GitHub监控消息提醒!!!
更新了:hvv
描述:macOS上的小而美【Fofa、Shodan、Hunter、Zoomeye、Quake网络空间搜索引擎】闪电搜索器;GUI图形化(Mac/Windows)渗透测试信息搜集工具;资产搜集引擎;hw红队工具hvv
URL:https://github.com/Bug-Hunter-X/React-19--Concurrent-Mode-Conflicts-with-useSyncExternalStore-and-Asynchronous-Updates-9hvvn
标签:#hvv
更新了:hvv
描述:macOS上的小而美【Fofa、Shodan、Hunter、Zoomeye、Quake网络空间搜索引擎】闪电搜索器;GUI图形化(Mac/Windows)渗透测试信息搜集工具;资产搜集引擎;hw红队工具hvv
URL:https://github.com/Bug-Hunter-X/React-19--Concurrent-Mode-Conflicts-with-useSyncExternalStore-and-Asynchronous-Updates-9hvvn
标签:#hvv
GitHub
GitHub - Bug-Hunter-X/React-19--Concurrent-Mode-Conflicts-with-useSyncExternalStore-and-Asynchronous-Updates-9hvvn: React 19 Concurrent…
React 19 Concurrent Rendering Issues with External Stores: Unexpected UI updates or silent data corruption in complex components using useSyncExternalStore with legacy code or asynchronous operatio...
GitHub监控消息提醒!!!
更新了:反序列化
描述:Shiro反序列化漏洞综合利用工具
URL:https://github.com/chaos198800/Shiro-fan-xu-lie-hua-lou-dong-zong-he-li-yong-gong-ju
标签:#反序列化
更新了:反序列化
描述:Shiro反序列化漏洞综合利用工具
URL:https://github.com/chaos198800/Shiro-fan-xu-lie-hua-lou-dong-zong-he-li-yong-gong-ju
标签:#反序列化
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof of concept of the CVE-2024-24549, Exploit in Python.
URL:https://github.com/JFOZ1010/CVE-2024-24549
标签:#CVE-2024
更新了:CVE-2024
描述:Proof of concept of the CVE-2024-24549, Exploit in Python.
URL:https://github.com/JFOZ1010/CVE-2024-24549
标签:#CVE-2024
GitHub
GitHub - JFOZ1010/CVE-2024-24549: Proof of concept of the CVE-2024-24549, Exploit in Python.
Proof of concept of the CVE-2024-24549, Exploit in Python. - GitHub - JFOZ1010/CVE-2024-24549: Proof of concept of the CVE-2024-24549, Exploit in Python.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt to replicate the bug in aiohttp that leads to Local File Inclusion (LFI).
URL:https://github.com/Betan423/CVE-2024-23334-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt to replicate the bug in aiohttp that leads to Local File Inclusion (LFI).
URL:https://github.com/Betan423/CVE-2024-23334-PoC
标签:#CVE-2024
GitHub
GitHub - Betan423/CVE-2024-23334-PoC: This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt…
This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt to replicate the bug in aiohttp that leads to Local File Inclusion (LFI). - Betan423/CVE-2024-23334-PoC
GitHub监控消息提醒!!!
更新了:绕过
描述:bypass google play protect with pairipcore,绕过play保护,修复apk,防止闪退。xapk merge to apk;apks to apk;remove sign check.
URL:https://github.com/qyzhaojinxi/bypass_pairipcore
标签:#绕过
更新了:绕过
描述:bypass google play protect with pairipcore,绕过play保护,修复apk,防止闪退。xapk merge to apk;apks to apk;remove sign check.
URL:https://github.com/qyzhaojinxi/bypass_pairipcore
标签:#绕过
GitHub
GitHub - qyzhaojinxi/bypass_pairipcore: bypass pairip, bypass google play protect with pairipcore, bypass google play protect with…
bypass pairip, bypass google play protect with pairipcore, bypass google play protect with warning dialog,绕过play保护,破解谷歌加固,修复apk,防止闪退,移除谷歌保护风险弹窗。xapk merge to apk;apks to apk;remove sign check,unlim...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A simple python noscript to test for CVE-2024-9441.
URL:https://github.com/jk-mayne/CVE-2024-9441-Checker
标签:#CVE-2024
更新了:CVE-2024
描述:A simple python noscript to test for CVE-2024-9441.
URL:https://github.com/jk-mayne/CVE-2024-9441-Checker
标签:#CVE-2024
GitHub
GitHub - jk-mayne/CVE-2024-9441-Checker: A simple python noscript to test for CVE-2024-9441.
A simple python noscript to test for CVE-2024-9441. - GitHub - jk-mayne/CVE-2024-9441-Checker: A simple python noscript to test for CVE-2024-9441.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13
URL:https://github.com/Dit-Developers/CVE-2024-0044-
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13
URL:https://github.com/Dit-Developers/CVE-2024-0044-
标签:#CVE-2024
GitHub
GitHub - Dit-Developers/CVE-2024-0044-: CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions…
CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13 - Dit-Developers/CVE-2024-0044-
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This is an exploit for chemistry Hack the Box machines that automates a \"terminal\" enviornment using CVE-2024-23346
URL:https://github.com/MAWK0235/CVE-2024-23346
标签:#CVE-2024
更新了:CVE-2024
描述:This is an exploit for chemistry Hack the Box machines that automates a \"terminal\" enviornment using CVE-2024-23346
URL:https://github.com/MAWK0235/CVE-2024-23346
标签:#CVE-2024
GitHub
GitHub - MAWK0235/CVE-2024-23346: This is an exploit for CVE-2024-23346 that acts as a "terminal" (tested on chemistry.htb)
This is an exploit for CVE-2024-23346 that acts as a "terminal" (tested on chemistry.htb) - MAWK0235/CVE-2024-23346
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Repository for archiving Cobalt Strike configuration
URL:https://github.com/ncav/ThreatFox_Reporter.py
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Repository for archiving Cobalt Strike configuration
URL:https://github.com/ncav/ThreatFox_Reporter.py
标签:#Cobalt Strike
GitHub
GitHub - ncav/ThreatFox_Reporter.py: This python noscript will query Shodan for product cobalt strike. From those results, the noscript…
This python noscript will query Shodan for product cobalt strike. From those results, the noscript will search ThreatFox ip database for any matches. If there are no matches, the new IP address will be...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Towson University Red Team Kaiju Toolkit for Case Studies 2025
URL:https://github.com/megatop1/CaseStudiesKaiju-2025
标签:#Red Team
更新了:Red Team
描述:Towson University Red Team Kaiju Toolkit for Case Studies 2025
URL:https://github.com/megatop1/CaseStudiesKaiju-2025
标签:#Red Team
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool)
URL:https://github.com/Weijin-wj/XXECheck
标签:#漏洞检测
更新了:漏洞检测
描述:这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool)
URL:https://github.com/Weijin-wj/XXECheck
标签:#漏洞检测
GitHub
GitHub - Weijin-wj/XXECheck: 这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool)
这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool) - Weijin-wj/XXECheck
GitHub监控消息提醒!!!
更新了:webshell
描述:Operation Digital Eye is a targeted cyber-espionage campaign leveraging custom tools such as PHPsert webshells, mimCN utilities and Visual Studio Code tunnels.
URL:https://github.com/sl33pydata/Operation_Digital_Eye
标签:#webshell
更新了:webshell
描述:Operation Digital Eye is a targeted cyber-espionage campaign leveraging custom tools such as PHPsert webshells, mimCN utilities and Visual Studio Code tunnels.
URL:https://github.com/sl33pydata/Operation_Digital_Eye
标签:#webshell
GitHub
GitHub - sl33pydata/Operation_Digital_Eye: Operation Digital Eye is a targeted cyber-espionage campaign leveraging custom tools…
Operation Digital Eye is a targeted cyber-espionage campaign leveraging custom tools such as PHPsert webshells, mimCN utilities and Visual Studio Code tunnels. - GitHub - sl33pydata/Operation_Digi...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
URL:https://github.com/moften/CVE-2024-24926
标签:#CVE-2024
更新了:CVE-2024
描述:Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
URL:https://github.com/moften/CVE-2024-24926
标签:#CVE-2024
GitHub
GitHub - moften/CVE-2024-24926: Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress - moften/CVE-2024-24926
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-55557
URL:https://github.com/partywavesec/CVE-2024-55557
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-55557
URL:https://github.com/partywavesec/CVE-2024-55557
标签:#CVE-2024
GitHub
GitHub - partywavesec/CVE-2024-55557: CVE-2024-55557
CVE-2024-55557. Contribute to partywavesec/CVE-2024-55557 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Palo Alto Networks PAN-OS(CVE-2024-9474) POC
URL:https://github.com/coskper-papa/PAN-OS_CVE-2024-9474
标签:#CVE-2024
更新了:CVE-2024
描述:Palo Alto Networks PAN-OS(CVE-2024-9474) POC
URL:https://github.com/coskper-papa/PAN-OS_CVE-2024-9474
标签:#CVE-2024
GitHub
GitHub - coskper-papa/PAN-OS_CVE-2024-9474: Palo Alto Networks PAN-OS(CVE-2024-9474) POC
Palo Alto Networks PAN-OS(CVE-2024-9474) POC. Contribute to coskper-papa/PAN-OS_CVE-2024-9474 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:An example of a repo that would make use of the CVE-2024-32002
URL:https://github.com/jolibb55/CVE-2024-32002_RCE
标签:#CVE-2024
更新了:CVE-2024
描述:An example of a repo that would make use of the CVE-2024-32002
URL:https://github.com/jolibb55/CVE-2024-32002_RCE
标签:#CVE-2024
GitHub
GitHub - jolibb55/CVE-2024-32002_RCE: Exploit PoC for CVE-2024-32002
Exploit PoC for CVE-2024-32002. Contribute to jolibb55/CVE-2024-32002_RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:钓鱼
描述:开源版三链提币接口/提币钓鱼系统/TG机器人通知/阈值拦截
URL:https://github.com/official-sourcecode/kai_yuan_ban_san_lian_a
标签:#钓鱼
更新了:钓鱼
描述:开源版三链提币接口/提币钓鱼系统/TG机器人通知/阈值拦截
URL:https://github.com/official-sourcecode/kai_yuan_ban_san_lian_a
标签:#钓鱼
GitHub
GitHub - official-sourcecode/kai_yuan_ban_san_lian_a: 开源版三链提币接口/提币钓鱼系统/TG机器人通知/阈值拦截
开源版三链提币接口/提币钓鱼系统/TG机器人通知/阈值拦截. Contribute to official-sourcecode/kai_yuan_ban_san_lian_a development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:An example of a repo that would make use of the CVE-2024-32002
URL:https://github.com/jolibb55/donald
标签:#CVE-2024
更新了:CVE-2024
描述:An example of a repo that would make use of the CVE-2024-32002
URL:https://github.com/jolibb55/donald
标签:#CVE-2024
GitHub
jolibb55/donald
An example of a repo that would make use of the CVE-2024-32002 - jolibb55/donald
GitHub监控消息提醒!!!
更新了:反序列化
描述:Thinkphp5.0.24以及Thinkphp6的最新反序列化可用的poc
URL:https://github.com/0ATKX/Thinkphp-deserialization-POC-summary
标签:#反序列化
更新了:反序列化
描述:Thinkphp5.0.24以及Thinkphp6的最新反序列化可用的poc
URL:https://github.com/0ATKX/Thinkphp-deserialization-POC-summary
标签:#反序列化
GitHub
GitHub - 0ATKX/Thinkphp-deserialization-POC-summary: Thinkphp5.0.24以及Thinkphp6的最新反序列化可用的poc
Thinkphp5.0.24以及Thinkphp6的最新反序列化可用的poc. Contribute to 0ATKX/Thinkphp-deserialization-POC-summary development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:权限维持
描述:Redeemer C2是一款使用Rust编写的平台型C2,旨在滥用可信域名的API平台进行命令控制,用来对抗恶意域名巡查,是一款专注于权限维持的C2工具。
URL:https://github.com/Cherno-x/Redeemer-C2
标签:#权限维持
更新了:权限维持
描述:Redeemer C2是一款使用Rust编写的平台型C2,旨在滥用可信域名的API平台进行命令控制,用来对抗恶意域名巡查,是一款专注于权限维持的C2工具。
URL:https://github.com/Cherno-x/Redeemer-C2
标签:#权限维持
GitHub
GitHub - Cherno-x/Redeemer-C2: Redeemer C2是一款使用Rust编写的平台型C2,旨在滥用可信域名的API平台进行命令控制,用来对抗恶意域名巡查,是一款专注于权限维持的C2工具。
Redeemer C2是一款使用Rust编写的平台型C2,旨在滥用可信域名的API平台进行命令控制,用来对抗恶意域名巡查,是一款专注于权限维持的C2工具。 - Cherno-x/Redeemer-C2