GitHub监控消息提醒!!!
更新了:渗透测试
描述:Rshell是一款开源的golang编写的支持多平台的C2框架,旨在帮助安服人员渗透测试、红蓝对抗。
URL:https://github.com/YD-233/test
标签:#渗透测试
更新了:渗透测试
描述:Rshell是一款开源的golang编写的支持多平台的C2框架,旨在帮助安服人员渗透测试、红蓝对抗。
URL:https://github.com/YD-233/test
标签:#渗透测试
GitHub
GitHub - YD-233/test: Rshell是一款开源的golang编写的支持多平台的C2框架,旨在帮助安服人员渗透测试、红蓝对抗。
Rshell是一款开源的golang编写的支持多平台的C2框架,旨在帮助安服人员渗透测试、红蓝对抗。 - YD-233/test
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一键启动的专业渗透测试套件,支持Windows、macOS、Linux跨平台使用
URL:https://github.com/Hedysx/PentestMaster
标签:#渗透测试
更新了:渗透测试
描述:一键启动的专业渗透测试套件,支持Windows、macOS、Linux跨平台使用
URL:https://github.com/Hedysx/PentestMaster
标签:#渗透测试
GitHub
GitHub - Hedysx/PentestMaster: 一键启动的专业渗透测试套件,支持Windows、macOS、Linux跨平台使用
一键启动的专业渗透测试套件,支持Windows、macOS、Linux跨平台使用. Contribute to Hedysx/PentestMaster development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:🚀 AI-Powered Red Team & Pentest Toolkit | 赋能红队与渗透测试的 AI 工具集
URL:https://github.com/Conan924/AIPentestKit
标签:#渗透测试
更新了:渗透测试
描述:🚀 AI-Powered Red Team & Pentest Toolkit | 赋能红队与渗透测试的 AI 工具集
URL:https://github.com/Conan924/AIPentestKit
标签:#渗透测试
GitHub
GitHub - Conan924/AIPentestKit: 🚀 AI-Powered Red Team & Pentest Toolkit | 赋能红队与渗透测试的 AI 工具集
🚀 AI-Powered Red Team & Pentest Toolkit | 赋能红队与渗透测试的 AI 工具集 - Conan924/AIPentestKit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-5777: Citrix NetScaler Memory Disclosure (CitrixBleed 2)
URL:https://github.com/ndr-repo/CVE-2025-5777
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-5777: Citrix NetScaler Memory Disclosure (CitrixBleed 2)
URL:https://github.com/ndr-repo/CVE-2025-5777
标签:#CVE-2025
GitHub
GitHub - ndr-repo/CVE-2025-5777: Exploit for CVE-2025-5777: Citrix NetScaler Memory Disclosure (CitrixBleed 2)
Exploit for CVE-2025-5777: Citrix NetScaler Memory Disclosure (CitrixBleed 2) - ndr-repo/CVE-2025-5777
GitHub监控消息提醒!!!
更新了:RCE
描述:Simulation of an IP fragmentation attack to bypass intermediate security systems and exploit a RCE-vulnerable UDP server.
URL:https://github.com/egeharputluu/ip_fragmentation_attack_to_rce_vulnerable_server_simulation
标签:#RCE
更新了:RCE
描述:Simulation of an IP fragmentation attack to bypass intermediate security systems and exploit a RCE-vulnerable UDP server.
URL:https://github.com/egeharputluu/ip_fragmentation_attack_to_rce_vulnerable_server_simulation
标签:#RCE
GitHub
GitHub - egeharputluu/ip_fragmentation_attack_to_rce_vulnerable_server_simulation: Simulation of an IP fragmentation attack to…
Simulation of an IP fragmentation attack to bypass intermediate security systems and exploit a RCE-vulnerable UDP server. - egeharputluu/ip_fragmentation_attack_to_rce_vulnerable_server_simulation
GitHub监控消息提醒!!!
更新了:反序列化
描述:用于序列化和反序列化《脑叶公司》存档的命令行工具
URL:https://github.com/SOgz12Z3Ce/LobotomyCorpSaveManager
标签:#反序列化
更新了:反序列化
描述:用于序列化和反序列化《脑叶公司》存档的命令行工具
URL:https://github.com/SOgz12Z3Ce/LobotomyCorpSaveManager
标签:#反序列化
GitHub
GitHub - SOgz12Z3Ce/LobotomyCorpSaveManager: 用于序列化和反序列化《脑叶公司》存档的命令行工具
用于序列化和反序列化《脑叶公司》存档的命令行工具. Contribute to SOgz12Z3Ce/LobotomyCorpSaveManager development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Robust Cobalt Strike shellcode loader with multiple advanced evasion features
URL:https://github.com/sweetpotatohack/AKUMA-BeaconGen
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Robust Cobalt Strike shellcode loader with multiple advanced evasion features
URL:https://github.com/sweetpotatohack/AKUMA-BeaconGen
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:RCE
描述:Simple PHP Backdoor with RCE
URL:https://github.com/agt0lger/simple-php-backdockered
标签:#RCE
更新了:RCE
描述:Simple PHP Backdoor with RCE
URL:https://github.com/agt0lger/simple-php-backdockered
标签:#RCE
GitHub
GitHub - agt0lger/simple-php-backdockered: Simple PHP Backdoor with RCE
Simple PHP Backdoor with RCE. Contribute to agt0lger/simple-php-backdockered development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Simple PHP Backdoor with RCE
URL:https://github.com/SyedGhufranRaza/CVE-2018-7600-Remote-Code-Execution
标签:#RCE
更新了:RCE
描述:Simple PHP Backdoor with RCE
URL:https://github.com/SyedGhufranRaza/CVE-2018-7600-Remote-Code-Execution
标签:#RCE
GitHub
GitHub - SyedGhufranRaza/CVE-2018-7600-Remote-Code-Execution: This repository showcases a fully self-developed Proof-of-Concept…
This repository showcases a fully self-developed Proof-of-Concept (PoC) for CVE-2018-7600, widely known as Drupalgeddon 2. This critical vulnerability in Drupal 7 and 8 core enables remote code exe...
GitHub监控消息提醒!!!
更新了:RCE
描述:2025 RCEC Internship Summer Project Code and Related Files
URL:https://github.com/rebeccajhuwin99/2025rcecIntern
标签:#RCE
更新了:RCE
描述:2025 RCEC Internship Summer Project Code and Related Files
URL:https://github.com/rebeccajhuwin99/2025rcecIntern
标签:#RCE
GitHub
GitHub - rebeccajhuwin99/2025rcecIntern: 2025 RCEC Internship Summer Project Code and Related Files
2025 RCEC Internship Summer Project Code and Related Files - rebeccajhuwin99/2025rcecIntern
GitHub监控消息提醒!!!
更新了:信息收集
描述:一款面向SRC漏洞挖掘中,页面信息收集场景的浏览器扩展,自动收集页面及相关资源中的敏感信息与可疑线索,支持基础扫描、深度递归扫描、批量 API 测试及结果导出与自定义正则配置
URL:https://github.com/Team-intN18-SoybeanSeclab/Phantom
标签:#信息收集
更新了:信息收集
描述:一款面向SRC漏洞挖掘中,页面信息收集场景的浏览器扩展,自动收集页面及相关资源中的敏感信息与可疑线索,支持基础扫描、深度递归扫描、批量 API 测试及结果导出与自定义正则配置
URL:https://github.com/Team-intN18-SoybeanSeclab/Phantom
标签:#信息收集
GitHub
GitHub - Team-intN18-SoybeanSeclab/Phantom: 一款面向SRC漏洞挖掘中,页面信息收集场景的浏览器扩展,自动收集页面及相关资源中的敏感信息与可疑线索,支持基础扫描、深度递归扫描、批量 API 测试及结果导出与自定义正则配置
一款面向SRC漏洞挖掘中,页面信息收集场景的浏览器扩展,自动收集页面及相关资源中的敏感信息与可疑线索,支持基础扫描、深度递归扫描、批量 API 测试及结果导出与自定义正则配置 - Team-intN18-SoybeanSeclab/Phantom
GitHub监控消息提醒!!!
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/NaassonRibeiro/estudo-de-caso-de-seguranca-red-team
标签:#RCE
更新了:RCE
描述:Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE.
URL:https://github.com/NaassonRibeiro/estudo-de-caso-de-seguranca-red-team
标签:#RCE
GitHub
GitHub - NaassonRibeiro/estudo-de-caso-de-seguranca-red-team: Estudo de caso de uma análise de segurança ofensiva (Red Team) que…
Estudo de caso de uma análise de segurança ofensiva (Red Team) que resultou na descoberta de múltiplas vulnerabilidades, incluindo uma crítica de RCE. - NaassonRibeiro/estudo-de-caso-de-seguranca-r...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Demonstrate CVE-2025-55188, a 7-Zip vulnerability allowing symlink attacks to overwrite files, highlighting crucial security risks for users.
URL:https://github.com/rhllsingh/CVE-2025-55188-7z-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Demonstrate CVE-2025-55188, a 7-Zip vulnerability allowing symlink attacks to overwrite files, highlighting crucial security risks for users.
URL:https://github.com/rhllsingh/CVE-2025-55188-7z-exploit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚀 Demonstrate the WinRAR CVE-2025-8088 exploit with a PoC RAR archive that installs a VBScript on startup, showcasing its impact on vulnerable systems.
URL:https://github.com/amel-62/WinRAR-CVE-2025-8088-PoC-RAR
标签:#CVE-2025
更新了:CVE-2025
描述:🚀 Demonstrate the WinRAR CVE-2025-8088 exploit with a PoC RAR archive that installs a VBScript on startup, showcasing its impact on vulnerable systems.
URL:https://github.com/amel-62/WinRAR-CVE-2025-8088-PoC-RAR
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse may violate laws or cause harm. Update to WinRAR 7.13+ to avoid suspicious RARs.
URL:https://github.com/ghostn4444/CVE-2025-8088
标签:#CVE-2025
更新了:CVE-2025
描述:This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse may violate laws or cause harm. Update to WinRAR 7.13+ to avoid suspicious RARs.
URL:https://github.com/ghostn4444/CVE-2025-8088
标签:#CVE-2025
GitHub
GitHub - ghostn4444/CVE-2025-8088: This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse…
This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse may violate laws or cause harm. Update to WinRAR 7.13+ to avoid suspicious RARs. - ghostn4444/CVE-2025-...
GitHub监控消息提醒!!!
更新了:webshell
描述:serial port webshell simulation
URL:https://github.com/skyrover001/com_ws
标签:#webshell
更新了:webshell
描述:serial port webshell simulation
URL:https://github.com/skyrover001/com_ws
标签:#webshell
GitHub
skyrover001/com_ws
serial port webshell simulation. Contribute to skyrover001/com_ws development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:红队
描述:A.I.G (AI-Infra-Guard) 是腾讯朱雀实验室推出的 AI 红队安全测试平台,支持AI基础设施漏洞扫描、MCP Server风险检测与大模型安全体检。
URL:https://github.com/Tencent/AI-Infra-Guard
标签:#红队
更新了:红队
描述:A.I.G (AI-Infra-Guard) 是腾讯朱雀实验室推出的 AI 红队安全测试平台,支持AI基础设施漏洞扫描、MCP Server风险检测与大模型安全体检。
URL:https://github.com/Tencent/AI-Infra-Guard
标签:#红队
GitHub
GitHub - Tencent/AI-Infra-Guard: A.I.G (AI-Infra-Guard) is a comprehensive, intelligent, and easy-to-use AI Red Teaming platform…
A.I.G (AI-Infra-Guard) is a comprehensive, intelligent, and easy-to-use AI Red Teaming platform developed by Tencent Zhuque Lab. - Tencent/AI-Infra-Guard
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection CVE PoC (Proof of Concept)
URL:https://github.com/JMS-Security/CVE-2025-25256-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25256: Fortinet FortiSIEM OS Command Injection CVE PoC (Proof of Concept)
URL:https://github.com/JMS-Security/CVE-2025-25256-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:信息收集
描述:一款面向SRC漏洞挖掘中,页面信息收集场景的浏览器扩展,自动收集页面及相关资源中的敏感信息与可疑线索,支持基础扫描、深度递归扫描、批量 API 测试及结果导出与自定义正则配置
URL:https://github.com/yumyum-05/longxinzhiyou
标签:#信息收集
更新了:信息收集
描述:一款面向SRC漏洞挖掘中,页面信息收集场景的浏览器扩展,自动收集页面及相关资源中的敏感信息与可疑线索,支持基础扫描、深度递归扫描、批量 API 测试及结果导出与自定义正则配置
URL:https://github.com/yumyum-05/longxinzhiyou
标签:#信息收集
GitHub
GitHub - yumyum-05/Dragon-Optimize: 龙芯智优软件是一款针对于国产操作系统智能调优的软件,为帮助运维人员直观可视化对银河麒麟操作系统进行监控调优,系统设计分为管理端应用和服务探针两个核心部分。运维人员通过终端设备访问N…
龙芯智优软件是一款针对于国产操作系统智能调优的软件,为帮助运维人员直观可视化对银河麒麟操作系统进行监控调优,系统设计分为管理端应用和服务探针两个核心部分。运维人员通过终端设备访问NGINX服务,通过请求将任务分发到管理端节点,管理端与服务探针进行通讯,发送命令对部署了服务探针的服务器进行监控、数据采集、性能优化,采集的数据返回到管理端。数据实现持久化存储,支持mysql或达梦数据库,使用消息...