GitHub监控消息提醒!!!
更新了:RCE
描述:Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server Enabler and gain RCE via xp_cmdshell
URL:https://github.com/omershaik0/SAP-B1-ZedIT-Server-Exploit
标签:#RCE
更新了:RCE
描述:Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server Enabler and gain RCE via xp_cmdshell
URL:https://github.com/omershaik0/SAP-B1-ZedIT-Server-Exploit
标签:#RCE
GitHub
GitHub - omershaik0/SAP-B1-ZedIT-Server-Exploit: Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server…
Python exploit to extract MSSQL credentials from SAP B1 (Business One) ZedIT Server Enabler and gain RCE via xp_cmdshell - omershaik0/SAP-B1-ZedIT-Server-Exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
URL:https://github.com/f4dee-backup/CVE-2025-24071
标签:#CVE-2025
更新了:CVE-2025
描述:Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
URL:https://github.com/f4dee-backup/CVE-2025-24071
标签:#CVE-2025
GitHub
GitHub - f4dee-backup/CVE-2025-24071: Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
Windows File Explorer Spoofing Vulnerability - CVE-2025-24071 - f4dee-backup/CVE-2025-24071
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:poc for the CVE-2025-46173
URL:https://github.com/pruthuraut/CVE-2025-46173
标签:#CVE-2025
更新了:CVE-2025
描述:poc for the CVE-2025-46173
URL:https://github.com/pruthuraut/CVE-2025-46173
标签:#CVE-2025
GitHub
GitHub - pruthuraut/CVE-2025-46173: poc for the CVE-2025-46173
poc for the CVE-2025-46173. Contribute to pruthuraut/CVE-2025-46173 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:攻防
描述:# 北京理工大学软件工程《数据库设计与开发》实验9 网络攻防对抗技术研究所管理系统
URL:https://github.com/xiaobai-cn21/BIT-SoftwareEngineering-DB-Experiment9-NetworkDefenseSystem
标签:#攻防
更新了:攻防
描述:# 北京理工大学软件工程《数据库设计与开发》实验9 网络攻防对抗技术研究所管理系统
URL:https://github.com/xiaobai-cn21/BIT-SoftwareEngineering-DB-Experiment9-NetworkDefenseSystem
标签:#攻防
GitHub
GitHub - xiaobai-cn21/BIT-SoftwareEngineering-DB-Experiment9-NetworkDefenseSystem: # 北京理工大学软件工程《数据库设计与开发》实验9 网络攻防对抗技术研究所管理系统
# 北京理工大学软件工程《数据库设计与开发》实验9 网络攻防对抗技术研究所管理系统 . Contribute to xiaobai-cn21/BIT-SoftwareEngineering-DB-Experiment9-NetworkDefenseSystem development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability. Detects meta refresh, keyword-based redirects, and more.
URL:https://github.com/sagsooz/CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability. Detects meta refresh, keyword-based redirects, and more.
URL:https://github.com/sagsooz/CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - sagsooz/CVE-2025-29927: 🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability.…
🔐 Python-based smart scanner for CVE-2025-29927 — Next.js middleware authentication bypass vulnerability. Detects meta refresh, keyword-based redirects, and more. - sagsooz/CVE-2025-29927
GitHub监控消息提醒!!!
更新了:信息收集
描述:本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。
URL:https://github.com/wang-moo/outsourcing-company
标签:#信息收集
更新了:信息收集
描述:本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。
URL:https://github.com/wang-moo/outsourcing-company
标签:#信息收集
GitHub
GitHub - wang-moo/outsourcing-company: 本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。
本项目仅用于信息收集和技术调研,所有公司名称信息均来自公开渠道,不代表任何立场。. Contribute to wang-moo/outsourcing-company development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071
URL:https://github.com/helidem/CVE-2025-24054_CVE-2025-24071-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071
URL:https://github.com/helidem/CVE-2025-24054_CVE-2025-24071-PoC
标签:#CVE-2025
GitHub
GitHub - helidem/CVE-2025-24054_CVE-2025-24071-PoC: Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE…
Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071 - helidem/CVE-2025-24054_CVE-2025-24071-PoC
GitHub监控消息提醒!!!
更新了:RCE
描述:It a Xworm fix and RCE,Versions 5.6
URL:https://github.com/SoVA48/XWORM-RCE-fix-V5.6
标签:#RCE
更新了:RCE
描述:It a Xworm fix and RCE,Versions 5.6
URL:https://github.com/SoVA48/XWORM-RCE-fix-V5.6
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
URL:https://github.com/Nouvexr/Wing-FTP-Server-7.4.4-RCE-Authenticated
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
URL:https://github.com/Nouvexr/Wing-FTP-Server-7.4.4-RCE-Authenticated
标签:#CVE-2025
GitHub
Unauthenticated Remote Code Execution in Erlang/OTP SSH
### Summary
A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SS...
A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SS...
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE vulnerable simple application for testing purpose
URL:https://github.com/veldrane/app-pinger-vulnerable
标签:#RCE
更新了:RCE
描述:RCE vulnerable simple application for testing purpose
URL:https://github.com/veldrane/app-pinger-vulnerable
标签:#RCE
GitHub
veldrane/app-pinger-vulnerable
RCE vulnerable simple application for testing purpose - veldrane/app-pinger-vulnerable
GitHub监控消息提醒!!!
更新了:渗透测试
描述:基于 Vue + SpringBoot 构建的 Java 安全靶场,一个专为安全爱好者、渗透测试代码审计人员打造的前后端分离的实战演练平台。
URL:https://github.com/Grand38D/Ubuntu_Init
标签:#渗透测试
更新了:渗透测试
描述:基于 Vue + SpringBoot 构建的 Java 安全靶场,一个专为安全爱好者、渗透测试代码审计人员打造的前后端分离的实战演练平台。
URL:https://github.com/Grand38D/Ubuntu_Init
标签:#渗透测试
GitHub
GitHub - Grand38D/Ubuntu_Init: According to the expert's documentation, I wrote a bash noscript to initialize the Ubuntu virtual…
According to the expert's documentation, I wrote a bash noscript to initialize the Ubuntu virtual machine for penetration testing. Applicable to Ubuntu 20.04/22.04 and derived systems 根据大佬的文档...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop
URL:https://github.com/Grand38D/CentOS_init
标签:#渗透测试
更新了:渗透测试
描述:Scoop-Buket for Penetration Suite Toolkit - Windows渗透测试工具仓库For Scoop
URL:https://github.com/Grand38D/CentOS_init
标签:#渗透测试
GitHub
GitHub - Grand38D/CentOS_init: According to the expert's documentation, I wrote a bash noscript to initialize the Ubuntu virtual…
According to the expert's documentation, I wrote a bash noscript to initialize the Ubuntu virtual machine for penetration testing. Applicable to Ubuntu 20.04/22.04 and derived systems 根据大佬的文档...
GitHub监控消息提醒!!!
更新了:RCE
描述:Plugin para dimensionamento de RCE no QGIS
URL:https://github.com/WanderiloLima2025/Sewercalc
标签:#RCE
更新了:RCE
描述:Plugin para dimensionamento de RCE no QGIS
URL:https://github.com/WanderiloLima2025/Sewercalc
标签:#RCE
GitHub
GitHub - WanderiloLima2025/Sewercalc: Plugin para dimensionamento de RCE no QGIS
Plugin para dimensionamento de RCE no QGIS. Contribute to WanderiloLima2025/Sewercalc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Cyber world will be a repository for some remote attack noscripts. RCE attack.
URL:https://github.com/IhebZanina/cyber-word
标签:#RCE
更新了:RCE
描述:Cyber world will be a repository for some remote attack noscripts. RCE attack.
URL:https://github.com/IhebZanina/cyber-word
标签:#RCE
GitHub
GitHub - IhebZanina/cyber-word: Cyber world will be a repository for some remote attack noscripts. RCE attack.
Cyber world will be a repository for some remote attack noscripts. RCE attack. - IhebZanina/cyber-word
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-22252 – Authentication Bypass in Fortinet Products
URL:https://github.com/korden-c/CVE-2025-22252
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-22252 – Authentication Bypass in Fortinet Products
URL:https://github.com/korden-c/CVE-2025-22252
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:POC for CVE-2018-8097 This noscript exploits CVE-2018-8097 and can retrieve files and contents using a blind RCE method.
URL:https://github.com/StellarDriftLabs/CVE-2018-8097
标签:#RCE
更新了:RCE
描述:POC for CVE-2018-8097 This noscript exploits CVE-2018-8097 and can retrieve files and contents using a blind RCE method.
URL:https://github.com/StellarDriftLabs/CVE-2018-8097
标签:#RCE
GitHub
GitHub - StellarDriftLabs/CVE-2018-8097: POC for CVE-2018-8097 This noscript exploits CVE-2018-8097 and can retrieve files and contents…
POC for CVE-2018-8097 This noscript exploits CVE-2018-8097 and can retrieve files and contents using a blind RCE method. - StellarDriftLabs/CVE-2018-8097
GitHub监控消息提醒!!!
更新了:RCE
描述:POC for CVE-2018-8097 This noscript exploits CVE-2018-8097 and can retrieve files and contents using a blind RCE method.
URL:https://github.com/StellarDriftLabs/CVE-2018-8097-PoC
标签:#RCE
更新了:RCE
描述:POC for CVE-2018-8097 This noscript exploits CVE-2018-8097 and can retrieve files and contents using a blind RCE method.
URL:https://github.com/StellarDriftLabs/CVE-2018-8097-PoC
标签:#RCE
GitHub
GitHub - StellarDriftLabs/CVE-2018-8097-PoC: POC for CVE-2018-8097 This noscript exploits CVE-2018-8097 and can retrieve files and…
POC for CVE-2018-8097 This noscript exploits CVE-2018-8097 and can retrieve files and contents using a blind RCE method. - StellarDriftLabs/CVE-2018-8097-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Advanced AI-Powered Exploitation Framework | CVE-2025-4664 & CVE-2025-2783 & CVE-2025-2857 & CVE-2025-30397 |
URL:https://github.com/Leviticus-Triage/ChromSploit-Framework
标签:#CVE-2025
更新了:CVE-2025
描述:Advanced AI-Powered Exploitation Framework | CVE-2025-4664 & CVE-2025-2783 & CVE-2025-2857 & CVE-2025-30397 |
URL:https://github.com/Leviticus-Triage/ChromSploit-Framework
标签:#CVE-2025
GitHub
GitHub - Leviticus-Triage/ChromSploit-Framework: Advanced AI-Powered Exploitation Framework | CVE-2025-4664 & CVE-2025-2783 &…
Advanced AI-Powered Exploitation Framework | CVE-2025-4664 & CVE-2025-2783 & CVE-2025-2857 & CVE-2025-30397 | - GitHub - Leviticus-Triage/ChromSploit-Framework: Advance...