GitHub监控消息提醒!!!
更新了:CVE-2025
描述:EDNS Client Subnet (ECS) Remote Detection Tool - CVE-2025-40766
URL:https://github.com/FurkanKAYAPINAR/ecs_checker
标签:#CVE-2025
更新了:CVE-2025
描述:EDNS Client Subnet (ECS) Remote Detection Tool - CVE-2025-40766
URL:https://github.com/FurkanKAYAPINAR/ecs_checker
标签:#CVE-2025
GitHub
GitHub - FurkanKAYAPINAR/ecs_checker: EDNS Client Subnet (ECS) Remote Detection Tool - CVE-2025-40766
EDNS Client Subnet (ECS) Remote Detection Tool - CVE-2025-40766 - FurkanKAYAPINAR/ecs_checker
GitHub监控消息提醒!!!
更新了:渗透测试
描述:ShadowShell 是一个高度模块化的Shell生成器,专为渗透测试和安全研究设计。该工具提供了加密的反向Shell客户端生成功能,具有高级混淆和反检测特性。
URL:https://github.com/sysfox/ShadowShell
标签:#渗透测试
更新了:渗透测试
描述:ShadowShell 是一个高度模块化的Shell生成器,专为渗透测试和安全研究设计。该工具提供了加密的反向Shell客户端生成功能,具有高级混淆和反检测特性。
URL:https://github.com/sysfox/ShadowShell
标签:#渗透测试
GitHub
GitHub - sysfox/ShadowShell: ShadowShell 是一个高度模块化的Shell生成器,专为渗透测试和安全研究设计。该工具提供了加密的反向Shell客户端生成功能,具有高级混淆和反检测特性。
ShadowShell 是一个高度模块化的Shell生成器,专为渗透测试和安全研究设计。该工具提供了加密的反向Shell客户端生成功能,具有高级混淆和反检测特性。 - sysfox/ShadowShell
GitHub监控消息提醒!!!
更新了:信息收集
描述:Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。
URL:https://github.com/Hyperia-CN/Recoin
标签:#信息收集
更新了:信息收集
描述:Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。
URL:https://github.com/Hyperia-CN/Recoin
标签:#信息收集
GitHub
GitHub - 0xHyperia/Recoin: Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。
Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。 - 0xHyperia/Recoin
GitHub监控消息提醒!!!
更新了:信息收集
描述:Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。
URL:https://github.com/0xHyperia/Recoin
标签:#信息收集
更新了:信息收集
描述:Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。
URL:https://github.com/0xHyperia/Recoin
标签:#信息收集
GitHub
GitHub - 0xHyperia/Recoin: Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。
Recoin 是一个红队协同资产侦察与情报收集平台,支持内网扫描、指纹识别、多节点协作,专注于前期信息收集阶段。 - 0xHyperia/Recoin
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE PoC for Tensorflow using a malicious Lambda layer
URL:https://github.com/Splinter0/tensorflow-rce
标签:#RCE
更新了:RCE
描述:RCE PoC for Tensorflow using a malicious Lambda layer
URL:https://github.com/Splinter0/tensorflow-rce
标签:#RCE
GitHub
GitHub - Splinter0/tensorflow-rce: RCE PoC for Tensorflow using a malicious Lambda layer
RCE PoC for Tensorflow using a malicious Lambda layer - Splinter0/tensorflow-rce
GitHub监控消息提醒!!!
更新了:护网
描述:客家文化展示与遗产保护网站(Hakka Culture Archive)
URL:https://github.com/YF1190124114/THEHakkas
标签:#护网
更新了:护网
描述:客家文化展示与遗产保护网站(Hakka Culture Archive)
URL:https://github.com/YF1190124114/THEHakkas
标签:#护网
GitHub
GitHub - YF1190124114/THEHakkas: 客家文化展示与遗产保护网站(Hakka Culture Archive)
客家文化展示与遗产保护网站(Hakka Culture Archive). Contribute to YF1190124114/THEHakkas development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。
URL:https://github.com/y4ney/CVE-2025-32463-lab
标签:#CVE-2025
更新了:CVE-2025
描述:本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。
URL:https://github.com/y4ney/CVE-2025-32463-lab
标签:#CVE-2025
GitHub
GitHub - y4ney/CVE-2025-32463-lab: 本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。
本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。 - y4ney/CVE-2025-32463-lab
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit scripts for CVE-2025-27581
URL:https://github.com/Henryisnotavailable/CVE-2025-27581
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit scripts for CVE-2025-27581
URL:https://github.com/Henryisnotavailable/CVE-2025-27581
标签:#CVE-2025
GitHub
GitHub - Henryisnotavailable/CVE-2025-27581: Exploit scripts for CVE-2025-27581
Exploit scripts for CVE-2025-27581. Contribute to Henryisnotavailable/CVE-2025-27581 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-6018
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-6018
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-6018
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-6018
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-6018: CVE-2025-6018
CVE-2025-6018. Contribute to Ashwesker/Blackash-CVE-2025-6018 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike UDRL for memory scanner evasion.
URL:https://github.com/frknaykc/Dragon-ThreatResearchHQ
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike UDRL for memory scanner evasion.
URL:https://github.com/frknaykc/Dragon-ThreatResearchHQ
标签:#Cobalt Strike
GitHub
GitHub - frknaykc/Dragon-ThreatResearchHQ: A comprehensive repository for malware analysis and threat intelligence, including Cobalt…
A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs, Suricata rules, and malware samples to support cybersecurit...
GitHub监控消息提醒!!!
更新了:红队
描述:使用cursor开发的基于任务驱动的全自动化红队打点和扫描工具,也可用于企业安全风险自查。
URL:https://github.com/handbye/Tscan
标签:#红队
更新了:红队
描述:使用cursor开发的基于任务驱动的全自动化红队打点和扫描工具,也可用于企业安全风险自查。
URL:https://github.com/handbye/Tscan
标签:#红队
GitHub
GitHub - handbye/Tscan: 使用cursor开发的基于任务驱动的全自动化红队打点和扫描工具,也可用于企业安全风险自查。
使用cursor开发的基于任务驱动的全自动化红队打点和扫描工具,也可用于企业安全风险自查。. Contribute to handbye/Tscan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public advisory for CVE-2025-50341 in Axelor
URL:https://github.com/millad7/Axelor-vulnerability-CVE-2025-50341
标签:#CVE-2025
更新了:CVE-2025
描述:Public advisory for CVE-2025-50341 in Axelor
URL:https://github.com/millad7/Axelor-vulnerability-CVE-2025-50341
标签:#CVE-2025
GitHub
GitHub - millad7/Axelor-vulnerability-CVE-2025-50341: Public advisory for CVE-2025-50341 in Axelor
Public advisory for CVE-2025-50341 in Axelor. Contribute to millad7/Axelor-vulnerability-CVE-2025-50341 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Advanced XML External Entity (XXE) Exploitation: File Disclosure, Blind OOB Exfiltration, and Remote Code Execution (RCE) via Misconfigured XML Parsers.
URL:https://github.com/ramyardaneshgar/XML-External-Entity-XXE-Exploitation
标签:#RCE
更新了:RCE
描述:Advanced XML External Entity (XXE) Exploitation: File Disclosure, Blind OOB Exfiltration, and Remote Code Execution (RCE) via Misconfigured XML Parsers.
URL:https://github.com/ramyardaneshgar/XML-External-Entity-XXE-Exploitation
标签:#RCE
GitHub
GitHub - ramyardaneshgar/XML-External-Entity-XXE-Exploitation: Advanced XML External Entity (XXE) Exploitation: File Disclosure…
Advanced XML External Entity (XXE) Exploitation: File Disclosure, Blind OOB Exfiltration, and Remote Code Execution (RCE) via Misconfigured XML Parsers. - ramyardaneshgar/XML-External-Entity-XXE-Ex...
GitHub监控消息提醒!!!
更新了:RCE
描述:SQL Injections - exploitation and mitigation techniques like enumeration, UNION injections, file reading/writing, and RCE for offensive security.
URL:https://github.com/ramyardaneshgar/SQLInjection
标签:#RCE
更新了:RCE
描述:SQL Injections - exploitation and mitigation techniques like enumeration, UNION injections, file reading/writing, and RCE for offensive security.
URL:https://github.com/ramyardaneshgar/SQLInjection
标签:#RCE
GitHub
GitHub - ramyardaneshgar/SQLInjection: SQL Injections - exploitation and mitigation techniques like enumeration, UNION injections…
SQL Injections - exploitation and mitigation techniques like enumeration, UNION injections, file reading/writing, and RCE for offensive security. - ramyardaneshgar/SQLInjection
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Stored XSS in a CMS platform leads to remote code execution (CVE-2025-50754)
URL:https://github.com/furk4nyildiz/CVE-2025-50754-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Stored XSS in a CMS platform leads to remote code execution (CVE-2025-50754)
URL:https://github.com/furk4nyildiz/CVE-2025-50754-PoC
标签:#CVE-2025
GitHub
GitHub - furk4nyildiz/CVE-2025-50754-PoC: Stored XSS in a CMS platform leads to remote code execution (CVE-2025-50754)
Stored XSS in a CMS platform leads to remote code execution (CVE-2025-50754) - furk4nyildiz/CVE-2025-50754-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:a C exploit for CVE-2025-27591, which allow an attacker to escalate privilege to root.
URL:https://github.com/Cythonic1/CVE-2025-27591
标签:#CVE-2025
更新了:CVE-2025
描述:a C exploit for CVE-2025-27591, which allow an attacker to escalate privilege to root.
URL:https://github.com/Cythonic1/CVE-2025-27591
标签:#CVE-2025
GitHub
GitHub - Cythonic1/CVE-2025-27591: a C exploit for CVE-2025-27591, which allow an attacker to escalate privilege to root.
a C exploit for CVE-2025-27591, which allow an attacker to escalate privilege to root. - Cythonic1/CVE-2025-27591
GitHub监控消息提醒!!!
更新了:绕过
描述:通过模拟鼠标和其他技巧,来绕过网站的反机器人检测,从而批量获取数据。 Through simulating mouse movements and other techniques to bypass websites' bot detection systems and scrape data in bulk.
URL:https://github.com/Yanagisawa2002/StimulativeMouseForData
标签:#绕过
更新了:绕过
描述:通过模拟鼠标和其他技巧,来绕过网站的反机器人检测,从而批量获取数据。 Through simulating mouse movements and other techniques to bypass websites' bot detection systems and scrape data in bulk.
URL:https://github.com/Yanagisawa2002/StimulativeMouseForData
标签:#绕过
GitHub
GitHub - Yanagisawa2002/StimulativeMouseForData: 通过模拟鼠标和其他技巧,来绕过网站的反机器人检测,从而批量获取数据。 Through simulating mouse movements and other…
通过模拟鼠标和其他技巧,来绕过网站的反机器人检测,从而批量获取数据。 Through simulating mouse movements and other techniques to bypass websites' bot detection systems and scrape data in bulk. - Yanagisawa2002/StimulativeMo...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Custom aggressor scripts en modules voor Cobalt Strike red team operations.
URL:https://github.com/neosecurity-nl/cobalt-extensions
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Custom aggressor scripts en modules voor Cobalt Strike red team operations.
URL:https://github.com/neosecurity-nl/cobalt-extensions
标签:#Cobalt Strike
GitHub
GitHub - neosecurity-nl/cobalt-extensions: Custom aggressor scripts en modules voor Cobalt Strike red team operations.
Custom aggressor scripts en modules voor Cobalt Strike red team operations. - neosecurity-nl/cobalt-extensions