监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-60880 - Stored Cross-Site Scripting (XSS) in Bagisto Admin Panel
URL:https://github.com/Shenal01/CVE-2025-60880
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-60880 - Stored Cross-Site Scripting (XSS) in Bagisto Admin Panel
URL:https://github.com/Shenal01/CVE-2025-60880
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55903 — Stored HTML Injection in PerfexCRM < 3.3.1 (Invoice/Client Communication)
URL:https://github.com/ajansha/CVE-2025-55903
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55903 — Stored HTML Injection in PerfexCRM < 3.3.1 (Invoice/Client Communication)
URL:https://github.com/ajansha/CVE-2025-55903
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-60375 — Authentication bypass / incorrect access control in PerfexCRM < 3.3.1 (admin login)
URL:https://github.com/AhamedYaseen03/CVE-2025-60375
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-60375 — Authentication bypass / incorrect access control in PerfexCRM < 3.3.1 (admin login)
URL:https://github.com/AhamedYaseen03/CVE-2025-60375
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:OSS存储桶的漏洞扫描工具,目前支持阿里云、腾讯云、华为云、aws
URL:https://github.com/bitboy-sys/OSS_scanner
标签:#漏洞扫描
更新了:漏洞扫描
描述:OSS存储桶的漏洞扫描工具,目前支持阿里云、腾讯云、华为云、aws
URL:https://github.com/bitboy-sys/OSS_scanner
标签:#漏洞扫描
GitHub监控消息提醒!!!
更新了:代码审计
描述:Fenrir零日漏洞挖掘平台 - AI驱动的先进代码审计工具,集成两阶段检测算法、多AI提供商支持、MCP协议和IDE集成
URL:https://github.com/martindewey/Fenrir-ZeroDay-Platform
标签:#代码审计
更新了:代码审计
描述:Fenrir零日漏洞挖掘平台 - AI驱动的先进代码审计工具,集成两阶段检测算法、多AI提供商支持、MCP协议和IDE集成
URL:https://github.com/martindewey/Fenrir-ZeroDay-Platform
标签:#代码审计
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49844 POC
URL:https://github.com/YuanBenSir/CVE-2025-49844_POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49844 POC
URL:https://github.com/YuanBenSir/CVE-2025-49844_POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Node.js deserialization RCE
URL:https://github.com/GVJGUKVK/Node.js-deserialization-RCE
标签:#RCE
更新了:RCE
描述:Node.js deserialization RCE
URL:https://github.com/GVJGUKVK/Node.js-deserialization-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A powerful Redis exploitation tool that leverages CVE-2025-4984
URL:https://github.com/Yuri08loveElaina/CVE-2025-49844
标签:#CVE-2025
更新了:CVE-2025
描述:A powerful Redis exploitation tool that leverages CVE-2025-4984
URL:https://github.com/Yuri08loveElaina/CVE-2025-49844
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Enviroment and Nuclei template to test CVE-2025-32463
URL:https://github.com/ricardomaia/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:Enviroment and Nuclei template to test CVE-2025-32463
URL:https://github.com/ricardomaia/CVE-2025-32463
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:⚠️ Patch CVE-2025-10585 now to fix a critical type-confusion vulnerability in Chrome’s V8 engine, preventing active exploitation in the wild.
URL:https://github.com/samus4vic/CVE-2025-10585-The-Chrome-V8-Zero-Day
标签:#CVE-2025
更新了:CVE-2025
描述:⚠️ Patch CVE-2025-10585 now to fix a critical type-confusion vulnerability in Chrome’s V8 engine, preventing active exploitation in the wild.
URL:https://github.com/samus4vic/CVE-2025-10585-The-Chrome-V8-Zero-Day
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Example Vulnerable application for CVE-2025–57833
URL:https://github.com/ianoboyle/CVE-2025-57833
标签:#CVE-2025
更新了:CVE-2025
描述:Example Vulnerable application for CVE-2025–57833
URL:https://github.com/ianoboyle/CVE-2025-57833
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Exploit for CVE-2025-10353. Unauthenticated File Upload on Melis Platform Framework that leads to RCE
URL:https://github.com/ivansmc00/CVE-2025-10353-POC
标签:#RCE
更新了:RCE
描述:Exploit for CVE-2025-10353. Unauthenticated File Upload on Melis Platform Framework that leads to RCE
URL:https://github.com/ivansmc00/CVE-2025-10353-POC
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-10351. SQL Injection on Melis Platform Framework
URL:https://github.com/ivansmc00/CVE-2025-10351-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-10351. SQL Injection on Melis Platform Framework
URL:https://github.com/ivansmc00/CVE-2025-10351-POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/0xgh057r3c0n/CVE-2025-4334
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/0xgh057r3c0n/CVE-2025-4334
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:This script exploits a 0-day vulnerability (CVE-XXXX-XXXX) in \"Pulse Secure Connect\" devices, allowing remote code execution (RCE) with root permission.
URL:https://github.com/pedromizz/Poc-RCE-PulseSecureConnect
标签:#RCE
更新了:RCE
描述:This script exploits a 0-day vulnerability (CVE-XXXX-XXXX) in \"Pulse Secure Connect\" devices, allowing remote code execution (RCE) with root permission.
URL:https://github.com/pedromizz/Poc-RCE-PulseSecureConnect
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:1Password Families CSV injection RCE repro—vault export lag to multi-user exec
URL:https://github.com/enzo2alive/1password-family-rce-repro
标签:#RCE
更新了:RCE
描述:1Password Families CSV injection RCE repro—vault export lag to multi-user exec
URL:https://github.com/enzo2alive/1password-family-rce-repro
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Writeup and exploit for CVE-2025-22441: Privilege escalation from installed app to SystemUI process on Android due to pass of untrusted ApplicationInfo to LoadedApk
URL:https://github.com/michalbednarski/ResourcePoison
标签:#CVE-2025
更新了:CVE-2025
描述:Writeup and exploit for CVE-2025-22441: Privilege escalation from installed app to SystemUI process on Android due to pass of untrusted ApplicationInfo to LoadedApk
URL:https://github.com/michalbednarski/ResourcePoison
标签:#CVE-2025