GitHub监控消息提醒!!!
更新了:RCE
描述:Updated exploit for CVE-2021-22911 (Rocket.Chat 3.12.1 - NoSQL Injection to RCE (Unauthenticated))
URL:https://github.com/octodi/CVE-2021-22911
标签:#RCE
更新了:RCE
描述:Updated exploit for CVE-2021-22911 (Rocket.Chat 3.12.1 - NoSQL Injection to RCE (Unauthenticated))
URL:https://github.com/octodi/CVE-2021-22911
标签:#RCE
GitHub
GitHub - octodi/CVE-2021-22911: Updated exploit for CVE-2021-22911 (Rocket.Chat 3.12.1 - NoSQL Injection to RCE (Unauthenticated))
Updated exploit for CVE-2021-22911 (Rocket.Chat 3.12.1 - NoSQL Injection to RCE (Unauthenticated)) - octodi/CVE-2021-22911
GitHub监控消息提醒!!!
更新了:渗透测试
描述:G700RAT 是一款为 Android 设备设计的强大远程管理工具(RAT),专为网络安全研究人员、渗透测试人员和红队专家而开发。该工具仅适用于获得授权的合法环境中,用于测试、研究和演示用途。
URL:https://github.com/g700rats/-G700RAT-
标签:#渗透测试
更新了:渗透测试
描述:G700RAT 是一款为 Android 设备设计的强大远程管理工具(RAT),专为网络安全研究人员、渗透测试人员和红队专家而开发。该工具仅适用于获得授权的合法环境中,用于测试、研究和演示用途。
URL:https://github.com/g700rats/-G700RAT-
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:红蓝对抗
描述:Vue-Attack-Defense-Admin-Master 是一个结合 Wazuh 和 人脸识别验证 技术的 红蓝对抗与网络安全事件监控展示平台。该项目旨在为用户提供一个集成化、安全性高、可视化友好的网络安全管理系统,主要用于支持网络攻防对抗及事件监控场景。
URL:https://github.com/NutMilk0612/vue-attack-defense-admin-master
标签:#红蓝对抗
更新了:红蓝对抗
描述:Vue-Attack-Defense-Admin-Master 是一个结合 Wazuh 和 人脸识别验证 技术的 红蓝对抗与网络安全事件监控展示平台。该项目旨在为用户提供一个集成化、安全性高、可视化友好的网络安全管理系统,主要用于支持网络攻防对抗及事件监控场景。
URL:https://github.com/NutMilk0612/vue-attack-defense-admin-master
标签:#红蓝对抗
GitHub
GitHub - NutMilk0612/vue-attack-defense-admin-master: Vue-Attack-Defense-Admin-Master 是一个结合 Wazuh 和 人脸识别验证 技术的 红蓝对抗与网络安全事件监控展示…
Vue-Attack-Defense-Admin-Master 是一个结合 Wazuh 和 人脸识别验证 技术的 红蓝对抗与网络安全事件监控展示平台。该项目旨在为用户提供一个集成化、安全性高、可视化友好的网络安全管理系统,主要用于支持网络攻防对抗及事件监控场景。 - NutMilk0612/vue-attack-defense-admin-master
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE PSE - Rynkowa Cena Energii for HomeAssistant
URL:https://github.com/Lewa-Reka/ha-rce-pse
标签:#RCE
更新了:RCE
描述:RCE PSE - Rynkowa Cena Energii for HomeAssistant
URL:https://github.com/Lewa-Reka/ha-rce-pse
标签:#RCE
GitHub
GitHub - Lewa-Reka/ha-rce-pse: Rynkowa Cena Energii (RCE) for HomeAssistant - API v2 ready
Rynkowa Cena Energii (RCE) for HomeAssistant - API v2 ready - Lewa-Reka/ha-rce-pse
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-46203
URL:https://github.com/spbavarva/CVE-2025-46203
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-46203
URL:https://github.com/spbavarva/CVE-2025-46203
标签:#CVE-2025
GitHub
GitHub - spbavarva/CVE-2025-46203: PoC of CVE-2025-46203
PoC of CVE-2025-46203. Contribute to spbavarva/CVE-2025-46203 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:vulnerable-nextjs-14-CVE-2025-29927
URL:https://github.com/SugiB3o/vulnerable-nextjs-14-CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:vulnerable-nextjs-14-CVE-2025-29927
URL:https://github.com/SugiB3o/vulnerable-nextjs-14-CVE-2025-29927
标签:#CVE-2025
GitHub
GitHub - SugiB3o/vulnerable-nextjs-14-CVE-2025-29927: vulnerable-nextjs-14-CVE-2025-29927
vulnerable-nextjs-14-CVE-2025-29927. Contribute to SugiB3o/vulnerable-nextjs-14-CVE-2025-29927 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypassav
描述:免杀shellcode加载器
URL:https://github.com/MentalityXt/bypassAV
标签:#bypassav
更新了:bypassav
描述:免杀shellcode加载器
URL:https://github.com/MentalityXt/bypassAV
标签:#bypassav
GitHub
GitHub - MentalityXt/bypassAV: 免杀shellcode加载器
免杀shellcode加载器. Contribute to MentalityXt/bypassAV development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:RustFly v2.0.0- Remote Code Execution (RCE)
URL:https://github.com/capture0x/RustFly-RCE
标签:#RCE
更新了:RCE
描述:RustFly v2.0.0- Remote Code Execution (RCE)
URL:https://github.com/capture0x/RustFly-RCE
标签:#RCE
GitHub
GitHub - capture0x/RustFly-RCE: RustFly v2.0.0- Remote Code Execution (RCE)
RustFly v2.0.0- Remote Code Execution (RCE) . Contribute to capture0x/RustFly-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE in backdrop_CMS using module features.
URL:https://github.com/Goultarde/Backdrop_CMS_1.27.1_RCE
标签:#RCE
更新了:RCE
描述:RCE in backdrop_CMS using module features.
URL:https://github.com/Goultarde/Backdrop_CMS_1.27.1_RCE
标签:#RCE
GitHub
GitHub - Goultarde/Backdrop_CMS_1.27.1_RCE: RCE in backdrop_CMS using module features.
RCE in backdrop_CMS using module features. Contribute to Goultarde/Backdrop_CMS_1.27.1_RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC of CVE-2025-46204
URL:https://github.com/spbavarva/CVE-2025-46204
标签:#CVE-2025
更新了:CVE-2025
描述:PoC of CVE-2025-46204
URL:https://github.com/spbavarva/CVE-2025-46204
标签:#CVE-2025
GitHub
GitHub - spbavarva/CVE-2025-46204: PoC of CVE-2025-46204
PoC of CVE-2025-46204. Contribute to spbavarva/CVE-2025-46204 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-5328 – Path Traversal in chshcms mccms 2.7
URL:https://github.com/voyagken/CVE-2025-5328
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-5328 – Path Traversal in chshcms mccms 2.7
URL:https://github.com/voyagken/CVE-2025-5328
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:ScadaFlare Authenticated RCE Exploit Framework for ScadaBR (CVE-2021-26828) OpenPLC ScadaBR
URL:https://github.com/ridpath/CVE-2021-26828-Ultimate
标签:#RCE
更新了:RCE
描述:ScadaFlare Authenticated RCE Exploit Framework for ScadaBR (CVE-2021-26828) OpenPLC ScadaBR
URL:https://github.com/ridpath/CVE-2021-26828-Ultimate
标签:#RCE
GitHub
GitHub - ridpath/CVE-2021-26828-Ultimate: ScadaFlare Authenticated RCE Exploit Framework for ScadaBR (CVE-2021-26828) OpenPLC ScadaBR
ScadaFlare Authenticated RCE Exploit Framework for ScadaBR (CVE-2021-26828) OpenPLC ScadaBR - GitHub - ridpath/CVE-2021-26828-Ultimate: ScadaFlare Authenticated RCE Exploit Framework for ScadaBR (...
GitHub监控消息提醒!!!
更新了:代码审计
描述:运维管理平台(agent端代码) ,平台是集轻量化、极简操作、高效运维为一体的智能运维平台,具备纳管、监控、巡检、自愈、支持异构网络环境、秒级执行运维作业、多云管理,运维工单、k8s集群管理,webshell,安全审计,堡垒机等功能。
URL:https://github.com/wylok/opsone-dog
标签:#代码审计
更新了:代码审计
描述:运维管理平台(agent端代码) ,平台是集轻量化、极简操作、高效运维为一体的智能运维平台,具备纳管、监控、巡检、自愈、支持异构网络环境、秒级执行运维作业、多云管理,运维工单、k8s集群管理,webshell,安全审计,堡垒机等功能。
URL:https://github.com/wylok/opsone-dog
标签:#代码审计
GitHub监控消息提醒!!!
更新了:RCE
描述:Peyara Remote Mouse v2.0.0- Remote Code Execution (RCE)
URL:https://github.com/capture0x/Peyara
标签:#RCE
更新了:RCE
描述:Peyara Remote Mouse v2.0.0- Remote Code Execution (RCE)
URL:https://github.com/capture0x/Peyara
标签:#RCE
GitHub
GitHub - capture0x/Peyara: Peyara Remote Mouse v1.0.1- Remote Code Execution (RCE)
Peyara Remote Mouse v1.0.1- Remote Code Execution (RCE) - GitHub - capture0x/Peyara: Peyara Remote Mouse v1.0.1- Remote Code Execution (RCE)
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-20188: Unauthenticated RCE in Cisco IOS XE WLC via Hard-Coded JWT
URL:https://github.com/voyagken/CVE-2025-20188
标签:#RCE
更新了:RCE
描述:CVE-2025-20188: Unauthenticated RCE in Cisco IOS XE WLC via Hard-Coded JWT
URL:https://github.com/voyagken/CVE-2025-20188
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
URL:https://github.com/mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
标签:#CVE-2025
更新了:CVE-2025
描述:Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
URL:https://github.com/mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
标签:#CVE-2025
GitHub
GitHub - mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-: Remote Code Execution via Use-After-Free in…
Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397) - mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Vbullettin RCE - CVE-2025-48827
URL:https://github.com/wiseep/CVE-2025-48827
标签:#CVE-2025
更新了:CVE-2025
描述:Vbullettin RCE - CVE-2025-48827
URL:https://github.com/wiseep/CVE-2025-48827
标签:#CVE-2025
GitHub
GitHub - wiseep/CVE-2025-48827: Vbullettin RCE - CVE-2025-48827
Vbullettin RCE - CVE-2025-48827. Contribute to wiseep/CVE-2025-48827 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/adam20222222/PEGASUS-2025
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/adam20222222/PEGASUS-2025
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:SMB RCE 취약점 공격 절차 관련 파일
URL:https://github.com/2025CJUSIEM/smb-rce-attack
标签:#RCE
更新了:RCE
描述:SMB RCE 취약점 공격 절차 관련 파일
URL:https://github.com/2025CJUSIEM/smb-rce-attack
标签:#RCE
GitHub
GitHub - 2025CJUSIEM/smb-rce-attack: SMB RCE 취약점 공격 절차 관련 파일
SMB RCE 취약점 공격 절차 관련 파일. Contribute to 2025CJUSIEM/smb-rce-attack development by creating an account on GitHub.