GitHub监控消息提醒!!!
更新了:权限维持
描述:这个工具实现了您提到的所有Windows权限维持技术,包括IFEO镜像劫持、启动项后门、WMI无文件后门、进程注入、DLL劫持、影子用户等。代码结构清晰,文档完整,适合用于安全研究和教育目的。
URL:https://github.com/Maikefee/Windows-Persistence-Tool
标签:#权限维持
更新了:权限维持
描述:这个工具实现了您提到的所有Windows权限维持技术,包括IFEO镜像劫持、启动项后门、WMI无文件后门、进程注入、DLL劫持、影子用户等。代码结构清晰,文档完整,适合用于安全研究和教育目的。
URL:https://github.com/Maikefee/Windows-Persistence-Tool
标签:#权限维持
GitHub
GitHub - Maikefee/Windows-Persistence-Tool: 这个工具实现了您提到的所有Windows权限维持技术,包括IFEO镜像劫持、启动项后门、WMI无文件后门、进程注入、DLL劫持、影子用户等。代码结构清晰,文档完整,适合用于安全研究和教育目的。
这个工具实现了您提到的所有Windows权限维持技术,包括IFEO镜像劫持、启动项后门、WMI无文件后门、进程注入、DLL劫持、影子用户等。代码结构清晰,文档完整,适合用于安全研究和教育目的。 - Maikefee/Windows-Persistence-Tool
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Rshell是一款开源的golang编写的支持多平台的C2框架,旨在帮助安服人员渗透测试、红蓝对抗。
URL:https://github.com/YD-233/test
标签:#渗透测试
更新了:渗透测试
描述:Rshell是一款开源的golang编写的支持多平台的C2框架,旨在帮助安服人员渗透测试、红蓝对抗。
URL:https://github.com/YD-233/test
标签:#渗透测试
GitHub
GitHub - YD-233/test: Rshell是一款开源的golang编写的支持多平台的C2框架,旨在帮助安服人员渗透测试、红蓝对抗。
Rshell是一款开源的golang编写的支持多平台的C2框架,旨在帮助安服人员渗透测试、红蓝对抗。 - YD-233/test
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一键启动的专业渗透测试套件,支持Windows、macOS、Linux跨平台使用
URL:https://github.com/Hedysx/PentestMaster
标签:#渗透测试
更新了:渗透测试
描述:一键启动的专业渗透测试套件,支持Windows、macOS、Linux跨平台使用
URL:https://github.com/Hedysx/PentestMaster
标签:#渗透测试
GitHub
GitHub - Hedysx/PentestMaster: 一键启动的专业渗透测试套件,支持Windows、macOS、Linux跨平台使用
一键启动的专业渗透测试套件,支持Windows、macOS、Linux跨平台使用. Contribute to Hedysx/PentestMaster development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:🚀 AI-Powered Red Team & Pentest Toolkit | 赋能红队与渗透测试的 AI 工具集
URL:https://github.com/Conan924/AIPentestKit
标签:#渗透测试
更新了:渗透测试
描述:🚀 AI-Powered Red Team & Pentest Toolkit | 赋能红队与渗透测试的 AI 工具集
URL:https://github.com/Conan924/AIPentestKit
标签:#渗透测试
GitHub
GitHub - Conan924/AIPentestKit: 🚀 AI-Powered Red Team & Pentest Toolkit | 赋能红队与渗透测试的 AI 工具集
🚀 AI-Powered Red Team & Pentest Toolkit | 赋能红队与渗透测试的 AI 工具集 - Conan924/AIPentestKit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-5777: Citrix NetScaler Memory Disclosure (CitrixBleed 2)
URL:https://github.com/ndr-repo/CVE-2025-5777
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-5777: Citrix NetScaler Memory Disclosure (CitrixBleed 2)
URL:https://github.com/ndr-repo/CVE-2025-5777
标签:#CVE-2025
GitHub
GitHub - ndr-repo/CVE-2025-5777: Exploit for CVE-2025-5777: Citrix NetScaler Memory Disclosure (CitrixBleed 2)
Exploit for CVE-2025-5777: Citrix NetScaler Memory Disclosure (CitrixBleed 2) - ndr-repo/CVE-2025-5777
GitHub监控消息提醒!!!
更新了:RCE
描述:Simulation of an IP fragmentation attack to bypass intermediate security systems and exploit a RCE-vulnerable UDP server.
URL:https://github.com/egeharputluu/ip_fragmentation_attack_to_rce_vulnerable_server_simulation
标签:#RCE
更新了:RCE
描述:Simulation of an IP fragmentation attack to bypass intermediate security systems and exploit a RCE-vulnerable UDP server.
URL:https://github.com/egeharputluu/ip_fragmentation_attack_to_rce_vulnerable_server_simulation
标签:#RCE
GitHub
GitHub - egeharputluu/ip_fragmentation_attack_to_rce_vulnerable_server_simulation: Simulation of an IP fragmentation attack to…
Simulation of an IP fragmentation attack to bypass intermediate security systems and exploit a RCE-vulnerable UDP server. - egeharputluu/ip_fragmentation_attack_to_rce_vulnerable_server_simulation
GitHub监控消息提醒!!!
更新了:反序列化
描述:用于序列化和反序列化《脑叶公司》存档的命令行工具
URL:https://github.com/SOgz12Z3Ce/LobotomyCorpSaveManager
标签:#反序列化
更新了:反序列化
描述:用于序列化和反序列化《脑叶公司》存档的命令行工具
URL:https://github.com/SOgz12Z3Ce/LobotomyCorpSaveManager
标签:#反序列化
GitHub
GitHub - SOgz12Z3Ce/LobotomyCorpSaveManager: 用于序列化和反序列化《脑叶公司》存档的命令行工具
用于序列化和反序列化《脑叶公司》存档的命令行工具. Contribute to SOgz12Z3Ce/LobotomyCorpSaveManager development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Robust Cobalt Strike shellcode loader with multiple advanced evasion features
URL:https://github.com/sweetpotatohack/AKUMA-BeaconGen
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Robust Cobalt Strike shellcode loader with multiple advanced evasion features
URL:https://github.com/sweetpotatohack/AKUMA-BeaconGen
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:RCE
描述:Simple PHP Backdoor with RCE
URL:https://github.com/agt0lger/simple-php-backdockered
标签:#RCE
更新了:RCE
描述:Simple PHP Backdoor with RCE
URL:https://github.com/agt0lger/simple-php-backdockered
标签:#RCE
GitHub
GitHub - agt0lger/simple-php-backdockered: Simple PHP Backdoor with RCE
Simple PHP Backdoor with RCE. Contribute to agt0lger/simple-php-backdockered development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Simple PHP Backdoor with RCE
URL:https://github.com/SyedGhufranRaza/CVE-2018-7600-Remote-Code-Execution
标签:#RCE
更新了:RCE
描述:Simple PHP Backdoor with RCE
URL:https://github.com/SyedGhufranRaza/CVE-2018-7600-Remote-Code-Execution
标签:#RCE
GitHub
GitHub - SyedGhufranRaza/CVE-2018-7600-Remote-Code-Execution: This repository showcases a fully self-developed Proof-of-Concept…
This repository showcases a fully self-developed Proof-of-Concept (PoC) for CVE-2018-7600, widely known as Drupalgeddon 2. This critical vulnerability in Drupal 7 and 8 core enables remote code exe...
GitHub监控消息提醒!!!
更新了:RCE
描述:2025 RCEC Internship Summer Project Code and Related Files
URL:https://github.com/rebeccajhuwin99/2025rcecIntern
标签:#RCE
更新了:RCE
描述:2025 RCEC Internship Summer Project Code and Related Files
URL:https://github.com/rebeccajhuwin99/2025rcecIntern
标签:#RCE
GitHub
GitHub - rebeccajhuwin99/2025rcecIntern: 2025 RCEC Internship Summer Project Code and Related Files
2025 RCEC Internship Summer Project Code and Related Files - rebeccajhuwin99/2025rcecIntern
GitHub监控消息提醒!!!
更新了:信息收集
描述:一款面向SRC漏洞挖掘中,页面信息收集场景的浏览器扩展,自动收集页面及相关资源中的敏感信息与可疑线索,支持基础扫描、深度递归扫描、批量 API 测试及结果导出与自定义正则配置
URL:https://github.com/Team-intN18-SoybeanSeclab/Phantom
标签:#信息收集
更新了:信息收集
描述:一款面向SRC漏洞挖掘中,页面信息收集场景的浏览器扩展,自动收集页面及相关资源中的敏感信息与可疑线索,支持基础扫描、深度递归扫描、批量 API 测试及结果导出与自定义正则配置
URL:https://github.com/Team-intN18-SoybeanSeclab/Phantom
标签:#信息收集
GitHub
GitHub - Team-intN18-SoybeanSeclab/Phantom: 一款面向SRC漏洞挖掘中,页面信息收集场景的浏览器扩展,自动收集页面及相关资源中的敏感信息与可疑线索,支持基础扫描、深度递归扫描、批量 API 测试及结果导出与自定义正则配置
一款面向SRC漏洞挖掘中,页面信息收集场景的浏览器扩展,自动收集页面及相关资源中的敏感信息与可疑线索,支持基础扫描、深度递归扫描、批量 API 测试及结果导出与自定义正则配置 - Team-intN18-SoybeanSeclab/Phantom
GitHub监控消息提醒!!!
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/NaassonRibeiro/estudo-de-caso-de-seguranca-red-team
标签:#RCE
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/NaassonRibeiro/estudo-de-caso-de-seguranca-red-team
标签:#RCE
GitHub
GitHub - NaassonRibeiro/estudo-de-caso-de-seguranca-red-team: Estudo de caso de uma análise de segurança ofensiva (Red Team) que…
Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE. - NaassonRibeiro/estudo-de-caso-de-seguranca-r...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Demonstrate CVE-2025-55188, a 7-Zip vulnerability allowing symlink attacks to overwrite files, highlighting crucial security risks for users.
URL:https://github.com/rhllsingh/CVE-2025-55188-7z-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Demonstrate CVE-2025-55188, a 7-Zip vulnerability allowing symlink attacks to overwrite files, highlighting crucial security risks for users.
URL:https://github.com/rhllsingh/CVE-2025-55188-7z-exploit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚀 Demonstrate the WinRAR CVE-2025-8088 exploit with a PoC RAR archive that installs a VBScript on startup, showcasing its impact on vulnerable systems.
URL:https://github.com/amel-62/WinRAR-CVE-2025-8088-PoC-RAR
标签:#CVE-2025
更新了:CVE-2025
描述:🚀 Demonstrate the WinRAR CVE-2025-8088 exploit with a PoC RAR archive that installs a VBScript on startup, showcasing its impact on vulnerable systems.
URL:https://github.com/amel-62/WinRAR-CVE-2025-8088-PoC-RAR
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse may violate laws or cause harm. Update to WinRAR 7.13+ to avoid suspicious RARs.
URL:https://github.com/ghostn4444/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse may violate laws or cause harm. Update to WinRAR 7.13+ to avoid suspicious RARs.
URL:https://github.com/ghostn4444/CVE-2025-8088
标签:#CVE-2025
GitHub
GitHub - ghostn4444/CVE-2025-8088: This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse…
This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse may violate laws or cause harm. Update to WinRAR 7.13+ to avoid suspicious RARs. - ghostn4444/CVE-2025-...
GitHub监控消息提醒!!!
更新了:webshell
描述:serial port webshell simulation
URL:https://github.com/skyrover001/com_ws
标签:#webshell
更新了:webshell
描述:serial port webshell simulation
URL:https://github.com/skyrover001/com_ws
标签:#webshell
GitHub
skyrover001/com_ws
serial port webshell simulation. Contribute to skyrover001/com_ws development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:红队
描述:A.I.G (AI-Infra-Guard) 是腾讯朱雀实验室推出的 AI 红队安全测试平台,支持AI基础设施漏洞扫描、MCP Server风险检测与大模型安全体检。
URL:https://github.com/Tencent/AI-Infra-Guard
标签:#红队
更新了:红队
描述:A.I.G (AI-Infra-Guard) 是腾讯朱雀实验室推出的 AI 红队安全测试平台,支持AI基础设施漏洞扫描、MCP Server风险检测与大模型安全体检。
URL:https://github.com/Tencent/AI-Infra-Guard
标签:#红队
GitHub
GitHub - Tencent/AI-Infra-Guard: A.I.G (AI-Infra-Guard) is a comprehensive, intelligent, and easy-to-use AI Red Teaming platform…
A.I.G (AI-Infra-Guard) is a comprehensive, intelligent, and easy-to-use AI Red Teaming platform developed by Tencent Zhuque Lab. - Tencent/AI-Infra-Guard
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection CVE PoC (Proof of Concept)
URL:https://github.com/JMS-Security/CVE-2025-25256-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection CVE PoC (Proof of Concept)
URL:https://github.com/JMS-Security/CVE-2025-25256-PoC
标签:#CVE-2025