GitHub监控消息提醒!!!
更新了:漏洞验证
描述:Web批量请求器是一款基于PyWebview编写的轻量工具,可对目标地址进行快速批量的存活探测,允许自定义HTTP请求,支持HTTP/SOCKS5代理,适用于批量漏洞验证场景。
URL:https://github.com/aaaMoZhen666/web-batch-request
标签:#漏洞验证
更新了:漏洞验证
描述:Web批量请求器是一款基于PyWebview编写的轻量工具,可对目标地址进行快速批量的存活探测,允许自定义HTTP请求,支持HTTP/SOCKS5代理,适用于批量漏洞验证场景。
URL:https://github.com/aaaMoZhen666/web-batch-request
标签:#漏洞验证
GitHub
GitHub - aaaMoZhen666/web-batch-request: Web批量请求器是一款基于Python编写的轻量工具,可对目标地址进行快速批量的存活探测,允许自定义HTTP请求,支持HTTP/SOCKS5代理,适用于批量漏洞验证场景。
Web批量请求器是一款基于Python编写的轻量工具,可对目标地址进行快速批量的存活探测,允许自定义HTTP请求,支持HTTP/SOCKS5代理,适用于批量漏洞验证场景。 - aaaMoZhen666/web-batch-request
GitHub监控消息提醒!!!
更新了:Red Team
描述:IT Red Team Roadmap
URL:https://github.com/JohanTheBlue/redteam-lab
标签:#Red Team
更新了:Red Team
描述:IT Red Team Roadmap
URL:https://github.com/JohanTheBlue/redteam-lab
标签:#Red Team
GitHub
JohanTheBlue/redteam-lab
IT Red Team Roadmap. Contribute to JohanTheBlue/redteam-lab development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:IT Red Team Roadmap
URL:https://github.com/JohanTheBlue/redteam-lab
标签:#Red Team
更新了:Red Team
描述:IT Red Team Roadmap
URL:https://github.com/JohanTheBlue/redteam-lab
标签:#Red Team
GitHub
JohanTheBlue/redteam-lab
IT Red Team Roadmap. Contribute to JohanTheBlue/redteam-lab development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.
URL:https://github.com/prabhatverma47/CVE-2025-58180-RCE-in-OctoPrint-via-Unsanitized-Filename
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.
URL:https://github.com/prabhatverma47/CVE-2025-58180-RCE-in-OctoPrint-via-Unsanitized-Filename
标签:#CVE-2025
GitHub
GitHub - prabhatverma47/CVE-2025-58180: In OctoPrint version <=1.11.2, an attacker with file upload access (e.g., valid API key…
In OctoPrint version <=1.11.2, an attacker with file upload access (e.g., valid API key or session) can craft a malicious filename that bypasses sanitization and is later executed by OctoPri...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.
URL:https://github.com/prabhatverma47/CVE-2025-58180-RCE-in-OctoPrint-via-Unsanitized-Filename
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-30208) with customizable options for effective scanning.
URL:https://github.com/prabhatverma47/CVE-2025-58180-RCE-in-OctoPrint-via-Unsanitized-Filename
标签:#CVE-2025
GitHub
GitHub - prabhatverma47/CVE-2025-58180: In OctoPrint version <=1.11.2, an attacker with file upload access (e.g., valid API key…
In OctoPrint version <=1.11.2, an attacker with file upload access (e.g., valid API key or session) can craft a malicious filename that bypasses sanitization and is later executed by OctoPri...
GitHub监控消息提醒!!!
更新了:burp
描述:Automating security testing for web applications and API using AI Based burp extension
URL:https://github.com/Rudra2018/Burp-Extenstion-AI-Driven-Testing
标签:#burp
更新了:burp
描述:Automating security testing for web applications and API using AI Based burp extension
URL:https://github.com/Rudra2018/Burp-Extenstion-AI-Driven-Testing
标签:#burp
GitHub
GitHub - Rudra2018/Burp-Extenstion-AI-Driven-Testing: Automating security testing for web applications and API using AI Based burp…
Automating security testing for web applications and API using AI Based burp extension - Rudra2018/Burp-Extenstion-AI-Driven-Testing
GitHub监控消息提醒!!!
更新了:红队
描述:本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 目标:记录和沉淀相关知识、方法与实践经验,旨在从原型 Demo 推动到实际落地应用。
URL:https://github.com/study8677/post-training
标签:#红队
更新了:红队
描述:本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 目标:记录和沉淀相关知识、方法与实践经验,旨在从原型 Demo 推动到实际落地应用。
URL:https://github.com/study8677/post-training
标签:#红队
GitHub
GitHub - study8677/post-training: 本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 …
本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 目标:记录和沉淀相关知识、方法与实践经验,旨在从原型 Demo 推动到实际落地应用。 - study8677/post-training
GitHub监控消息提醒!!!
更新了:红队
描述:本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 目标:记录和沉淀相关知识、方法与实践经验,旨在从原型 Demo 推动到实际落地应用。
URL:https://github.com/study8677/post-training
标签:#红队
更新了:红队
描述:本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 目标:记录和沉淀相关知识、方法与实践经验,旨在从原型 Demo 推动到实际落地应用。
URL:https://github.com/study8677/post-training
标签:#红队
GitHub
GitHub - study8677/post-training: 本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 …
本仓库聚焦于大模型后训练(Post-Training),内容包括但不限于: 核心方法:SFT、RLHF、RL、DPO、RAG 其他方向:模型蒸馏、对齐方法、红队测试、安全性调优等 目标:记录和沉淀相关知识、方法与实践经验,旨在从原型 Demo 推动到实际落地应用。 - study8677/post-training
GitHub监控消息提醒!!!
更新了:攻防
描述:final project with 安全程式設計與駭客攻防技術
URL:https://github.com/lurking92/DDos_attacked_demo
标签:#攻防
更新了:攻防
描述:final project with 安全程式設計與駭客攻防技術
URL:https://github.com/lurking92/DDos_attacked_demo
标签:#攻防
GitHub
GitHub - lurking92/DDos_attacked_demo: final project with 安全程式設計與駭客攻防技術
final project with 安全程式設計與駭客攻防技術. Contribute to lurking92/DDos_attacked_demo development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:An Archive of Presentation Materials from Past Red Team Village Events
URL:https://github.com/Chetanproduction23/company-interview-evaluator
标签:#Red Team
更新了:Red Team
描述:An Archive of Presentation Materials from Past Red Team Village Events
URL:https://github.com/Chetanproduction23/company-interview-evaluator
标签:#Red Team
GitHub
GitHub - Chetanproduction23/company-interview-evaluator: A curated guide for software engineers to evaluate a company’s engineering…
A curated guide for software engineers to evaluate a company’s engineering practices during job interviews. Includes key questions, red flags, and good signs related to SDLC, codebase quality, team...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Kubepwn is a plug-and-play Kubernetes Red Team & Threat Hunting lab designed for cybersecurity professionals to simulate and detect real-world APT-style attacks on kubernetes clusters.
URL:https://github.com/deep1792/KubePwn
标签:#Red Team
更新了:Red Team
描述:Kubepwn is a plug-and-play Kubernetes Red Team & Threat Hunting lab designed for cybersecurity professionals to simulate and detect real-world APT-style attacks on kubernetes clusters.
URL:https://github.com/deep1792/KubePwn
标签:#Red Team
GitHub
GitHub - deep1792/KubePwn: Kubepwn is a plug-and-play Kubernetes Red Team & Threat Hunting lab designed for cybersecurity professionals…
Kubepwn is a plug-and-play Kubernetes Red Team & Threat Hunting lab designed for cybersecurity professionals to simulate and detect real-world APT-style attacks on kubernetes clusters. - de...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A poc for CVE-2025-32434
URL:https://github.com/2h3ph3rd/CVE-2025-32434
标签:#CVE-2025
更新了:CVE-2025
描述:A poc for CVE-2025-32434
URL:https://github.com/2h3ph3rd/CVE-2025-32434
标签:#CVE-2025