监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Ce dépôt fournit des règles Sigma prêtes pour la production afin de détecter l’exploitation de la vulnérabilité CVE-2025-6218 affectant WinRAR sous Windows.
URL:https://github.com/Hatchepsoute/sigma-rules
标签:#CVE-2025
更新了:CVE-2025
描述:Ce dépôt fournit des règles Sigma prêtes pour la production afin de détecter l’exploitation de la vulnérabilité CVE-2025-6218 affectant WinRAR sous Windows.
URL:https://github.com/Hatchepsoute/sigma-rules
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:反序列化
描述:TonWeb ejb反序列化 gui检测工具 支持内存马注入,cmd回显
URL:https://github.com/hackerxj007/TonWeb-Ejb
标签:#反序列化
更新了:反序列化
描述:TonWeb ejb反序列化 gui检测工具 支持内存马注入,cmd回显
URL:https://github.com/hackerxj007/TonWeb-Ejb
标签:#反序列化
GitHub监控消息提醒!!!
更新了:内存马
描述:一款用于springmvc、springboot的内存马查杀类,快速部署,可视化……
URL:https://github.com/h3ll0yoyo9527-tech/MemShell_Scanner-Killer
标签:#内存马
更新了:内存马
描述:一款用于springmvc、springboot的内存马查杀类,快速部署,可视化……
URL:https://github.com/h3ll0yoyo9527-tech/MemShell_Scanner-Killer
标签:#内存马
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is my own written POC on the xmlrpc-pingback vulnerabiity found on wordpress. CVE-2025-54352. This vulnerability affects wordpress 3.5 all through 6.8.2
URL:https://github.com/crypcky/XML-RPC-Pingback-Vulnerability
标签:#CVE-2025
更新了:CVE-2025
描述:This is my own written POC on the xmlrpc-pingback vulnerabiity found on wordpress. CVE-2025-54352. This vulnerability affects wordpress 3.5 all through 6.8.2
URL:https://github.com/crypcky/XML-RPC-Pingback-Vulnerability
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/cyberleelawat/FreePBX-Multiple-CVEs-2025
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/cyberleelawat/FreePBX-Multiple-CVEs-2025
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65427: Missing rate limiting in Dbit N300 T1 Pro router login API allows brute-force attacks
URL:https://github.com/kirubel-cve/CVE-2025-65427
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65427: Missing rate limiting in Dbit N300 T1 Pro router login API allows brute-force attacks
URL:https://github.com/kirubel-cve/CVE-2025-65427
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:免杀
描述:webshell编码工具 支持 jsp net php asp编码免杀
URL:https://github.com/hackerxj007/Bypass_Webshell
标签:#免杀
更新了:免杀
描述:webshell编码工具 支持 jsp net php asp编码免杀
URL:https://github.com/hackerxj007/Bypass_Webshell
标签:#免杀
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Documentation of CVE-2025-68116
URL:https://github.com/x0root/CVE-2025-68116
标签:#CVE-2025
更新了:CVE-2025
描述:A Documentation of CVE-2025-68116
URL:https://github.com/x0root/CVE-2025-68116
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is a python PoC scripts for CVE-2025-24071 which is a vulnerability in Windows File Explorer that allows unauthorized access to sensitive information like NTLM Exposure.
URL:https://github.com/Abdelrahman0Sayed/CVE-2025-24071
标签:#CVE-2025
更新了:CVE-2025
描述:This is a python PoC scripts for CVE-2025-24071 which is a vulnerability in Windows File Explorer that allows unauthorized access to sensitive information like NTLM Exposure.
URL:https://github.com/Abdelrahman0Sayed/CVE-2025-24071
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Security advisory for CVE-2025-65855
URL:https://github.com/LuisMirandaAcebedo/CVE-2025-65855
标签:#CVE-2025
更新了:CVE-2025
描述:Security advisory for CVE-2025-65855
URL:https://github.com/LuisMirandaAcebedo/CVE-2025-65855
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-12163
URL:https://github.com/SnailSploit/CVE-2025-12163
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-12163
URL:https://github.com/SnailSploit/CVE-2025-12163
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repo contains the scripts you can execute to simulate the (CVE-2025-55182) along with next.js server
URL:https://github.com/premdanav/react2shelldemo
标签:#CVE-2025
更新了:CVE-2025
描述:This repo contains the scripts you can execute to simulate the (CVE-2025-55182) along with next.js server
URL:https://github.com/premdanav/react2shelldemo
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection of CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039
URL:https://github.com/rxerium/FreePBX-Vulns-December-25
标签:#CVE-2025
更新了:CVE-2025
描述:Detection of CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039
URL:https://github.com/rxerium/FreePBX-Vulns-December-25
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Educational web security labs: SQLi, Brute Force, File Upload, RCE
URL:https://github.com/olgacmustafa/web-security-learning
标签:#RCE
更新了:RCE
描述:Educational web security labs: SQLi, Brute Force, File Upload, RCE
URL:https://github.com/olgacmustafa/web-security-learning
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A script for exploiting a vulnerability in PyTorch with subsequent RCE in library versions < 2.6.0
URL:https://github.com/B1tBit/CVE-2025-32434-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:A script for exploiting a vulnerability in PyTorch with subsequent RCE in library versions < 2.6.0
URL:https://github.com/B1tBit/CVE-2025-32434-exploit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-45805
URL:https://github.com/mohammed-alsaqqaf/CVE-2025-45805
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-45805
URL:https://github.com/mohammed-alsaqqaf/CVE-2025-45805
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:绕过
描述:基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit (P2WSH) 机制,将任意数据伪装成标准的区块链地址,从而实现绕过 OP_RETURN 限制的永久数据存证。
URL:https://github.com/Forlingham/ScashDataAddressProtocol
标签:#绕过
更新了:绕过
描述:基于 P2WSH 的无状态 Scash 链上存证协议: Scash-DAP 是一种轻量级、无状态、抗审查的链上数据存储协议。它利用比特币(及 Scash)原生 SegWit (P2WSH) 机制,将任意数据伪装成标准的区块链地址,从而实现绕过 OP_RETURN 限制的永久数据存证。
URL:https://github.com/Forlingham/ScashDataAddressProtocol
标签:#绕过
GitHub监控消息提醒!!!
更新了:Red Team
描述:C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de malwares, axé sur C et C++
URL:https://github.com/VzlRus/C-Cpp_for_Malware_Development
标签:#Red Team
更新了:Red Team
描述:C/C++ for Malware Development est un dépôt de techniques de Red Team ainsi que de malwares, axé sur C et C++
URL:https://github.com/VzlRus/C-Cpp_for_Malware_Development
标签:#Red Team