GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/qdwqwdqwdqwd/KOLE
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/qdwqwdqwdqwd/KOLE
标签:#护网
GitHub
GitHub - qdwqwdqwdqwd/KOLE: KOLE - 基于区块链的KOL劣迹曝光平台 | Blockchain-based platform for exposing KOL misconduct. Built on Solana & IPFS…
KOLE - 基于区块链的KOL劣迹曝光平台 | Blockchain-based platform for exposing KOL misconduct. Built on Solana & IPFS with DAO governance and KOLE token incentives. 去中心化监督生态系统 - qdwqwdqwdqwd/KOLE
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/qdwqwdqwdqwd/KOLE
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/qdwqwdqwdqwd/KOLE
标签:#护网
GitHub
GitHub - qdwqwdqwdqwd/KOLE: KOLE - 基于区块链的KOL劣迹曝光平台 | Blockchain-based platform for exposing KOL misconduct. Built on Solana & IPFS…
KOLE - 基于区块链的KOL劣迹曝光平台 | Blockchain-based platform for exposing KOL misconduct. Built on Solana & IPFS with DAO governance and KOLE token incentives. 去中心化监督生态系统 - qdwqwdqwdqwd/KOLE
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team utility that alerts you to potential Blue Team, IDS, and IPS detection activity
URL:https://github.com/Acucarinho/Doppel
标签:#Red Team
更新了:Red Team
描述:Red Team utility that alerts you to potential Blue Team, IDS, and IPS detection activity
URL:https://github.com/Acucarinho/Doppel
标签:#Red Team
GitHub
GitHub - Acucarinho/Doppel: Red Team utility that alerts you to potential Blue Team, IDS, and IPS detection activity
Red Team utility that alerts you to potential Blue Team, IDS, and IPS detection activity - Acucarinho/Doppel
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:Spring Boot Actuator未授权访问漏洞检测工具
URL:https://github.com/renbon-wu/SBAunauth
标签:#漏洞检测
更新了:漏洞检测
描述:Spring Boot Actuator未授权访问漏洞检测工具
URL:https://github.com/renbon-wu/SBAunauth
标签:#漏洞检测
GitHub
GitHub - renbon-wu/SBAunauth: Spring Boot Actuator未授权访问漏洞检测工具
Spring Boot Actuator未授权访问漏洞检测工具. Contribute to renbon-wu/SBAunauth development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:XSS, SQLI, LFI, RCE Practice Labs in php
URL:https://github.com/KrazePlanet/KrazePlanetLabs
标签:#RCE
更新了:RCE
描述:XSS, SQLI, LFI, RCE Practice Labs in php
URL:https://github.com/KrazePlanet/KrazePlanetLabs
标签:#RCE
GitHub
GitHub - KrazePlanet/KrazePlanetLabs: XSS, SQLI, LFI, RCE Practice Labs in php
XSS, SQLI, LFI, RCE Practice Labs in php. Contribute to KrazePlanet/KrazePlanetLabs development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:XSS, SQLI, LFI, RCE Practice Labs in php
URL:https://github.com/KrazePlanet/KrazePlanetLabs
标签:#RCE
更新了:RCE
描述:XSS, SQLI, LFI, RCE Practice Labs in php
URL:https://github.com/KrazePlanet/KrazePlanetLabs
标签:#RCE
GitHub
GitHub - KrazePlanet/KrazePlanetLabs: XSS, SQLI, LFI, RCE Practice Labs in php
XSS, SQLI, LFI, RCE Practice Labs in php. Contribute to KrazePlanet/KrazePlanetLabs development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:A personal tool for webshell-based file management and vulnerability testing in local environments.
URL:https://github.com/gexer00/gexer-webshell
标签:#webshell
更新了:webshell
描述:A personal tool for webshell-based file management and vulnerability testing in local environments.
URL:https://github.com/gexer00/gexer-webshell
标签:#webshell
GitHub
GitHub - gexer00/gexer-webshell: A personal tool for webshell-based file management and vulnerability testing in local environments.
A personal tool for webshell-based file management and vulnerability testing in local environments. - gexer00/gexer-webshell
GitHub监控消息提醒!!!
更新了:Red Team
描述:ReconRoyale challenges, bug bounty experiments, and penetration testing notes | Red Team, subdomain, and cloud asset discovery
URL:https://github.com/fawadqureshi007/recon-assets
标签:#Red Team
更新了:Red Team
描述:ReconRoyale challenges, bug bounty experiments, and penetration testing notes | Red Team, subdomain, and cloud asset discovery
URL:https://github.com/fawadqureshi007/recon-assets
标签:#Red Team
GitHub
GitHub - fawadqureshi007/recon-assets: ReconRoyale challenges, bug bounty experiments, and penetration testing notes | Red Team…
ReconRoyale challenges, bug bounty experiments, and penetration testing notes | Red Team, subdomain, and cloud asset discovery - fawadqureshi007/recon-assets
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/sureshkumarsat/CVE-2025-31258-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/sureshkumarsat/CVE-2025-31258-PoC
标签:#CVE-2025
GitHub
GitHub - sureshkumarsat/CVE-2025-31258-PoC: 🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using …
🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice. - sureshkumarsat/CVE-2025-31258-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/sureshkumarsat/CVE-2025-31258-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/sureshkumarsat/CVE-2025-31258-PoC
标签:#CVE-2025
GitHub
GitHub - sureshkumarsat/CVE-2025-31258-PoC: 🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using …
🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice. - sureshkumarsat/CVE-2025-31258-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-42944
URL:https://github.com/rxerium/CVE-2025-42944
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-42944
URL:https://github.com/rxerium/CVE-2025-42944
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-42944: Detection for CVE-2025-42944
Detection for CVE-2025-42944. Contribute to rxerium/CVE-2025-42944 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:🚀 AI转录器本地客户端工具 - 完全绕过反机器人检测,支持200+视频平台 | AI Transcriber Local Client - Bypass Anti-Bot Detection, Support 200+ Video Platforms
URL:https://github.com/AugustineQiu/ai-transcriber-client
标签:#绕过
更新了:绕过
描述:🚀 AI转录器本地客户端工具 - 完全绕过反机器人检测,支持200+视频平台 | AI Transcriber Local Client - Bypass Anti-Bot Detection, Support 200+ Video Platforms
URL:https://github.com/AugustineQiu/ai-transcriber-client
标签:#绕过
GitHub
GitHub - AugustineQiu/ai-transcriber-client: AI转录器本地客户端工具 - 完全绕过反机器人检测,支持200+视频平台 | AI Transcriber Local Client - Bypass Anti-Bot…
AI转录器本地客户端工具 - 完全绕过反机器人检测,支持200+视频平台 | AI Transcriber Local Client - Bypass Anti-Bot Detection, Support 200+ Video Platforms - AugustineQiu/ai-transcriber-client
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:异步Beacon Object Files概念的实现。它提供了一个框架,用于运行可以检测事件并报告回Cobalt Strike团队服务器的异步监控任务。
URL:https://github.com/9Insomnie/async_bof
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:异步Beacon Object Files概念的实现。它提供了一个框架,用于运行可以检测事件并报告回Cobalt Strike团队服务器的异步监控任务。
URL:https://github.com/9Insomnie/async_bof
标签:#Cobalt Strike
GitHub
GitHub - 9Insomnie/async_bof: 异步Beacon Object Files概念的实现。它提供了一个框架,用于运行可以检测事件并报告回Cobalt Strike团队服务器的异步监控任务。
异步Beacon Object Files概念的实现。它提供了一个框架,用于运行可以检测事件并报告回Cobalt Strike团队服务器的异步监控任务。 - 9Insomnie/async_bof
GitHub监控消息提醒!!!
更新了:webshell
描述:Java monitoring tool for Apache Tomcat to detect memory webshell
URL:https://github.com/M1nh-Duk/Inspectra
标签:#webshell
更新了:webshell
描述:Java monitoring tool for Apache Tomcat to detect memory webshell
URL:https://github.com/M1nh-Duk/Inspectra
标签:#webshell
GitHub
GitHub - M1nh-Duk/Inspectra: Java monitoring tool for Apache Tomcat to detect memory webshell
Java monitoring tool for Apache Tomcat to detect memory webshell - M1nh-Duk/Inspectra
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:VigilantX 是一个专为 Burp Suite 设计的被动式 XSS(跨站脚本)漏洞检测扩展。该工具采用创新的两阶段检测机制,能够高效、准确地识别 Web 应用中的 XSS 漏洞,并通过飞书 Webhook 实时推送漏洞发现通知。
URL:https://github.com/Zacarx/VigilantX
标签:#漏洞检测
更新了:漏洞检测
描述:VigilantX 是一个专为 Burp Suite 设计的被动式 XSS(跨站脚本)漏洞检测扩展。该工具采用创新的两阶段检测机制,能够高效、准确地识别 Web 应用中的 XSS 漏洞,并通过飞书 Webhook 实时推送漏洞发现通知。
URL:https://github.com/Zacarx/VigilantX
标签:#漏洞检测
GitHub
GitHub - Zacarx/VigilantX: VigilantX 是一个专为 Burp Suite 设计的被动式 XSS(跨站脚本)漏洞检测扩展。该工具采用创新的两阶段检测机制,能够高效、准确地识别 Web 应用中的 XSS 漏洞,并通过飞书 Webhook…
VigilantX 是一个专为 Burp Suite 设计的被动式 XSS(跨站脚本)漏洞检测扩展。该工具采用创新的两阶段检测机制,能够高效、准确地识别 Web 应用中的 XSS 漏洞,并通过飞书 Webhook 实时推送漏洞发现通知。 - Zacarx/VigilantX
GitHub监控消息提醒!!!
更新了:burp
描述:VigilantX 是一个专为 Burp Suite 设计的被动式 XSS(跨站脚本)漏洞检测扩展。该工具采用创新的两阶段检测机制,能够高效、准确地识别 Web 应用中的 XSS 漏洞,并通过飞书 Webhook 实时推送漏洞发现通知。
URL:https://github.com/dagcybersec/Offensive-Security-Lab-by-DAG
标签:#burp
更新了:burp
描述:VigilantX 是一个专为 Burp Suite 设计的被动式 XSS(跨站脚本)漏洞检测扩展。该工具采用创新的两阶段检测机制,能够高效、准确地识别 Web 应用中的 XSS 漏洞,并通过飞书 Webhook 实时推送漏洞发现通知。
URL:https://github.com/dagcybersec/Offensive-Security-Lab-by-DAG
标签:#burp
GitHub
GitHub - dagcybersec/Offensive-Security-Lab-by-DAG: Educational pentesting lab – Red Team exercises with Kali Linux, Metasploitable2…
Educational pentesting lab – Red Team exercises with Kali Linux, Metasploitable2, Nessus, Burp Suit, Wireshark, tcpdump, Nmap, Metasploit Framework, SET, Hydra, sqlmap, aircrack-ng and vulnerable a...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models
URL:https://github.com/MKIRAHMET/CVE-2025-29927-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models
URL:https://github.com/MKIRAHMET/CVE-2025-29927-PoC
标签:#CVE-2025
GitHub
GitHub - MKIRAHMET/CVE-2025-29927-PoC: This repository contains **research and analysis** related to CVE-2025-29927. It demonstrates…
This repository contains **research and analysis** related to CVE-2025-29927. It demonstrates safe, controlled testing approaches for a path traversal/middleware misconfiguration vulnerability in...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/MKIRAHMET/CVE-2025-29927-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/MKIRAHMET/CVE-2025-29927-PoC
标签:#CVE-2025
GitHub
GitHub - MKIRAHMET/CVE-2025-29927-PoC: This repository contains **research and analysis** related to CVE-2025-29927. It demonstrates…
This repository contains **research and analysis** related to CVE-2025-29927. It demonstrates safe, controlled testing approaches for a path traversal/middleware misconfiguration vulnerability in...