unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
devsec23/CVE-2024-27956
CVE-2024-27956 - WP Automatic SQL Injection Exploit Tool
Create: 2025-05-01 22:39:10 +0000 UTC Push: 2025-05-01 22:39:11 +0000 UTC |
ibrahimsql/CVE-2025-31161
CVE-2025-31161, a critical authentication bypass vulnerability in CrushFTP WebInterface. This tool allows security researchers to scan for vulnerable instances and verify the security posture of CrushFTP servers.
Create: 2025-05-01 21:57:50 +0000 UTC Push: 2025-05-01 21:58:46 +0000 UTC |
S4mma3l/CVE-2025-24054
Create: 2025-05-01 21:57:19 +0000 UTC Push: 2025-05-01 21:57:23 +0000 UTC |
Onapsis/Onapsis-Mandiant-CVE-2025-31324-Vuln-Compromise-Assessment
CVE-2025-31324 vulnerability and compromise assessment tool
Create: 2025-05-01 18:44:20 +0000 UTC Push: 2025-05-02 13:11:04 +0000 UTC |
ace-83/CVE-2023-40355
Create: 2025-05-01 17:16:56 +0000 UTC Push: 2025-05-01 17:16:56 +0000 UTC |
Caztemaz/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.
Create: 2025-05-01 16:35:56 +0000 UTC Push: 2025-05-01 16:39:37 +0000 UTC |
Caztemaz/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk
Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.
Create: 2025-05-01 16:35:56 +0000 UTC Push: 2025-05-01 16:38:26 +0000 UTC |
Geinasz/CMD-Exploit-CVE-2024-RCE-AboRady-FUD-25765-Injection
Exploit development uses tools like exploitation frameworks and CVE databases. Cmd exploits, such as cmd fud or cmd exploit, enable silent execution while avoiding detection through proper setups.
Create: 2025-05-01 15:01:47 +0000 UTC Push: 2025-05-01 15:03:04 +0000 UTC |
Yuweixn/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Create: 2025-05-01 13:54:52 +0000 UTC Push: 2025-05-01 13:55:48 +0000 UTC |
JadeByteZen/CVE-2024-31317-PoC-Deployer
Create: 2025-05-01 11:41:51 +0000 UTC Push: 2025-05-01 11:41:51 +0000 UTC |
schoi1337/cve-2025-20029-simulation
Create: 2025-05-01 05:47:47 +0000 UTC Push: 2025-05-01 05:47:48 +0000 UTC |
schoi1337/Replayable_attack_simulation_CVE-2025-20029
Create: 2025-05-01 05:46:42 +0000 UTC Push: 2025-05-01 05:46:42 +0000 UTC |
static-web-apps-testing-org/swa2025050103pcbwbrwd5cve2tgkopc6fw
swa2025050103pcbwbrwd5cve2tgkopc6fw
Create: 2025-05-01 03:18:10 +0000 UTC Push: 2025-05-01 03:18:26 +0000 UTC |
JonathanStross/CVE-2025-31324
Create: 2025-04-30 22:31:53 +0000 UTC Push: 2025-04-30 22:31:54 +0000 UTC |
cyruscostini/CVE-2025-42599
Create: 2025-04-30 22:24:35 +0000 UTC Push: 2025-04-30 22:24:35 +0000 UTC |
Totunm/CVE-2025-30392
Create: 2025-04-30 21:56:52 +0000 UTC Push: 2025-04-30 21:56:52 +0000 UTC |
static-web-apps-testing-org/swa2025043021lsualzl6qe1cvegsx3juul
swa2025043021lsualzl6qe1cvegsx3juul
Create: 2025-04-30 21:10:51 +0000 UTC Push: 2025-04-30 21:11:04 +0000 UTC |
moften/CVE-2025-24271
Vulnerabilidad en AirPlay expone información sensible en dispositivos Apple
Create: 2025-04-30 19:59:56 +0000 UTC Push: 2025-04-30 19:59:56 +0000 UTC |
Nxploited/CVE-2025-39538
WordPress WP-Advanced-Search <= 3.3.9.3 - Arbitrary File Upload Vulnerability
Create: 2025-04-30 17:28:33 +0000 UTC Push: 2025-04-30 17:28:33 +0000 UTC |
yen5004/CVE-2024-40635_POC
Proof of Concept code for proving CVE-2024-40635 vulnerability
Create: 2025-04-30 16:22:09 +0000 UTC Push: 2025-04-30 16:22:53 +0000 UTC |
Previous
104
105
106
107
108
109
110
111
Next