监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:RCE
描述:Uses CrewAI Multi Agentic System to showcase memory poisoning with RAG workflow for a zero click RCE.
URL:https://github.com/AkhilSharma90/Bsides-Workshop-Demo-Agent-RCE-Zero-Click-Attack
标签:#RCE
更新了:RCE
描述:Uses CrewAI Multi Agentic System to showcase memory poisoning with RAG workflow for a zero click RCE.
URL:https://github.com/AkhilSharma90/Bsides-Workshop-Demo-Agent-RCE-Zero-Click-Attack
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:우리FISA 기술세미나 3팀: React Server Component의 RCE 취약점인 'React2Shell (CVE-2025-55182)' 분석 및 연구
URL:https://github.com/woorifisa-service-dev-6th/tech-seminar-React2Shell
标签:#RCE
更新了:RCE
描述:우리FISA 기술세미나 3팀: React Server Component의 RCE 취약점인 'React2Shell (CVE-2025-55182)' 분석 및 연구
URL:https://github.com/woorifisa-service-dev-6th/tech-seminar-React2Shell
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:OSCP-style penetration test walkthrough of the VulnHub DC-1 machine (Drupal 7 → RCE → root).
URL:https://github.com/Nevtech05/DC-1_VulnHub.com_WriteUp
标签:#RCE
更新了:RCE
描述:OSCP-style penetration test walkthrough of the VulnHub DC-1 machine (Drupal 7 → RCE → root).
URL:https://github.com/Nevtech05/DC-1_VulnHub.com_WriteUp
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:A high-performance C++ Web Application Firewall (WAF) protecting against SQLi, XSS, and RCE.
URL:https://github.com/Asttr0/SentiLight
标签:#RCE
更新了:RCE
描述:A high-performance C++ Web Application Firewall (WAF) protecting against SQLi, XSS, and RCE.
URL:https://github.com/Asttr0/SentiLight
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Elias966/edex-ui-fixed
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Elias966/edex-ui-fixed
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Validating DNS Exfiltration and Python Pickle RCE Attack Chains in AI Code Execution Sandboxes
URL:https://github.com/SnailSploit/chatgpt-rce-dns
标签:#RCE
更新了:RCE
描述:Validating DNS Exfiltration and Python Pickle RCE Attack Chains in AI Code Execution Sandboxes
URL:https://github.com/SnailSploit/chatgpt-rce-dns
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Advanced WordPress vulnerability scanner targeting 30+ critical RCE vulnerabilities (2019-2025). Supports both single-target and mass scanning with multi-threading.
URL:https://github.com/xKRD/WP-RCE
标签:#RCE
更新了:RCE
描述:Advanced WordPress vulnerability scanner targeting 30+ critical RCE vulnerabilities (2019-2025). Supports both single-target and mass scanning with multi-threading.
URL:https://github.com/xKRD/WP-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Laravel < 8.4.2 RCE exploit
URL:https://github.com/crypt0lith/laravel-rce
标签:#RCE
更新了:RCE
描述:Laravel < 8.4.2 RCE exploit
URL:https://github.com/crypt0lith/laravel-rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE).
URL:https://github.com/ii4gsp/CVE-2026-1457-TP-Link-VIGI-C385-Authenticated-Remote-Code-Execution
标签:#RCE
更新了:RCE
描述:CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE).
URL:https://github.com/ii4gsp/CVE-2026-1457-TP-Link-VIGI-C385-Authenticated-Remote-Code-Execution
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Heap technique that bypasses modern glibc protections via UAF-write and safe-unlinking to write libc addresses into tcache, enabling stdout FILE structure overlap for leak and RCE.
URL:https://github.com/4f3rg4n/House-of-Eggs
标签:#RCE
更新了:RCE
描述:Heap technique that bypasses modern glibc protections via UAF-write and safe-unlinking to write libc addresses into tcache, enabling stdout FILE structure overlap for leak and RCE.
URL:https://github.com/4f3rg4n/House-of-Eggs
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Python-based firewall simulation blocking a Tomcat WAR/JSP RCE attack (Telstra Cyber Virtual Experience – Forage)
URL:https://github.com/sec-a-ops/telstra-cyber-firewall-simulation
标签:#RCE
更新了:RCE
描述:Python-based firewall simulation blocking a Tomcat WAR/JSP RCE attack (Telstra Cyber Virtual Experience – Forage)
URL:https://github.com/sec-a-ops/telstra-cyber-firewall-simulation
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Advanced heuristic anti-malware for FiveM. Detects and neutralizes Blum Panel, Cipher and undocumented RCE exploits. Enterprise grade infrastructure defense.
URL:https://github.com/gabjeksuper/Fivem-Anti-Backdoor
标签:#RCE
更新了:RCE
描述:Advanced heuristic anti-malware for FiveM. Detects and neutralizes Blum Panel, Cipher and undocumented RCE exploits. Enterprise grade infrastructure defense.
URL:https://github.com/gabjeksuper/Fivem-Anti-Backdoor
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2026-24061 Telnet RCE Exploit For Linux MacOS Windows
URL:https://github.com/0x7556/CVE-2026-24061
标签:#RCE
更新了:RCE
描述:CVE-2026-24061 Telnet RCE Exploit For Linux MacOS Windows
URL:https://github.com/0x7556/CVE-2026-24061
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:AI Agent to provide information about the prices of the electricity (RCE) and weather forecast for the upcoming day which will allow user to plan respective actions.
URL:https://github.com/TomaszPaslawski/SmartEnergyAgent_PL
标签:#RCE
更新了:RCE
描述:AI Agent to provide information about the prices of the electricity (RCE) and weather forecast for the upcoming day which will allow user to plan respective actions.
URL:https://github.com/TomaszPaslawski/SmartEnergyAgent_PL
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:在 Web 应用程序中,文件上传功能如果未对上传文件的后缀名、MIME 类型及内容进行严格校验,攻击者可以上传恶意的脚本文件(如 PHP、ASP、JSP 等)。一旦这些脚本被服务器解析并执行,攻击者即可获得服务器的远程执行代码(RCE)权限,从而控制服务器。
URL:https://github.com/dien-x/Fileupload_vul
标签:#RCE
更新了:RCE
描述:在 Web 应用程序中,文件上传功能如果未对上传文件的后缀名、MIME 类型及内容进行严格校验,攻击者可以上传恶意的脚本文件(如 PHP、ASP、JSP 等)。一旦这些脚本被服务器解析并执行,攻击者即可获得服务器的远程执行代码(RCE)权限,从而控制服务器。
URL:https://github.com/dien-x/Fileupload_vul
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:在 Web 应用程序中,文件上传功能如果未对上传文件的后缀名、MIME 类型及内容进行严格校验,攻击者可以上传恶意的脚本文件(如 PHP、ASP、JSP 等)。一旦这些脚本被服务器解析并执行,攻击者即可获得服务器的远程执行代码(RCE)权限,从而控制服务器。
URL:https://github.com/1766377729-lang/Fileupload_vul
标签:#RCE
更新了:RCE
描述:在 Web 应用程序中,文件上传功能如果未对上传文件的后缀名、MIME 类型及内容进行严格校验,攻击者可以上传恶意的脚本文件(如 PHP、ASP、JSP 等)。一旦这些脚本被服务器解析并执行,攻击者即可获得服务器的远程执行代码(RCE)权限,从而控制服务器。
URL:https://github.com/1766377729-lang/Fileupload_vul
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC Dawn Client v2 RCE
URL:https://github.com/bodeneinheit/dawn-v2-rce
标签:#RCE
更新了:RCE
描述:PoC Dawn Client v2 RCE
URL:https://github.com/bodeneinheit/dawn-v2-rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Demonstration of escalating Local File Inclusion (LFI) to Remote Code Execution (RCE) using log poisoning.
URL:https://github.com/VVVI5HNU/LFI-RCE-log-poisoning
标签:#RCE
更新了:RCE
描述:Demonstration of escalating Local File Inclusion (LFI) to Remote Code Execution (RCE) using log poisoning.
URL:https://github.com/VVVI5HNU/LFI-RCE-log-poisoning
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:This repo contains RCE exploit for Imagery htb machine
URL:https://github.com/symphony2colour/htb-imagery-rce-poc
标签:#RCE
更新了:RCE
描述:This repo contains RCE exploit for Imagery htb machine
URL:https://github.com/symphony2colour/htb-imagery-rce-poc
标签:#RCE