GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Este noscript verifica la vulnerabilidad CVE-2025-29927 en servidores Next.js, probando múltiples cargas en la cabecera x-middleware-subrequest para detectar accesos no autorizados.
URL:https://github.com/aleongx/CVE-2025-29927_Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:Este noscript verifica la vulnerabilidad CVE-2025-29927 en servidores Next.js, probando múltiples cargas en la cabecera x-middleware-subrequest para detectar accesos no autorizados.
URL:https://github.com/aleongx/CVE-2025-29927_Scanner
标签:#CVE-2025
GitHub
GitHub - aleongx/CVE-2025-29927_Scanner: Este noscript verifica la vulnerabilidad CVE-2025-29927 en servidores Next.js, probando…
Este noscript verifica la vulnerabilidad CVE-2025-29927 en servidores Next.js, probando múltiples cargas en la cabecera x-middleware-subrequest para detectar accesos no autorizados. - aleongx/CVE-202...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:最新的CVE-2025-30208的poc(这个仓库主要拿来写刷src的一些个人思路技巧,自己写的或者搜集挖src的bypass-waf的脚本)
URL:https://github.com/LiChaser/CVE-2025-30208
标签:#CVE-2025
更新了:CVE-2025
描述:最新的CVE-2025-30208的poc(这个仓库主要拿来写刷src的一些个人思路技巧,自己写的或者搜集挖src的bypass-waf的脚本)
URL:https://github.com/LiChaser/CVE-2025-30208
标签:#CVE-2025
GitHub
GitHub - LiChaser/-src-: 这个仓库主要拿来写实战src的一些自己写的bypass-waf的脚本以及搜集的干货博主
这个仓库主要拿来写实战src的一些自己写的bypass-waf的脚本以及搜集的干货博主. Contribute to LiChaser/-src- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:最新的CVE-2025-30208的poc(这个仓库主要拿来写刷src的一些个人思路技巧,自己写的或者搜集挖src的bypass-waf的脚本)
URL:https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps
标签:#CVE-2025
更新了:CVE-2025
描述:最新的CVE-2025-30208的poc(这个仓库主要拿来写刷src的一些个人思路技巧,自己写的或者搜集挖src的bypass-waf的脚本)
URL:https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps
标签:#CVE-2025
GitHub
GitHub - Esonhugh/ingressNightmare-CVE-2025-1974-exps: IngressNightmare POC. world first non-blind remote execution exploitation…
IngressNightmare POC. world first non-blind remote execution exploitation with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - ...
👍1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)
URL:https://github.com/ThemeHackers/CVE-2025-24071
标签:#CVE-2025
更新了:CVE-2025
描述:Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)
URL:https://github.com/ThemeHackers/CVE-2025-24071
标签:#CVE-2025
GitHub
GitHub - ThemeHackers/CVE-2025-24071: Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)
Windows File Explorer Spoofing Vulnerability (CVE-2025-24071) - ThemeHackers/CVE-2025-24071
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:how to hack 90% of next.js created websites with CVE-2025-29927 vulnerability exploit
URL:https://github.com/Nekicj/CVE-2025-29927-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:how to hack 90% of next.js created websites with CVE-2025-29927 vulnerability exploit
URL:https://github.com/Nekicj/CVE-2025-29927-exploit
标签:#CVE-2025
GitHub
GitHub - Nekicj/CVE-2025-29927-exploit: next.js CVE-2025-29927 vulnerability exploit
next.js CVE-2025-29927 vulnerability exploit . Contribute to Nekicj/CVE-2025-29927-exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:加密app渗透测试包,用于brida和frida练习hook逆向技术的安卓apk源码。尝试暴破出加密密码并进行登录即可通关。自动加解密。Brida+burpsuite联动(自动加解密APP请求参数)演示视频在我的Bilibili。
URL:https://github.com/zangcc/Encrypted_demo_App
标签:#渗透测试
更新了:渗透测试
描述:加密app渗透测试包,用于brida和frida练习hook逆向技术的安卓apk源码。尝试暴破出加密密码并进行登录即可通关。自动加解密。Brida+burpsuite联动(自动加解密APP请求参数)演示视频在我的Bilibili。
URL:https://github.com/zangcc/Encrypted_demo_App
标签:#渗透测试
GitHub
GitHub - zangcc/Encrypted_demo_App: 加密app渗透测试包,用于brida和frida练习hook逆向技术的安卓apk源码。尝试暴破出加密密码并进行登录即可通关。自动加解密。Brida+burpsuite联动(自动加解…
加密app渗透测试包,用于brida和frida练习hook逆向技术的安卓apk源码。尝试暴破出加密密码并进行登录即可通关。自动加解密。Brida+burpsuite联动(自动加解密APP请求参数)演示视频在我的Bilibili。 - zangcc/Encrypted_demo_App
GitHub监控消息提醒!!!
更新了:RCE
描述:EMQX Dashboard Malicious Plugin leading to RCE
URL:https://github.com/ricardojoserf/emqx-RCE
标签:#RCE
更新了:RCE
描述:EMQX Dashboard Malicious Plugin leading to RCE
URL:https://github.com/ricardojoserf/emqx-RCE
标签:#RCE
GitHub
GitHub - ricardojoserf/emqx-RCE: EMQX Dashboard Malicious Plugin leading to RCE
EMQX Dashboard Malicious Plugin leading to RCE. Contribute to ricardojoserf/emqx-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/On1onss/CVE-2025-30208-LFI
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/On1onss/CVE-2025-30208-LFI
标签:#CVE-2025
GitHub
GitHub - On1onss/CVE-2025-30208-LFI: This exploit is for educational and ethical security testing purposes only. The use of this…
This exploit is for educational and ethical security testing purposes only. The use of this exploit against targets without prior mutual consent is illegal, and the developer disclaims any liabilit...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29927에 대한 설명 및 리서치
URL:https://github.com/KaztoRay/CVE-2025-29927-Research
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29927에 대한 설명 및 리서치
URL:https://github.com/KaztoRay/CVE-2025-29927-Research
标签:#CVE-2025
GitHub
GitHub - KaztoRay/CVE-2025-29927-Research: CVE-2025-29927에 대한 설명 및 리서치
CVE-2025-29927에 대한 설명 및 리서치. Contribute to KaztoRay/CVE-2025-29927-Research development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A PoC of the exploit noscript for the vulnerability of Vite @fs/ Path Traversal in transformMiddleware (CVE-2025-30208)
URL:https://github.com/4xura/CVE-2025-30108
标签:#CVE-2025
更新了:CVE-2025
描述:A PoC of the exploit noscript for the vulnerability of Vite @fs/ Path Traversal in transformMiddleware (CVE-2025-30208)
URL:https://github.com/4xura/CVE-2025-30108
标签:#CVE-2025
GitHub
GitHub - 4xura/CVE-2025-30108: A PoC of the exploit noscript for the Arbitrary File Read vulnerability of Vite /@fs/ Path Traversal…
A PoC of the exploit noscript for the Arbitrary File Read vulnerability of Vite /@fs/ Path Traversal in the transformMiddleware (CVE-2025-30208). - GitHub - 4xura/CVE-2025-30108: A PoC of the exploi...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:python noscript for evaluate if you are vulnerable or not to next.js CVE-2025-29927
URL:https://github.com/nocomp/CVE-2025-29927-scanner
标签:#CVE-2025
更新了:CVE-2025
描述:python noscript for evaluate if you are vulnerable or not to next.js CVE-2025-29927
URL:https://github.com/nocomp/CVE-2025-29927-scanner
标签:#CVE-2025
GitHub
GitHub - nocomp/CVE-2025-29927-scanner: python noscript for evaluate if you are vulnerable or not to next.js CVE-2025-29927
python noscript for evaluate if you are vulnerable or not to next.js CVE-2025-29927 - nocomp/CVE-2025-29927-scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A PoC of CVE-2025-24071, A windows vulnerabilitie that allow send NTMLv2 hashes
URL:https://github.com/Marcejr117/CVE-2025-24071_PoC
标签:#CVE-2025
更新了:CVE-2025
描述:A PoC of CVE-2025-24071, A windows vulnerabilitie that allow send NTMLv2 hashes
URL:https://github.com/Marcejr117/CVE-2025-24071_PoC
标签:#CVE-2025
GitHub
GitHub - Marcejr117/CVE-2025-24071_PoC: A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2…
A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes - Marcejr117/CVE-2025-24071_PoC
GitHub监控消息提醒!!!
更新了:RCE
描述:PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteam
URL:https://github.com/fabulouscounc/CVE-2024-4577-PHP-RCE
标签:#RCE
更新了:RCE
描述:PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteam
URL:https://github.com/fabulouscounc/CVE-2024-4577-PHP-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:IngressNightmare (CVE-2025-1974)
URL:https://github.com/tuladhar/ingress-nightmare
标签:#CVE-2025
更新了:CVE-2025
描述:IngressNightmare (CVE-2025-1974)
URL:https://github.com/tuladhar/ingress-nightmare
标签:#CVE-2025
GitHub
GitHub - tuladhar/ingress-nightmare: IngressNightmare (CVE-2025-1974)
IngressNightmare (CVE-2025-1974). Contribute to tuladhar/ingress-nightmare development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A Remote Code Execution (RCE) vulnerability in the Social Warfare plugin for WordPress, affecting versions below 3.5.3.
URL:https://github.com/echoosso/CVE-2019-9978
标签:#RCE
更新了:RCE
描述:A Remote Code Execution (RCE) vulnerability in the Social Warfare plugin for WordPress, affecting versions below 3.5.3.
URL:https://github.com/echoosso/CVE-2019-9978
标签:#RCE
GitHub
GitHub - echoosso/CVE-2019-9978: A Remote Code Execution (RCE) vulnerability in the Social Warfare plugin for WordPress, affecting…
A Remote Code Execution (RCE) vulnerability in the Social Warfare plugin for WordPress, affecting versions below 3.5.3. - echoosso/CVE-2019-9978
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A safe CTF challenge demonstrating CVE-2025-21298 using RTF and OLE objects.
URL:https://github.com/Denyningbow/rtf-ctf-cve-2025-21298
标签:#CVE-2025
更新了:CVE-2025
描述:A safe CTF challenge demonstrating CVE-2025-21298 using RTF and OLE objects.
URL:https://github.com/Denyningbow/rtf-ctf-cve-2025-21298
标签:#CVE-2025
GitHub
GitHub - Denyningbow/rtf-ctf-cve-2025-21298: A safe CTF challenge demonstrating CVE-2025-21298 using RTF and OLE objects.
A safe CTF challenge demonstrating CVE-2025-21298 using RTF and OLE objects. - Denyningbow/rtf-ctf-cve-2025-21298
GitHub监控消息提醒!!!
更新了:应急响应
描述:网络安全等级保护各种检查、加固、应急响应脚本
URL:https://github.com/lulu-lucky-66/Smart-warehousing
标签:#应急响应
更新了:应急响应
描述:网络安全等级保护各种检查、加固、应急响应脚本
URL:https://github.com/lulu-lucky-66/Smart-warehousing
标签:#应急响应
GitHub
lulu-lucky-66/Smart-warehousing
存储模块:使用128Mbit SPI Flash(W25Q128),通过硬件SPI接口实现快速读写与掉电保护,存储历史数据、报警记录和配置参数。 网络通信:集成ESP12F WiFi模块,支持MQTT协议与阿里云物联网平台交互,实时传输环境数据并接收远程控制指令,同时具备本地AP模式作为应急通信方案。 环境监测: DHT11传感器采集温湿度,单总线协议传输。 MQ2传感器检测烟雾及可燃气体,...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29927: Next.js Middleware Exploit
URL:https://github.com/0x0Luk/0xMiddleware
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29927: Next.js Middleware Exploit
URL:https://github.com/0x0Luk/0xMiddleware
标签:#CVE-2025
GitHub
GitHub - 0x0Luk/0xMiddleware: CVE-2025-29927: Next.js Middleware Exploit
CVE-2025-29927: Next.js Middleware Exploit. Contribute to 0x0Luk/0xMiddleware development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-30208 | Vite脚本
URL:https://github.com/sadhfdw129/CVE-2025-30208-Vite
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-30208 | Vite脚本
URL:https://github.com/sadhfdw129/CVE-2025-30208-Vite
标签:#CVE-2025
GitHub
GitHub - sadhfdw129/CVE-2025-30208-Vite: CVE-2025-30208 | Vite脚本
CVE-2025-30208 | Vite脚本. Contribute to sadhfdw129/CVE-2025-30208-Vite development by creating an account on GitHub.