDotSys/Meteor
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/fa1consec/cve_2025_61622_poc
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin.
URL:https://github.com/fa1consec/cve_2025_61622_poc
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:应急响应
描述:企业应急响应系统-C语言库
URL:https://github.com/Yuen434/Enterprise-Response-Executor
标签:#应急响应
更新了:应急响应
描述:企业应急响应系统-C语言库
URL:https://github.com/Yuen434/Enterprise-Response-Executor
标签:#应急响应