监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:⚠️ Demonstrate CVE-2025-55188 with this proof-of-concept exploit for 7-Zip, revealing vulnerabilities in file extraction handling and potential impacts.
URL:https://github.com/Sh3ruman/CVE-2025-55188-7z-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:⚠️ Demonstrate CVE-2025-55188 with this proof-of-concept exploit for 7-Zip, revealing vulnerabilities in file extraction handling and potential impacts.
URL:https://github.com/Sh3ruman/CVE-2025-55188-7z-exploit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-34100 test
URL:https://github.com/hyeonyeonglee/CVE-2025-34100
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-34100 test
URL:https://github.com/hyeonyeonglee/CVE-2025-34100
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-0133 Exploit
URL:https://github.com/adhamelhansye/CVE-2025-0133
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-0133 Exploit
URL:https://github.com/adhamelhansye/CVE-2025-0133
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:🚨 Demonstrate CVE-2025-54253, a critical OGNL injection vulnerability in Adobe AEM Forms, for educational and research purposes.
URL:https://github.com/akujedanjedon/CVE-2025-54253-Exploit-Demo
标签:#RCE
更新了:RCE
描述:🚨 Demonstrate CVE-2025-54253, a critical OGNL injection vulnerability in Adobe AEM Forms, for educational and research purposes.
URL:https://github.com/akujedanjedon/CVE-2025-54253-Exploit-Demo
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:RCE hook
URL:https://github.com/butyraldehyde/CVE-2025-48384-PoC-Part2
标签:#CVE-2025
更新了:CVE-2025
描述:RCE hook
URL:https://github.com/butyraldehyde/CVE-2025-48384-PoC-Part2
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Exploit the CVE-2025-54424 RCE vulnerability in 1Panel, enabling unauthorized command execution through a certification bypass tool for scanning and exploitation.
URL:https://github.com/bejbitoilet5125521/CVE-2025-54424
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Exploit the CVE-2025-54424 RCE vulnerability in 1Panel, enabling unauthorized command execution through a certification bypass tool for scanning and exploitation.
URL:https://github.com/bejbitoilet5125521/CVE-2025-54424
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:应急响应
描述:渗透测试,应急响应综合练习平台
URL:https://github.com/MchalTesla/emergency-toolkit
标签:#应急响应
更新了:应急响应
描述:渗透测试,应急响应综合练习平台
URL:https://github.com/MchalTesla/emergency-toolkit
标签:#应急响应
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:💻 Demonstrate a ViewState deserialization exploit for CVE-2025-30406 in ASP.NET, enabling remote code execution with a Proof-of-Concept script.
URL:https://github.com/jaydenb546/CVE-2025-30406
标签:#CVE-2025
更新了:CVE-2025
描述:💻 Demonstrate a ViewState deserialization exploit for CVE-2025-30406 in ASP.NET, enabling remote code execution with a Proof-of-Concept script.
URL:https://github.com/jaydenb546/CVE-2025-30406
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🐳 Reproduce and test the CVE-2025-32463 vulnerability in a Docker-based lab environment for security research and practical analysis.
URL:https://github.com/DaadaAyoze/CVE-2025-32463-lab
标签:#CVE-2025
更新了:CVE-2025
描述:🐳 Reproduce and test the CVE-2025-32463 vulnerability in a Docker-based lab environment for security research and practical analysis.
URL:https://github.com/DaadaAyoze/CVE-2025-32463-lab
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Next.js middleware auth-bypass lab (CVE-2025-29927 simulation)
URL:https://github.com/amalpvatayam67/day10-nextjs-middleware-lab
标签:#CVE-2025
更新了:CVE-2025
描述:Next.js middleware auth-bypass lab (CVE-2025-29927 simulation)
URL:https://github.com/amalpvatayam67/day10-nextjs-middleware-lab
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Scan for potential exposure to the critical SharePoint vulnerability CVE-2025-53770 with this simple and effective tool for authorized testing.
URL:https://github.com/ziisenpai/CVE-2025-53770-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Scan for potential exposure to the critical SharePoint vulnerability CVE-2025-53770 with this simple and effective tool for authorized testing.
URL:https://github.com/ziisenpai/CVE-2025-53770-Scanner
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:AI修复生成的CVE-2025-32432的poc
URL:https://github.com/bambooqj/CVE-2025-32432
标签:#CVE-2025
更新了:CVE-2025
描述:AI修复生成的CVE-2025-32432的poc
URL:https://github.com/bambooqj/CVE-2025-32432
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29927
URL:https://github.com/sermikr0/nextjs-middleware-auth-bypass
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29927
URL:https://github.com/sermikr0/nextjs-middleware-auth-bypass
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:🛠️ Explore the CVE-2025-5777 memory leak vulnerability in Citrix NetScaler, illustrating the risks of uninitialized memory in parsing malformed POST data.
URL:https://github.com/Lakiya673/CVE-2025-5777
标签:#RCE
更新了:RCE
描述:🛠️ Explore the CVE-2025-5777 memory leak vulnerability in Citrix NetScaler, illustrating the risks of uninitialized memory in parsing malformed POST data.
URL:https://github.com/Lakiya673/CVE-2025-5777
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Exploit CVE-2025-25257 in FortiWeb with a working full exploit and a proof of concept for file read/write.
URL:https://github.com/kityzed2003/CVE-2025-25257
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Exploit CVE-2025-25257 in FortiWeb with a working full exploit and a proof of concept for file read/write.
URL:https://github.com/kityzed2003/CVE-2025-25257
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ Demonstrate CVE-2025-48799, a Windows Update service vulnerability that allows elevation of privilege via arbitrary folder deletion on multi-drive systems.
URL:https://github.com/ukisshinaah/CVE-2025-48799
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ Demonstrate CVE-2025-48799, a Windows Update service vulnerability that allows elevation of privilege via arbitrary folder deletion on multi-drive systems.
URL:https://github.com/ukisshinaah/CVE-2025-48799
标签:#CVE-2025