监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Tool that reproduces CVE-2025-55315 in ASP.NET Core.
URL:https://github.com/fevar54/CVE-2025-64446-PoC---FortiWeb-Path-Traversal
标签:#CVE-2025
更新了:CVE-2025
描述:Tool that reproduces CVE-2025-55315 in ASP.NET Core.
URL:https://github.com/fevar54/CVE-2025-64446-PoC---FortiWeb-Path-Traversal
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-XXXXX
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-XXXXX
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-XXXXX
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-XXXXX
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.
URL:https://github.com/uziii2208/CVE-2025-33073
标签:#CVE-2025
更新了:CVE-2025
描述:Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.
URL:https://github.com/uziii2208/CVE-2025-33073
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-12101 is a cross-site scripting (XSS) vulnerability impacting Citrix NetScaler ADC and Citrix NetScaler Gateway appliances when configured in certain roles (Gateway, AAA virtual server)
URL:https://github.com/7amzahard/CVE-2025-21202-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-12101 is a cross-site scripting (XSS) vulnerability impacting Citrix NetScaler ADC and Citrix NetScaler Gateway appliances when configured in certain roles (Gateway, AAA virtual server)
URL:https://github.com/7amzahard/CVE-2025-21202-exploit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/HanTul/Kotaemon-CVE-2025-56526-56527-disclosure
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/HanTul/Kotaemon-CVE-2025-56526-56527-disclosure
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/shinyseam/CVE-2025-64513
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/shinyseam/CVE-2025-64513
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59367
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59367
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be actively exploited as a zero-day.
URL:https://github.com/dexterm300/CVE-2025-62215-exploit-poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be actively exploited as a zero-day.
URL:https://github.com/dexterm300/CVE-2025-62215-exploit-poc
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Maybe a proof-of-concept for CVE-2025-48593
URL:https://github.com/zhuowei/blueshrimp
标签:#CVE-2025
更新了:CVE-2025
描述:Maybe a proof-of-concept for CVE-2025-48593
URL:https://github.com/zhuowei/blueshrimp
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试收集阶段,爬取SPA型应用的所有js文件
URL:https://github.com/catcaine-lab/JSFinder
标签:#渗透测试
更新了:渗透测试
描述:渗透测试收集阶段,爬取SPA型应用的所有js文件
URL:https://github.com/catcaine-lab/JSFinder
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure for CVE-2025-63602, including a PoC for use of an insecure driver in Awesome Miner 11.2.4 leading to arbitrary kernel read/write to MSRs, resulting in kernel code execution.
URL:https://github.com/D7EAD/CVE-2025-63602
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure for CVE-2025-63602, including a PoC for use of an insecure driver in Awesome Miner 11.2.4 leading to arbitrary kernel read/write to MSRs, resulting in kernel code execution.
URL:https://github.com/D7EAD/CVE-2025-63602
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/Jasmin-Bharadiya/Health-Data-Red-Team-Protocol-for-Multimodal-Imaging-Pipelines
标签:#Red Team
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/Jasmin-Bharadiya/Health-Data-Red-Team-Protocol-for-Multimodal-Imaging-Pipelines
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Arbitrary physical memory read/write exploitation using ThrottleStop.sys (CVE-2025-7771) with superfetch address translation - Windows kernel security research
URL:https://github.com/AmrHuss/throttlestop-exploit-rw
标签:#CVE-2025
更新了:CVE-2025
描述:Arbitrary physical memory read/write exploitation using ThrottleStop.sys (CVE-2025-7771) with superfetch address translation - Windows kernel security research
URL:https://github.com/AmrHuss/throttlestop-exploit-rw
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Path traversal tool based on CVE-2025-8088
URL:https://github.com/0xDTC/Below-Logger-Symlink-Attack_CVE-2025-27591
标签:#CVE-2025
更新了:CVE-2025
描述:Path traversal tool based on CVE-2025-8088
URL:https://github.com/0xDTC/Below-Logger-Symlink-Attack_CVE-2025-27591
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Path traversal tool based on CVE-2025-8088
URL:https://github.com/WezRyan/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:Path traversal tool based on CVE-2025-8088
URL:https://github.com/WezRyan/CVE-2025-8088
标签:#CVE-2025