GitHub监控消息提醒!!!
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/yuanweize/FormVault
标签:#信息收集
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/yuanweize/FormVault
标签:#信息收集
GitHub
GitHub - yuanweize/FormVault: FormVault - Securely collects client personal information and document uploads (e.g., student ID…
FormVault - Securely collects client personal information and document uploads (e.g., student ID, passport photos) with a clean frontend form and simple admin backend for managing submissions and e...
GitHub监控消息提醒!!!
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/yuanweize/FormVault
标签:#信息收集
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/yuanweize/FormVault
标签:#信息收集
GitHub
GitHub - yuanweize/FormVault: FormVault - Securely collects client personal information and document uploads (e.g., student ID…
FormVault - Securely collects client personal information and document uploads (e.g., student ID, passport photos) with a clean frontend form and simple admin backend for managing submissions and e...
GitHub监控消息提醒!!!
更新了:Red Team
描述:AD + Splunk + Sysmon lab with brute force & Atomic Red Team attack simulations.
URL:https://github.com/shaurya96/AD-1.0
标签:#Red Team
更新了:Red Team
描述:AD + Splunk + Sysmon lab with brute force & Atomic Red Team attack simulations.
URL:https://github.com/shaurya96/AD-1.0
标签:#Red Team
GitHub
GitHub - shaurya96/AD-1.0: AD + Splunk + Sysmon lab with brute force & Atomic Red Team attack simulations.
AD + Splunk + Sysmon lab with brute force & Atomic Red Team attack simulations. - shaurya96/AD-1.0
GitHub监控消息提醒!!!
更新了:代码审计
描述:一套 Python 自动化安全工具脚本,用于端口检测、日志分析、代码审计、密码策略评估与报告生成
URL:https://github.com/ccscscs1212/security-tools
标签:#代码审计
更新了:代码审计
描述:一套 Python 自动化安全工具脚本,用于端口检测、日志分析、代码审计、密码策略评估与报告生成
URL:https://github.com/ccscscs1212/security-tools
标签:#代码审计
GitHub
GitHub - ccscscs1212/security-tools: 一套 Python 自动化安全工具脚本,用于端口检测、日志分析、代码审计、密码策略评估与报告生成
一套 Python 自动化安全工具脚本,用于端口检测、日志分析、代码审计、密码策略评估与报告生成. Contribute to ccscscs1212/security-tools development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:一套 Python 自动化安全工具脚本,用于端口检测、日志分析、代码审计、密码策略评估与报告生成
URL:https://github.com/ccscscs1212/security-tools
标签:#代码审计
更新了:代码审计
描述:一套 Python 自动化安全工具脚本,用于端口检测、日志分析、代码审计、密码策略评估与报告生成
URL:https://github.com/ccscscs1212/security-tools
标签:#代码审计
GitHub
GitHub - ccscscs1212/security-tools: 一套 Python 自动化安全工具脚本,用于端口检测、日志分析、代码审计、密码策略评估与报告生成
一套 Python 自动化安全工具脚本,用于端口检测、日志分析、代码审计、密码策略评估与报告生成. Contribute to ccscscs1212/security-tools development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/mrk336/Cluster-Chaos-Exploiting-CVE-2025-59359-for-Kubernetes-Takeover
标签:#CVE-2025
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/mrk336/Cluster-Chaos-Exploiting-CVE-2025-59359-for-Kubernetes-Takeover
标签:#CVE-2025
GitHub
GitHub - mrk336/Cluster-Chaos-Exploiting-CVE-2025-59359-for-Kubernetes-Takeover: A hands-on forensic walkthrough of CVE-2025-59359…
A hands-on forensic walkthrough of CVE-2025-59359, a critical OS command injection flaw in Chaos-Mesh. Learn how attackers hijack Kubernetes clusters via GraphQL mutations, and how to detect, analy...
GitHub监控消息提醒!!!
更新了:攻防
描述:anliu 是一个专注于安全领域的信息流网站,旨在聚合与分发高质量的安全资讯、漏洞通告、攻防研究、工具动态等内容
URL:https://github.com/bios000/Anliu
标签:#攻防
更新了:攻防
描述:anliu 是一个专注于安全领域的信息流网站,旨在聚合与分发高质量的安全资讯、漏洞通告、攻防研究、工具动态等内容
URL:https://github.com/bios000/Anliu
标签:#攻防
GitHub监控消息提醒!!!
更新了:攻防
描述:anliu 是一个专注于安全领域的信息流网站,旨在聚合与分发高质量的安全资讯、漏洞通告、攻防研究、工具动态等内容
URL:https://github.com/Sec-labels/Anliu
标签:#攻防
更新了:攻防
描述:anliu 是一个专注于安全领域的信息流网站,旨在聚合与分发高质量的安全资讯、漏洞通告、攻防研究、工具动态等内容
URL:https://github.com/Sec-labels/Anliu
标签:#攻防
GitHub
GitHub - Sec-labels/Anliu: anliu 是一个专注于安全领域的信息流网站,旨在聚合与分发高质量的安全资讯、漏洞通告、攻防研究、工具动态等内容
anliu 是一个专注于安全领域的信息流网站,旨在聚合与分发高质量的安全资讯、漏洞通告、攻防研究、工具动态等内容 - Sec-labels/Anliu
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/mrk336/Cluster-Chaos-Exploiting-CVE-2025-59359-for-Kubernetes-Takeover
标签:#CVE-2025
更新了:CVE-2025
描述:🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.
URL:https://github.com/mrk336/Cluster-Chaos-Exploiting-CVE-2025-59359-for-Kubernetes-Takeover
标签:#CVE-2025
GitHub
GitHub - mrk336/Cluster-Chaos-Exploiting-CVE-2025-59359-for-Kubernetes-Takeover: A hands-on forensic walkthrough of CVE-2025-59359…
A hands-on forensic walkthrough of CVE-2025-59359, a critical OS command injection flaw in Chaos-Mesh. Learn how attackers hijack Kubernetes clusters via GraphQL mutations, and how to detect, analy...
GitHub监控消息提醒!!!
更新了:RCE
描述:MotionEye RCE via Client-Side Validation Bypass through config parameter
URL:https://github.com/aprabhatverma/RCE-in-motioneye-0.43.1b4
标签:#RCE
更新了:RCE
描述:MotionEye RCE via Client-Side Validation Bypass through config parameter
URL:https://github.com/aprabhatverma/RCE-in-motioneye-0.43.1b4
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This tiny lab simulates the core idea behind CVE-2025-29306: unsafe use of `unserialize()` on attacker-controlled input leading to remote code execution.
URL:https://github.com/amalpvatayam67/day06-foxcms-rce
标签:#CVE-2025
更新了:CVE-2025
描述:This tiny lab simulates the core idea behind CVE-2025-29306: unsafe use of `unserialize()` on attacker-controlled input leading to remote code execution.
URL:https://github.com/amalpvatayam67/day06-foxcms-rce
标签:#CVE-2025
GitHub
GitHub - amalpvatayam67/day06-foxcms-rce: This tiny lab simulates the core idea behind CVE-2025-29306: unsafe use of `unserialize()`…
This tiny lab simulates the core idea behind CVE-2025-29306: unsafe use of `unserialize()` on attacker-controlled input leading to remote code execution. - amalpvatayam67/day06-foxcms-rce
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This tiny lab simulates the core idea behind CVE-2025-29306: unsafe use of `unserialize()` on attacker-controlled input leading to remote code execution.
URL:https://github.com/amalpvatayam67/day06-foxcms-rce
标签:#CVE-2025
更新了:CVE-2025
描述:This tiny lab simulates the core idea behind CVE-2025-29306: unsafe use of `unserialize()` on attacker-controlled input leading to remote code execution.
URL:https://github.com/amalpvatayam67/day06-foxcms-rce
标签:#CVE-2025
GitHub
GitHub - amalpvatayam67/day06-foxcms-rce: This tiny lab simulates the core idea behind CVE-2025-29306: unsafe use of `unserialize()`…
This tiny lab simulates the core idea behind CVE-2025-29306: unsafe use of `unserialize()` on attacker-controlled input leading to remote code execution. - amalpvatayam67/day06-foxcms-rce
GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试语义特征词典(涵盖认证绕过、路径遍历、注入攻击等典型测试用例数据集)
URL:https://github.com/h0umu5u/nosec-dict
标签:#渗透测试
更新了:渗透测试
描述:渗透测试语义特征词典(涵盖认证绕过、路径遍历、注入攻击等典型测试用例数据集)
URL:https://github.com/h0umu5u/nosec-dict
标签:#渗透测试
GitHub
GitHub - h0umu5u/nosec-dict: 渗透测试语义特征词典(涵盖认证绕过、路径遍历、注入攻击等典型测试用例数据集)
渗透测试语义特征词典(涵盖认证绕过、路径遍历、注入攻击等典型测试用例数据集). Contribute to h0umu5u/nosec-dict development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试语义特征词典(涵盖认证绕过、路径遍历、注入攻击等典型测试用例数据集)
URL:https://github.com/h0umu5u/nosec-dict
标签:#渗透测试
更新了:渗透测试
描述:渗透测试语义特征词典(涵盖认证绕过、路径遍历、注入攻击等典型测试用例数据集)
URL:https://github.com/h0umu5u/nosec-dict
标签:#渗透测试
GitHub
GitHub - h0umu5u/nosec-dict: 渗透测试语义特征词典(涵盖认证绕过、路径遍历、注入攻击等典型测试用例数据集)
渗透测试语义特征词典(涵盖认证绕过、路径遍历、注入攻击等典型测试用例数据集). Contribute to h0umu5u/nosec-dict development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞验证
描述:漏洞验证测试集(Proof-of-Concept Test Suites)
URL:https://github.com/h0umu5u/pocsuites
标签:#漏洞验证
更新了:漏洞验证
描述:漏洞验证测试集(Proof-of-Concept Test Suites)
URL:https://github.com/h0umu5u/pocsuites
标签:#漏洞验证
GitHub
GitHub - h0umu5u/pocsuites: 漏洞验证测试集(Proof-of-Concept Test Suites)
漏洞验证测试集(Proof-of-Concept Test Suites). Contribute to h0umu5u/pocsuites development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:MotionEye RCE via Client-Side Validation Bypass through config parameter
URL:https://github.com/aprabhatverma/RCE-in-motioneye-0.43.1b4
标签:#RCE
更新了:RCE
描述:MotionEye RCE via Client-Side Validation Bypass through config parameter
URL:https://github.com/aprabhatverma/RCE-in-motioneye-0.43.1b4
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:WinRAR漏洞CVE-2025-8088的payload一键生成工具
URL:https://github.com/hbesljx/CVE-2025-8088-EXP
标签:#CVE-2025
更新了:CVE-2025
描述:WinRAR漏洞CVE-2025-8088的payload一键生成工具
URL:https://github.com/hbesljx/CVE-2025-8088-EXP
标签:#CVE-2025
GitHub
GitHub - hbesljx/CVE-2025-8088-EXP: WinRAR漏洞CVE-2025-8088的payload一键生成工具
WinRAR漏洞CVE-2025-8088的payload一键生成工具. Contribute to hbesljx/CVE-2025-8088-EXP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:WinRAR漏洞CVE-2025-8088的payload一键生成工具
URL:https://github.com/hbesljx/CVE-2025-8088-EXP
标签:#CVE-2025
更新了:CVE-2025
描述:WinRAR漏洞CVE-2025-8088的payload一键生成工具
URL:https://github.com/hbesljx/CVE-2025-8088-EXP
标签:#CVE-2025
GitHub
GitHub - hbesljx/CVE-2025-8088-EXP: WinRAR漏洞CVE-2025-8088的payload一键生成工具
WinRAR漏洞CVE-2025-8088的payload一键生成工具. Contribute to hbesljx/CVE-2025-8088-EXP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞验证
描述:漏洞验证测试集(Proof-of-Concept Test Suites)
URL:https://github.com/h0umu5u/pocsuites
标签:#漏洞验证
更新了:漏洞验证
描述:漏洞验证测试集(Proof-of-Concept Test Suites)
URL:https://github.com/h0umu5u/pocsuites
标签:#漏洞验证
GitHub
GitHub - h0umu5u/pocsuites: 漏洞验证测试集(Proof-of-Concept Test Suites)
漏洞验证测试集(Proof-of-Concept Test Suites). Contribute to h0umu5u/pocsuites development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Security Researcher | VAPT | Red Teaming | Blue Teaming | Web Application Security
URL:https://github.com/kunal-5055/kunal-5055
标签:#Red Team
更新了:Red Team
描述:Security Researcher | VAPT | Red Teaming | Blue Teaming | Web Application Security
URL:https://github.com/kunal-5055/kunal-5055
标签:#Red Team
GitHub
GitHub - kunal-5055/kunal-5055: Security Researcher | VAPT | Red Teaming | Blue Teaming | Web Application Security
Security Researcher | VAPT | Red Teaming | Blue Teaming | Web Application Security - GitHub - kunal-5055/kunal-5055: Security Researcher | VAPT | Red Teaming | Blue Teaming | Web Application Security
GitHub监控消息提醒!!!
更新了:代码注入
描述:漏洞链靶场搭建与渗透~xxe文件读取+sql注入+代码审计+越权漏洞
URL:https://github.com/SimonSkywalke/SimpleRL
标签:#代码注入
更新了:代码注入
描述:漏洞链靶场搭建与渗透~xxe文件读取+sql注入+代码审计+越权漏洞
URL:https://github.com/SimonSkywalke/SimpleRL
标签:#代码注入
GitHub
GitHub - SimonSkywalke/SimpleRL: 本项目致力于将图灵奖得主萨顿的经典著作《强化学习导论》转化为新手友好的学习资料。通过简洁清晰的笔记、逐章重点解析、习题详细解答以及配套Python代码实现,帮助初学者更轻松地理解强化学习…
本项目致力于将图灵奖得主萨顿的经典著作《强化学习导论》转化为新手友好的学习资料。通过简洁清晰的笔记、逐章重点解析、习题详细解答以及配套Python代码实现,帮助初学者更轻松地理解强化学习的核心概念与算法原理。内容涵盖马尔可夫决策过程、动态规划、蒙特卡洛方法、时序差分学习、Q-learning 与策略梯度等核心主题。所有材料均以通俗语言编写,注重实践与直观理解,并提供可运行示例代码。项目完全开...