监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-11171
URL:https://github.com/SnailSploit/CVE-2025-11171---GitHub-Security-Advisory
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-11171
URL:https://github.com/SnailSploit/CVE-2025-11171---GitHub-Security-Advisory
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Apache Kafka 4.1.0 (KRaft) with Keycloak OAuth2 authentication using Strimzi - bypasses CVE-2025-27817 URL allowlist restriction
URL:https://github.com/oriolrius/kafka-keycloak-oauth
标签:#CVE-2025
更新了:CVE-2025
描述:Apache Kafka 4.1.0 (KRaft) with Keycloak OAuth2 authentication using Strimzi - bypasses CVE-2025-27817 URL allowlist restriction
URL:https://github.com/oriolrius/kafka-keycloak-oauth
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:信息收集
描述:基于ibex平台编写的Maze Task线上测试程序,包括背景信息收集,实验指南,Maze Task程序等。
URL:https://github.com/WenxinQin-ux/PCIbex-Maze-Task
标签:#信息收集
更新了:信息收集
描述:基于ibex平台编写的Maze Task线上测试程序,包括背景信息收集,实验指南,Maze Task程序等。
URL:https://github.com/WenxinQin-ux/PCIbex-Maze-Task
标签:#信息收集
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/byteReaper77/CVE-2025-39913
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/byteReaper77/CVE-2025-39913
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Idealized Models of Climate Processes (Columbia University Department of Earth and Environmental Sciences GR6926, Fall 2025): 3-box (carbon, biological); 1-box (carbon, abiotic); EBCM; RCE
URL:https://github.com/jw4826/Idealized-Climate-Models_Sep-2025--Present
标签:#RCE
更新了:RCE
描述:Idealized Models of Climate Processes (Columbia University Department of Earth and Environmental Sciences GR6926, Fall 2025): 3-box (carbon, biological); 1-box (carbon, abiotic); EBCM; RCE
URL:https://github.com/jw4826/Idealized-Climate-Models_Sep-2025--Present
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/byteReaper77/CVE-2025-39913-
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/byteReaper77/CVE-2025-39913-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Phoenix Rowhammer Attack: Systemic Risk of Bitcoin Wallet Private Key Compromise in Global Blockchain Infrastructure Due to a Critical SK Hynix DDR5 Vulnerability (CVE-2025-6202)
URL:https://github.com/demining/Phoenix-Rowhammer-Attack-CVE-2025-6202
标签:#CVE-2025
更新了:CVE-2025
描述:Phoenix Rowhammer Attack: Systemic Risk of Bitcoin Wallet Private Key Compromise in Global Blockchain Infrastructure Due to a Critical SK Hynix DDR5 Vulnerability (CVE-2025-6202)
URL:https://github.com/demining/Phoenix-Rowhammer-Attack-CVE-2025-6202
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:bypass av
描述:用于绕过杀软的加载器
URL:https://github.com/5ma111eaf/BypassAV-Loader
标签:#bypass av
更新了:bypass av
描述:用于绕过杀软的加载器
URL:https://github.com/5ma111eaf/BypassAV-Loader
标签:#bypass av
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Identify and analyze the CVE-2025-10184 vulnerability in ColorOS, affecting SMS data access in OPPO and its sub-brands.
URL:https://github.com/ENGWes/ColorOS-CVE-2025-10184
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Identify and analyze the CVE-2025-10184 vulnerability in ColorOS, affecting SMS data access in OPPO and its sub-brands.
URL:https://github.com/ENGWes/ColorOS-CVE-2025-10184
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:We are expected to investigate a critical alert reporting a Windows OLE zero-click RCE exploitation (CVE-2025-21298) delivered via a malicious RTF attachment.
URL:https://github.com/Arkha-Corvus/LetsDefend-SOC336-Windows-OLE-Zero-Click-RCE-Exploitation-Detected-CVE-2025-21298-
标签:#CVE-2025
更新了:CVE-2025
描述:We are expected to investigate a critical alert reporting a Windows OLE zero-click RCE exploitation (CVE-2025-21298) delivered via a malicious RTF attachment.
URL:https://github.com/Arkha-Corvus/LetsDefend-SOC336-Windows-OLE-Zero-Click-RCE-Exploitation-Detected-CVE-2025-21298-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:sql注入
描述:一个基于sqlmap API的高并发SQL注入漏洞扫描框架,支持多文件处理、结果存储、报告生成和数据可视化。
URL:https://github.com/fanwin/SqlmapAuto
标签:#sql注入
更新了:sql注入
描述:一个基于sqlmap API的高并发SQL注入漏洞扫描框架,支持多文件处理、结果存储、报告生成和数据可视化。
URL:https://github.com/fanwin/SqlmapAuto
标签:#sql注入
GitHub监控消息提醒!!!
更新了:信息收集
描述:information-collection-system 网络安全信息收集系统
URL:https://github.com/1841109483/information-collection-system
标签:#信息收集
更新了:信息收集
描述:information-collection-system 网络安全信息收集系统
URL:https://github.com/1841109483/information-collection-system
标签:#信息收集
GitHub监控消息提醒!!!
更新了:渗透测试
描述:面向 Windows 的 Scoop 第三方桶,收录常用 CTF、安全与渗透测试工具,便于快速安装、更新与管理。
URL:https://github.com/gandli/scoop-ctf
标签:#渗透测试
更新了:渗透测试
描述:面向 Windows 的 Scoop 第三方桶,收录常用 CTF、安全与渗透测试工具,便于快速安装、更新与管理。
URL:https://github.com/gandli/scoop-ctf
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:反序列化
描述:基于vue3+element-plus+javascript-stringify的js序列化反序列化输入框组
URL:https://github.com/is-zhou/vue-serialize-input
标签:#反序列化
更新了:反序列化
描述:基于vue3+element-plus+javascript-stringify的js序列化反序列化输入框组
URL:https://github.com/is-zhou/vue-serialize-input
标签:#反序列化
GitHub监控消息提醒!!!
更新了:sql注入
描述:dzzoffice后台sql注入
URL:https://github.com/Yohane-Mashiro/dzzoffice_sql
标签:#sql注入
更新了:sql注入
描述:dzzoffice后台sql注入
URL:https://github.com/Yohane-Mashiro/dzzoffice_sql
标签:#sql注入
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Explore a working PoC for CVE-2025-32433, demonstrating its impact and providing insights for security professionals and developers.
URL:https://github.com/isikgoktepe0/Python-Web-Application-Firewall-WAF-
标签:#RCE
更新了:RCE
描述:🔍 Explore a working PoC for CVE-2025-32433, demonstrating its impact and providing insights for security professionals and developers.
URL:https://github.com/isikgoktepe0/Python-Web-Application-Firewall-WAF-
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59489 Unity Vulnerability Checker
URL:https://github.com/taptap/cve-2025-59489
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59489 Unity Vulnerability Checker
URL:https://github.com/taptap/cve-2025-59489
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Comprehensive demonstration of CVE-2025-32421 Eclipse technique - a sophisticated race condition attack against Next.js 15.0.4 that bypasses the original CVE-2024-46982 patch.
URL:https://github.com/hidesec/CVE-2025-32421
标签:#CVE-2025
更新了:CVE-2025
描述:Comprehensive demonstration of CVE-2025-32421 Eclipse technique - a sophisticated race condition attack against Next.js 15.0.4 that bypasses the original CVE-2024-46982 patch.
URL:https://github.com/hidesec/CVE-2025-32421
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:포켓몬스터를 C 언어로 구현하고, 이를 직접 익스플로잇 해보는 실습입니다. 목표는 RCE 입니다.
URL:https://github.com/m0nk3ygod/Pokemon_cli_-_exploit
标签:#RCE
更新了:RCE
描述:포켓몬스터를 C 언어로 구현하고, 이를 직접 익스플로잇 해보는 실습입니다. 목표는 RCE 입니다.
URL:https://github.com/m0nk3ygod/Pokemon_cli_-_exploit
标签:#RCE