监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:渗透测试
描述:记录渗透测试学习过程(每日打卡与实操)
URL:https://github.com/a2633255661cool/pentest-learning
标签:#渗透测试
更新了:渗透测试
描述:记录渗透测试学习过程(每日打卡与实操)
URL:https://github.com/a2633255661cool/pentest-learning
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Parsing 是一个 Chrome 插件,用于解析当前页面的Js代码,并提供多维度的 AI 分析功能,以及信息收集,提升渗透测试效率。
URL:https://github.com/arch3rPro/MCP-PST-Server
标签:#渗透测试
更新了:渗透测试
描述:Parsing 是一个 Chrome 插件,用于解析当前页面的Js代码,并提供多维度的 AI 分析功能,以及信息收集,提升渗透测试效率。
URL:https://github.com/arch3rPro/MCP-PST-Server
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/AdityaBhatt3010/CVE-2025-59287-When-your-patch-server-becomes-the-attack-vector
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/AdityaBhatt3010/CVE-2025-59287-When-your-patch-server-becomes-the-attack-vector
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/mrk336/Breaking-the-Update-Chain-Inside-CVE-2025-59287-and-the-WSUS-RCE-Threat
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/mrk336/Breaking-the-Update-Chain-Inside-CVE-2025-59287-and-the-WSUS-RCE-Threat
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
URL:https://github.com/LyticOnaope/Vulnerability-Assessment-Nessus-
标签:#RCE
更新了:RCE
描述:TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
URL:https://github.com/LyticOnaope/Vulnerability-Assessment-Nessus-
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:V8 Store-Store Elimination RCE without heap sandbox.
URL:https://github.com/ntLocalSystem/V8-Store-Store-Elimination-Exploit
标签:#RCE
更新了:RCE
描述:V8 Store-Store Elimination RCE without heap sandbox.
URL:https://github.com/ntLocalSystem/V8-Store-Store-Elimination-Exploit
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/yonatanasd232132/talkingBen
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/yonatanasd232132/talkingBen
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Helps defenders find their WSUS configurations in the wake of CVE-2025-59287
URL:https://github.com/mubix/Find-WSUS
标签:#CVE-2025
更新了:CVE-2025
描述:Helps defenders find their WSUS configurations in the wake of CVE-2025-59287
URL:https://github.com/mubix/Find-WSUS
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure for CVE-2025-61156, an insecure access control, kernel-mode vulnerability found in ThreatFire System Monitor abused in the wild for BYOVD and EDR evasion.
URL:https://github.com/D7EAD/CVE-2025-61156
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure for CVE-2025-61156, an insecure access control, kernel-mode vulnerability found in ThreatFire System Monitor abused in the wild for BYOVD and EDR evasion.
URL:https://github.com/D7EAD/CVE-2025-61156
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 CVE-2025-61884 — High-Risk Oracle EBS Configurator Info Disclosure
URL:https://github.com/AshrafZaryouh/CVE-2025-61884-At-a-Glance
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 CVE-2025-61884 — High-Risk Oracle EBS Configurator Info Disclosure
URL:https://github.com/AshrafZaryouh/CVE-2025-61884-At-a-Glance
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-61882 — Critical Oracle EBS RCE: Analysis & Response
URL:https://github.com/AshrafZaryouh/CVE-2025-61882-Executive-Summary
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-61882 — Critical Oracle EBS RCE: Analysis & Response
URL:https://github.com/AshrafZaryouh/CVE-2025-61882-Executive-Summary
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Module PowerShell de réponse à l'incident CVE-2025-59287 — WSUS Remote Code Execution (RCE)
URL:https://github.com/RadzaRr/WSUSResponder
标签:#CVE-2025
更新了:CVE-2025
描述:Module PowerShell de réponse à l'incident CVE-2025-59287 — WSUS Remote Code Execution (RCE)
URL:https://github.com/RadzaRr/WSUSResponder
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Cleanest, no RCE, xworm 6.5
URL:https://github.com/ledjonponari/Xworm6.5
标签:#RCE
更新了:RCE
描述:Cleanest, no RCE, xworm 6.5
URL:https://github.com/ledjonponari/Xworm6.5
标签:#RCE
GitHub监控消息提醒!!!
更新了:绕过
描述:绕过谷歌服务证书校验 / Bypass Google Service License Verification
URL:https://github.com/JiGuroLGC/FuckGoogleLicense
标签:#绕过
更新了:绕过
描述:绕过谷歌服务证书校验 / Bypass Google Service License Verification
URL:https://github.com/JiGuroLGC/FuckGoogleLicense
标签:#绕过
GitHub监控消息提醒!!!
更新了:绕过
描述:用来绕过《苍蓝誓约》的版本更新和别的什么验证的服务器程序
URL:https://github.com/xys20071111/BlueOath-fake-server
标签:#绕过
更新了:绕过
描述:用来绕过《苍蓝誓约》的版本更新和别的什么验证的服务器程序
URL:https://github.com/xys20071111/BlueOath-fake-server
标签:#绕过
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Pixnapping Attack: Compromising private keys and seed phrases through vulnerability CVE-2025-48561 represents a new critical threat to the Bitcoin network and Android infrastructure
URL:https://github.com/Lupovis/Honeypot-for-CVE-2025-59287-WSUS
标签:#CVE-2025
更新了:CVE-2025
描述:Pixnapping Attack: Compromising private keys and seed phrases through vulnerability CVE-2025-48561 represents a new critical threat to the Bitcoin network and Android infrastructure
URL:https://github.com/Lupovis/Honeypot-for-CVE-2025-59287-WSUS
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:data stories RCE
URL:https://github.com/danielvflores/rce-java-vulnerability
标签:#RCE
更新了:RCE
描述:data stories RCE
URL:https://github.com/danielvflores/rce-java-vulnerability
标签:#RCE
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:针对 postmessage xss 的漏洞扫描器
URL:https://github.com/bitboy-sys/postmessage_xss_scanner
标签:#漏洞扫描
更新了:漏洞扫描
描述:针对 postmessage xss 的漏洞扫描器
URL:https://github.com/bitboy-sys/postmessage_xss_scanner
标签:#漏洞扫描
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Pixnapping Attack: Compromising private keys and seed phrases through vulnerability CVE-2025-48561 represents a new critical threat to the Bitcoin network and Android infrastructure
URL:https://github.com/demining/Pixnapping-Attack-on-Android
标签:#CVE-2025
更新了:CVE-2025
描述:Pixnapping Attack: Compromising private keys and seed phrases through vulnerability CVE-2025-48561 represents a new critical threat to the Bitcoin network and Android infrastructure
URL:https://github.com/demining/Pixnapping-Attack-on-Android
标签:#CVE-2025