Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
#

0day

Here are 139 public repositories matching this topic...

K8tools

K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)

  • UpdatedJan 25, 2025
  • PowerShell

Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...

  • UpdatedJul 12, 2024
  • Go

面向网络安全从业者的知识文库🍃 (停止更新)

  • UpdatedNov 8, 2023

开源、轻量、快速、跨平台 的网站漏洞扫描工具,帮助您快速检测网站安全隐患。功能 端口扫描(port scan) 指纹识别(fingerprint) 漏洞检测(nday check) 智能爆破 (admin brute) 敏感文件扫描(file fuzz)

  • UpdatedOct 10, 2023
  • Go

【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。

  • UpdatedFeb 26, 2023
  • Python

Repository for information about 0-days exploited in-the-wild.

  • UpdatedSep 17, 2025
  • HTML

CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit

  • UpdatedOct 11, 2023
  • HTML

CVE-2023-38831 winrar exploit generator

  • UpdatedNov 26, 2023
  • Python

Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0day vulnerability in machines of many vendors

  • UpdatedMay 13, 2022
  • C

0day安全_软件漏洞分析技术

  • UpdatedMar 7, 2018
  • C

Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.

  • UpdatedOct 10, 2025

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield

  • UpdatedAug 10, 2025
  • Python

iOS gamed exploit (fixed in 15.0.2)

  • UpdatedOct 12, 2021
  • Objective-C

Bypassing disabled exec functions in PHP (c) CRLF

  • UpdatedOct 2, 2020
  • PHP

spring-cloud / spring-cloud-function,spring.cloud.function.routing-expression,RCE,0day,0-day,POC,EXP,CVE-2022-22963

  • UpdatedMar 5, 2023

APT38 Tactic PoC for Stealing 0days from security researchers

  • UpdatedMay 30, 2025
  • C++

"AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS

  • UpdatedSep 30, 2025
  • PowerShell

Improve this page

Add a description, image, and links to the0day topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the0day topic, visit your repo's landing page and select "manage topics."

Learn more


[8]ページ先頭

©2009-2025 Movatter.jp