GitHub监控消息提醒!!!
更新了:渗透测试
描述:KaliLinux渗透测试实战资源下载
URL:https://github.com/chaos198800/KaliLinux-shen-tou-ce-shi-shi-zhan-zi-yuan-xia-zai
标签:#渗透测试
更新了:渗透测试
描述:KaliLinux渗透测试实战资源下载
URL:https://github.com/chaos198800/KaliLinux-shen-tou-ce-shi-shi-zhan-zi-yuan-xia-zai
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:代码注入
描述:JCore致力于提供C语言最实用的数据结构、工具、算法。目前已提供一个内存调试工具,采用代码注入的方法,无需重新编译原始程序,即可调试它的内存问题。
URL:https://github.com/David-Lolly/TinyAISearch
标签:#代码注入
更新了:代码注入
描述:JCore致力于提供C语言最实用的数据结构、工具、算法。目前已提供一个内存调试工具,采用代码注入的方法,无需重新编译原始程序,即可调试它的内存问题。
URL:https://github.com/David-Lolly/TinyAISearch
标签:#代码注入
GitHub
GitHub - David-Lolly/TinyAISearch: TinyAISearch 是一个面向大模型爱好者的轻量级 AI 搜索项目,涵盖关键词重写、网页爬取、内容召回、以及流式回答展示的完整流程。RAG 模块集成了多种召回策略(相似度召回、BM25…
TinyAISearch 是一个面向大模型爱好者的轻量级 AI 搜索项目,涵盖关键词重写、网页爬取、内容召回、以及流式回答展示的完整流程。RAG 模块集成了多种召回策略(相似度召回、BM25 重排序、多问题召回等),用户可灵活选择,深入理解不同策略的优劣。 项目支持多种主流大模型(如 Qwen、GLM、DeepSeek、OpenAI 等)及本地 Ollama 模型,代码有详细注释,便于学习...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:CISP-PTE渗透测试资源下载
URL:https://github.com/chaos198800/CISP-PTE-shen-tou-ce-shi-zi-yuan-xia-zai
标签:#渗透测试
更新了:渗透测试
描述:CISP-PTE渗透测试资源下载
URL:https://github.com/chaos198800/CISP-PTE-shen-tou-ce-shi-zi-yuan-xia-zai
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:RCE
描述:Umbraco CMS 7.12.4 - RCE POC/ Reverse Shell
URL:https://github.com/water2001-hub/Umbraco-CMS-7.12.4---RCE-POC-Reverse-Shell
标签:#RCE
更新了:RCE
描述:Umbraco CMS 7.12.4 - RCE POC/ Reverse Shell
URL:https://github.com/water2001-hub/Umbraco-CMS-7.12.4---RCE-POC-Reverse-Shell
标签:#RCE
GitHub
GitHub - water2001-hub/Umbraco-CMS-7.12.4-RCE-PoC---ReverseShell: Umbraco CMS 7.12.4 - RCE PoC/ Reverse Shell
Umbraco CMS 7.12.4 - RCE PoC/ Reverse Shell. Contribute to water2001-hub/Umbraco-CMS-7.12.4-RCE-PoC---ReverseShell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:红蓝对抗
描述:红蓝对抗兵力部署游戏Qt大作业
URL:https://github.com/chaos198800/hong-lan-dui-kang-bing-li-bu-shu-you-xi-Qt-da-zuo-ye
标签:#红蓝对抗
更新了:红蓝对抗
描述:红蓝对抗兵力部署游戏Qt大作业
URL:https://github.com/chaos198800/hong-lan-dui-kang-bing-li-bu-shu-you-xi-Qt-da-zuo-ye
标签:#红蓝对抗
GitHub监控消息提醒!!!
更新了:RCE
描述:Umbraco CMS 7.12.4 - RCE PoC/ Reverse Shell
URL:https://github.com/water2001-hub/Umbraco-CMS-7.12.4-RCE-PoC---ReverseShell
标签:#RCE
更新了:RCE
描述:Umbraco CMS 7.12.4 - RCE PoC/ Reverse Shell
URL:https://github.com/water2001-hub/Umbraco-CMS-7.12.4-RCE-PoC---ReverseShell
标签:#RCE
GitHub
GitHub - water2001-hub/Umbraco-CMS-7.12.4-RCE-PoC---ReverseShell: Umbraco CMS 7.12.4 - RCE PoC/ Reverse Shell
Umbraco CMS 7.12.4 - RCE PoC/ Reverse Shell. Contribute to water2001-hub/Umbraco-CMS-7.12.4-RCE-PoC---ReverseShell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Econmic analysis, using pyhton and SQL queries, of the default risk from each of the partners from the recent RCEP (Regional Comprehensive Economic Partnership) trade deal, from Asia-Pacific.
URL:https://github.com/Alva789ro/RCEP-Economic-Risk-Analysis
标签:#RCE
更新了:RCE
描述:Econmic analysis, using pyhton and SQL queries, of the default risk from each of the partners from the recent RCEP (Regional Comprehensive Economic Partnership) trade deal, from Asia-Pacific.
URL:https://github.com/Alva789ro/RCEP-Economic-Risk-Analysis
标签:#RCE
GitHub
GitHub - Alva789ro/RCEP-Economic-Risk-Analysis: Econmic analysis, using pyhton and SQL queries, of the default risk from each of…
Econmic analysis, using pyhton and SQL queries, of the default risk from each of the partners from the recent RCEP (Regional Comprehensive Economic Partnership) trade deal, from Asia-Pacific. - Alv...
GitHub监控消息提醒!!!
更新了:RCE
描述:Exploit For: CVE-2024-42845: Remote Code Execution (RCE) in Invesalius 3.1
URL:https://github.com/theexploiters/CVE-2024-42845-Exploit
标签:#RCE
更新了:RCE
描述:Exploit For: CVE-2024-42845: Remote Code Execution (RCE) in Invesalius 3.1
URL:https://github.com/theexploiters/CVE-2024-42845-Exploit
标签:#RCE
GitHub
GitHub - theexploiters/CVE-2024-42845-Exploit: Exploit For: CVE-2024-42845: Remote Code Execution (RCE) in Invesalius 3.1
Exploit For: CVE-2024-42845: Remote Code Execution (RCE) in Invesalius 3.1 - theexploiters/CVE-2024-42845-Exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Safely detect if an Ivanti server is vulnerable to CVE-2025-0282
URL:https://github.com/BishopFox/CVE-2025-0282-check
标签:#CVE-2025
更新了:CVE-2025
描述:Safely detect if an Ivanti server is vulnerable to CVE-2025-0282
URL:https://github.com/BishopFox/CVE-2025-0282-check
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.
URL:https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.
URL:https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit
标签:#CVE-2025
GitHub
GitHub - absholi7ly/CVE-2025-0282-Ivanti-exploit: CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing…
CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit. - absholi7ly/CVE-2025-0282-Ivanti-exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:# CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS]
URL:https://github.com/anonzoli/CVE-2025-0282-Full-version
标签:#CVE-2025
更新了:CVE-2025
描述:# CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS]
URL:https://github.com/anonzoli/CVE-2025-0282-Full-version
标签:#CVE-2025
GitHub
GitHub - AnonStorks/CVE-2025-0282-Full-version: # CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS]
# CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS] - AnonStorks/CVE-2025-0282-Full-version
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:# CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS]
URL:https://github.com/AnonStorks/CVE-2025-0282-Full-version
标签:#CVE-2025
更新了:CVE-2025
描述:# CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS]
URL:https://github.com/AnonStorks/CVE-2025-0282-Full-version
标签:#CVE-2025
GitHub
GitHub - AnonStorks/CVE-2025-0282-Full-version: # CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS]
# CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS] - AnonStorks/CVE-2025-0282-Full-version
GitHub监控消息提醒!!!
更新了:绕过
描述:(hook)绕过 Stay 安全机制!许可证检查和其他授权功能,激活。
URL:https://github.com/ItzNotJorz/cursor-free-vip
标签:#绕过
更新了:绕过
描述:(hook)绕过 Stay 安全机制!许可证检查和其他授权功能,激活。
URL:https://github.com/ItzNotJorz/cursor-free-vip
标签:#绕过
GitHub监控消息提醒!!!
更新了:RCE
描述:This project is a simple web crawler and web security scanner that identifies vulnerabilities such as SQLi, XSS, CSRF, SSRF, LFI, and RCE on a given set of URLs.
URL:https://github.com/Nikhil-Pachpande/web-crawler
标签:#RCE
更新了:RCE
描述:This project is a simple web crawler and web security scanner that identifies vulnerabilities such as SQLi, XSS, CSRF, SSRF, LFI, and RCE on a given set of URLs.
URL:https://github.com/Nikhil-Pachpande/web-crawler
标签:#RCE
GitHub
GitHub - Nikhil-Pachpande/web-crawler: This project is a simple web crawler and web security scanner that identifies vulnerabilities…
This project is a simple web crawler and web security scanner that identifies vulnerabilities such as SQLi, XSS, CSRF, SSRF, LFI, and RCE on a given set of URLs. - Nikhil-Pachpande/web-crawler
GitHub监控消息提醒!!!
更新了:RCE
描述:Getting RCE (Remote Code Execution) for LimeSurvey version 6.6.4.
URL:https://github.com/N4s1rl1/Limesurvey-6.6.4-RCE
标签:#RCE
更新了:RCE
描述:Getting RCE (Remote Code Execution) for LimeSurvey version 6.6.4.
URL:https://github.com/N4s1rl1/Limesurvey-6.6.4-RCE
标签:#RCE