监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:深信服CVE-2025-12916远程命令执行漏洞批量检测工具
URL:https://github.com/Jinxia62/CVE-2025-
标签:#CVE-2025
更新了:CVE-2025
描述:深信服CVE-2025-12916远程命令执行漏洞批量检测工具
URL:https://github.com/Jinxia62/CVE-2025-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Security research tool for detecting and testing CVE-2025-64446 (FortiWeb Path Traversal RCE vulnerability)
URL:https://github.com/AN5I/cve-2025-64446-fortiweb-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Security research tool for detecting and testing CVE-2025-64446 (FortiWeb Path Traversal RCE vulnerability)
URL:https://github.com/AN5I/cve-2025-64446-fortiweb-exploit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Security research tool for detecting and testing CVE-2025-63888 (ThinkPHP 5.0.24 File Inclusion RCE vulnerability)
URL:https://github.com/AN5I/cve-2025-63888-exploit
标签:#RCE
更新了:RCE
描述:Security research tool for detecting and testing CVE-2025-63888 (ThinkPHP 5.0.24 File Inclusion RCE vulnerability)
URL:https://github.com/AN5I/cve-2025-63888-exploit
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Fully automated LFI → File Upload → RCE chain exploit
URL:https://github.com/mylo-2001/PhantomChain
标签:#RCE
更新了:RCE
描述:Fully automated LFI → File Upload → RCE chain exploit
URL:https://github.com/mylo-2001/PhantomChain
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Security research tool for detecting and testing CVE-2025-12735 (expr-eval RCE vulnerability)
URL:https://github.com/alnashawatirohwederb2167-max/cve-2025-12735-expr-eval-rce
标签:#CVE-2025
更新了:CVE-2025
描述:Security research tool for detecting and testing CVE-2025-12735 (expr-eval RCE vulnerability)
URL:https://github.com/alnashawatirohwederb2167-max/cve-2025-12735-expr-eval-rce
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Fully automated Spring4Shell (CVE-2022-22965) + GitLab RCE framework
URL:https://github.com/mylo-2001/GhostStrike
标签:#RCE
更新了:RCE
描述:Fully automated Spring4Shell (CVE-2022-22965) + GitLab RCE framework
URL:https://github.com/mylo-2001/GhostStrike
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59501 POC code
URL:https://github.com/garrettfoster13/CVE-2025-59501
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59501 POC code
URL:https://github.com/garrettfoster13/CVE-2025-59501
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:绕过
描述:针对于梆梆企业加固,libDexHelper.so检测frida的绕过
URL:https://github.com/Varuo-s/libDexHelper
标签:#绕过
更新了:绕过
描述:针对于梆梆企业加固,libDexHelper.so检测frida的绕过
URL:https://github.com/Varuo-s/libDexHelper
标签:#绕过
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE, XSS, Security Awareness Test Samples
URL:https://github.com/DaUfooo/RCE-XSS-Testscripte
标签:#RCE
更新了:RCE
描述:RCE, XSS, Security Awareness Test Samples
URL:https://github.com/DaUfooo/RCE-XSS-Testscripte
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-7892
URL:https://github.com/FlyingLemonade/CVE-2025-7892-Proof-of-Concept-Login-Form
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-7892
URL:https://github.com/FlyingLemonade/CVE-2025-7892-Proof-of-Concept-Login-Form
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:wip for CVE-2025-23247 . ATM just crash PoC which shows we control buffer and offset, so we got aaw
URL:https://github.com/SpiralBL0CK/CVE-2025-23247
标签:#CVE-2025
更新了:CVE-2025
描述:wip for CVE-2025-23247 . ATM just crash PoC which shows we control buffer and offset, so we got aaw
URL:https://github.com/SpiralBL0CK/CVE-2025-23247
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:红蓝对抗
描述:红蓝对抗-红队靶场-1
URL:https://github.com/cheesehaobuhao/NetworkPenetration
标签:#红蓝对抗
更新了:红蓝对抗
描述:红蓝对抗-红队靶场-1
URL:https://github.com/cheesehaobuhao/NetworkPenetration
标签:#红蓝对抗
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-63499
URL:https://github.com/xryptoh/CVE-2025-63499
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-63499
URL:https://github.com/xryptoh/CVE-2025-63499
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-61757
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-61757
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-61757
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-61757
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Repository with tools, exploits, and material associated with the analysis and discovery process of CVE-2025-31702 and other related security issues.
URL:https://github.com/purpleghosts/CVE-2025-31702
标签:#CVE-2025
更新了:CVE-2025
描述:Repository with tools, exploits, and material associated with the analysis and discovery process of CVE-2025-31702 and other related security issues.
URL:https://github.com/purpleghosts/CVE-2025-31702
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:蓝队
描述:蓝队工具,一款小白都能用的Windows溯源Tools,支持AI一键分析
URL:https://github.com/Am1azi3ng/WinTracePro
标签:#蓝队
更新了:蓝队
描述:蓝队工具,一款小白都能用的Windows溯源Tools,支持AI一键分析
URL:https://github.com/Am1azi3ng/WinTracePro
标签:#蓝队
GitHub监控消息提醒!!!
更新了:内存马
描述:一款专注于 Java 主流 Web 中间件的内存马快速生成工具,致力于简化安全研究人员和红队成员的工作流程,提升攻防效率
URL:https://github.com/SKY-9527RustMinerSystem/SKY9527pool-RustMinerSystem
标签:#内存马
更新了:内存马
描述:一款专注于 Java 主流 Web 中间件的内存马快速生成工具,致力于简化安全研究人员和红队成员的工作流程,提升攻防效率
URL:https://github.com/SKY-9527RustMinerSystem/SKY9527pool-RustMinerSystem
标签:#内存马
GitHub监控消息提醒!!!
更新了:RCE
描述:The Shenxingzhe gateway of Changsha Tongxun Computer Technology Co., Ltd. has an unauthorized remote code execution (RCE) vulnerability
URL:https://github.com/yingfff123/Shenxingzhegateway-remote-code-execution-RCE
标签:#RCE
更新了:RCE
描述:The Shenxingzhe gateway of Changsha Tongxun Computer Technology Co., Ltd. has an unauthorized remote code execution (RCE) vulnerability
URL:https://github.com/yingfff123/Shenxingzhegateway-remote-code-execution-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:FortiWeb Remote Code Execution (RCE) Exploit via CVE-2025-64446 + CVE-2025-58034 Chai
URL:https://github.com/lincemorado97/CVE-2025-64446_CVE-2025-58034
标签:#RCE
更新了:RCE
描述:FortiWeb Remote Code Execution (RCE) Exploit via CVE-2025-64446 + CVE-2025-58034 Chai
URL:https://github.com/lincemorado97/CVE-2025-64446_CVE-2025-58034
标签:#RCE