监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A script for exploiting a vulnerability in PyTorch with subsequent RCE in library versions < 2.6.0
URL:https://github.com/B1tBit/CVE-2025-32434-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:A script for exploiting a vulnerability in PyTorch with subsequent RCE in library versions < 2.6.0
URL:https://github.com/B1tBit/CVE-2025-32434-exploit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-45805
URL:https://github.com/mohammed-alsaqqaf/CVE-2025-45805
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-45805
URL:https://github.com/mohammed-alsaqqaf/CVE-2025-45805
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:绕过
描述:基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit (P2WSH) 机制,将任意数据伪装成标准的区块链地址,从而实现绕过 OP_RETURN 限制的永久数据存证。
URL:https://github.com/Forlingham/ScashDataAddressProtocol
标签:#绕过
更新了:绕过
描述:基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit (P2WSH) 机制,将任意数据伪装成标准的区块链地址,从而实现绕过 OP_RETURN 限制的永久数据存证。
URL:https://github.com/Forlingham/ScashDataAddressProtocol
标签:#绕过
GitHub监控消息提醒!!!
更新了:Red Team
描述:C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de malwares, axé sur C et C++
URL:https://github.com/VzlRus/C-Cpp_for_Malware_Development
标签:#Red Team
更新了:Red Team
描述:C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de malwares, axé sur C et C++
URL:https://github.com/VzlRus/C-Cpp_for_Malware_Development
标签:#Red Team
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:一款现代化的企业级漏洞扫描与资产管理平台 提供自动化安全检测、资产发现、漏洞管理等功能
URL:https://github.com/uf9n1x/ZScan
标签:#漏洞检测
更新了:漏洞检测
描述:一款现代化的企业级漏洞扫描与资产管理平台 提供自动化安全检测、资产发现、漏洞管理等功能
URL:https://github.com/uf9n1x/ZScan
标签:#漏洞检测
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/SoftAndoWetto/CVE-2025-24367-PoC-Cacti
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/SoftAndoWetto/CVE-2025-24367-PoC-Cacti
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal RCE vulnerability affecting versions 7.11 and earlier
URL:https://github.com/Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal RCE vulnerability affecting versions 7.11 and earlier
URL:https://github.com/Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This project provides a **fully functional** demonstration of CVE-2025-55182 (React2Shell) - a critical Remote Code Execution vulnerability in React Server Components and Next.js.
URL:https://github.com/subhdotsol/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:This project provides a **fully functional** demonstration of CVE-2025-55182 (React2Shell) - a critical Remote Code Execution vulnerability in React Server Components and Next.js.
URL:https://github.com/subhdotsol/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-concept exploit demo for CVE-2025-66478 using Node.js
URL:https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-concept exploit demo for CVE-2025-66478 using Node.js
URL:https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:sql注入
描述:chrome的自动化检测sql注入的插件
URL:https://github.com/smallcat9612/chrome-sql-
标签:#sql注入
更新了:sql注入
描述:chrome的自动化检测sql注入的插件
URL:https://github.com/smallcat9612/chrome-sql-
标签:#sql注入
GitHub监控消息提醒!!!
更新了:应急响应
描述:Argus 取名自希腊神话中的\"百眼巨人\" (Argus Panoptes),寓意以永不闭合的眼睛时刻守护系统安全。这是一款专为红蓝对抗、应急响应、威胁狩猎设计的现代化跨平台安全工具,致力于提供更隐蔽、更强大、更智能的威胁检测能力。
URL:https://github.com/25smoking/Argus
标签:#应急响应
更新了:应急响应
描述:Argus 取名自希腊神话中的\"百眼巨人\" (Argus Panoptes),寓意以永不闭合的眼睛时刻守护系统安全。这是一款专为红蓝对抗、应急响应、威胁狩猎设计的现代化跨平台安全工具,致力于提供更隐蔽、更强大、更智能的威胁检测能力。
URL:https://github.com/25smoking/Argus
标签:#应急响应
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/CyberPrince-hub/React2shell-ultimate-scanner
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/CyberPrince-hub/React2shell-ultimate-scanner
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-14174 (EUVD-2025-203113) - Memory corruption in ANGLE
URL:https://github.com/Terrasue/CVE-2025-14174-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-14174 (EUVD-2025-203113) - Memory corruption in ANGLE
URL:https://github.com/Terrasue/CVE-2025-14174-Exploit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Precision-Based Detection of RSC/Next.js Remote Code Execution Vulnerabilities (CVE-2025-55182, CVE-2025-66478)
URL:https://github.com/hidden-investigations/react2shell-scanner
标签:#CVE-2025
更新了:CVE-2025
描述:Precision-Based Detection of RSC/Next.js Remote Code Execution Vulnerabilities (CVE-2025-55182, CVE-2025-66478)
URL:https://github.com/hidden-investigations/react2shell-scanner
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept for CVE-2025-55182, a critical unauthenticated RCE in React Server Components.
URL:https://github.com/VVVI5HNU/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept for CVE-2025-55182, a critical unauthenticated RCE in React Server Components.
URL:https://github.com/VVVI5HNU/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:GIT vulnerability | Carriage Return and RCE on cloning
URL:https://github.com/vignesh21-git/CVE-2025-48384
标签:#RCE
更新了:RCE
描述:GIT vulnerability | Carriage Return and RCE on cloning
URL:https://github.com/vignesh21-git/CVE-2025-48384
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC). It also includes a realistic \"Lab Environment\" to safely test and understand the vulnerability.
URL:https://github.com/BimBoxH4/CVE-2025-66039_CVE-2025-61675_CVE-2025-61678_reePBX
标签:#CVE-2025
更新了:CVE-2025
描述:a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC). It also includes a realistic \"Lab Environment\" to safely test and understand the vulnerability.
URL:https://github.com/BimBoxH4/CVE-2025-66039_CVE-2025-61675_CVE-2025-61678_reePBX
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:💥Extension Tool para Auditoría y Explotación avanzada RCE/Source Leak/Dos (CVE-2025-55182/83/84) para entornos Next.js y React Server Components (RSC) directamente desde tu navegador ❌
URL:https://github.com/MammaniNelsonD/React2P4IM0Nshell
标签:#RCE
更新了:RCE
描述:💥Extension Tool para Auditoría y Explotación avanzada RCE/Source Leak/Dos (CVE-2025-55182/83/84) para entornos Next.js y React Server Components (RSC) directamente desde tu navegador ❌
URL:https://github.com/MammaniNelsonD/React2P4IM0Nshell
标签:#RCE