GitHub监控消息提醒!!!
更新了:信息收集
描述:Parsing 是一个 Chrome 插件,选择ai分析当前页面的Js代码,内置提示词,不再需要单拎js。以及信息收集功能,提升渗透测试效率。
URL:https://github.com/qhyai-bit/EnvDataCenter
标签:#信息收集
更新了:信息收集
描述:Parsing 是一个 Chrome 插件,选择ai分析当前页面的Js代码,内置提示词,不再需要单拎js。以及信息收集功能,提升渗透测试效率。
URL:https://github.com/qhyai-bit/EnvDataCenter
标签:#信息收集
GitHub
GitHub - qhyai-bit/EnvDataCenter: 系统分为客户端和服务器端。 客户端: 采集模块,负责采集预处理好的文件中的数据 网络模块,负责连接服务器端,并把采集好的数据发送过去 服务器: 入库模块,负责将数据存入数据库 网络模块…
系统分为客户端和服务器端。 客户端: 采集模块,负责采集预处理好的文件中的数据 网络模块,负责连接服务器端,并把采集好的数据发送过去 服务器: 入库模块,负责将数据存入数据库 网络模块,负责等待客户端的连接,并接收客户端发送的数据 公共模块: 配置模块,负责初始化和配置其他模块(需要使用dom4j 解析xml配置文 件) 日志模块,负责记录系统运行过程中出现的情况 (需要使用log4j 记录...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-54957
URL:https://github.com/AlphabugX/CVE-2025-54957
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-54957
URL:https://github.com/AlphabugX/CVE-2025-54957
标签:#CVE-2025
GitHub
GitHub - AlphabugX/CVE-2025-54957: CVE-2025-54957
CVE-2025-54957. Contribute to AlphabugX/CVE-2025-54957 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI Security Red Teaming Framework - Multimodal Adversarial Attacks & Jailbreak Testing
URL:https://github.com/refuse1993/prompt-arsenal
标签:#Red Team
更新了:Red Team
描述:AI Security Red Teaming Framework - Multimodal Adversarial Attacks & Jailbreak Testing
URL:https://github.com/refuse1993/prompt-arsenal
标签:#Red Team
GitHub
GitHub - refuse1993/prompt-arsenal: AI Security Red Teaming Framework - Multimodal Adversarial Attacks & Jailbreak Testing
AI Security Red Teaming Framework - Multimodal Adversarial Attacks & Jailbreak Testing - refuse1993/prompt-arsenal
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49844
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-49844
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49844
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-49844
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:护网
描述:开发了一个基于大语言模型(DeepSeek)的智能钓鱼邮件检测系统,能够识别传统钓鱼、AI生成钓鱼和混合型钓鱼攻击,为网络安全防护提供智能化解决方案。
URL:https://github.com/ANAISMUSE/phishing-detector-based-on-LLM
标签:#护网
更新了:护网
描述:开发了一个基于大语言模型(DeepSeek)的智能钓鱼邮件检测系统,能够识别传统钓鱼、AI生成钓鱼和混合型钓鱼攻击,为网络安全防护提供智能化解决方案。
URL:https://github.com/ANAISMUSE/phishing-detector-based-on-LLM
标签:#护网
GitHub
GitHub - ANAISMUSE/phishing-detector-based-on-LLM: 开发了一个基于大语言模型(DeepSeek)的智能钓鱼邮件检测系统,能够识别传统钓鱼、AI生成钓鱼和混合型钓鱼攻击,为网络安全防护提供智能化解决方案。
开发了一个基于大语言模型(DeepSeek)的智能钓鱼邮件检测系统,能够识别传统钓鱼、AI生成钓鱼和混合型钓鱼攻击,为网络安全防护提供智能化解决方案。 - ANAISMUSE/phishing-detector-based-on-LLM
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:🔧 Experiment with replacing Cobalt Strike's evasion techniques using Crystal Palace PIC(O)s for enhanced evasion in advanced scenarios.
URL:https://github.com/EndrewDev/Crystal-Kit
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:🔧 Experiment with replacing Cobalt Strike's evasion techniques using Crystal Palace PIC(O)s for enhanced evasion in advanced scenarios.
URL:https://github.com/EndrewDev/Crystal-Kit
标签:#Cobalt Strike
GitHub
GitHub - EndrewDev/Crystal-Kit: 🔧 Experiment with replacing Cobalt Strike's evasion techniques using Crystal Palace PIC(O)s for…
🔧 Experiment with replacing Cobalt Strike's evasion techniques using Crystal Palace PIC(O)s for enhanced evasion in advanced scenarios. - EndrewDev/Crystal-Kit
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI Cybersecurity Analyst – Blue & Red Team Assistant for Gemini/ChatGPT
URL:https://github.com/Latowmwo/ShellCode-Encrypt-Tool-Xor-Aes-Fud-Stable
标签:#Red Team
更新了:Red Team
描述:AI Cybersecurity Analyst – Blue & Red Team Assistant for Gemini/ChatGPT
URL:https://github.com/Latowmwo/ShellCode-Encrypt-Tool-Xor-Aes-Fud-Stable
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-61481
URL:https://github.com/B1ack4sh/CVE-2025-61481
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-61481
URL:https://github.com/B1ack4sh/CVE-2025-61481
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/CVE-2025-61481: CVE-2025-61481
CVE-2025-61481. Contribute to B1ack4sh/CVE-2025-61481 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-61481
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-61481
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-61481
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-61481
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55752
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-55752
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55752
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-55752
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59287 注入WolfShell内存马
URL:https://github.com/0x7556/CVE-2025-59287
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59287 注入WolfShell内存马
URL:https://github.com/0x7556/CVE-2025-59287
标签:#CVE-2025
GitHub
GitHub - 0x7556/CVE-2025-59287: CVE-2025-59287 注入WolfShell内存马
CVE-2025-59287 注入WolfShell内存马. Contribute to 0x7556/CVE-2025-59287 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:一个覆盖常见 PHP 代码审计知识点的本地靶场。参考 DVWA / Pikachu 的组织方式,含安装向导与通关教程。
URL:https://github.com/duckpigdog/PHP-Code-Sec
标签:#代码审计
更新了:代码审计
描述:一个覆盖常见 PHP 代码审计知识点的本地靶场。参考 DVWA / Pikachu 的组织方式,含安装向导与通关教程。
URL:https://github.com/duckpigdog/PHP-Code-Sec
标签:#代码审计
GitHub监控消息提醒!!!
更新了:RCE
描述:A simple script to protect Windows from attacks like SMB RCE
URL:https://github.com/Mr-DS-ML-85/Harden-Windows
标签:#RCE
更新了:RCE
描述:A simple script to protect Windows from attacks like SMB RCE
URL:https://github.com/Mr-DS-ML-85/Harden-Windows
标签:#RCE
GitHub
GitHub - Mr-DS-ML-85/Harden-Windows: A simple script to protect Windows from attacks like SMB RCE
A simple script to protect Windows from attacks like SMB RCE - GitHub - Mr-DS-ML-85/Harden-Windows: A simple script to protect Windows from attacks like SMB RCE
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Teaming Extension for Chrome
URL:https://github.com/delher/RTapp
标签:#Red Team
更新了:Red Team
描述:Red Teaming Extension for Chrome
URL:https://github.com/delher/RTapp
标签:#Red Team
GitHub
GitHub - delher/RTapp: Red Teaming Extension for Chrome
Red Teaming Extension for Chrome. Contribute to delher/RTapp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-10035
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-10035
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-10035
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-10035
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-26625
URL:https://github.com/Mitchellzhou1/CVE_2025_26625
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-26625
URL:https://github.com/Mitchellzhou1/CVE_2025_26625
标签:#CVE-2025
GitHub
GitHub - Mitchellzhou1/CVE_2025_26625_PoC: testing
testing. Contribute to Mitchellzhou1/CVE_2025_26625_PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for CVE-2025-24367
URL:https://github.com/TheCyberGeek/CVE-2025-24367-Cacti-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for CVE-2025-24367
URL:https://github.com/TheCyberGeek/CVE-2025-24367-Cacti-PoC
标签:#CVE-2025
GitHub
GitHub - TheCyberGeek/CVE-2025-24367-Cacti-PoC: Proof of Concept for CVE-2025-24367
Proof of Concept for CVE-2025-24367. Contribute to TheCyberGeek/CVE-2025-24367-Cacti-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:IIS-Reverse-Shell uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines.
URL:https://github.com/Lcdemi/IIS-Reverse-Shell
标签:#RCE
更新了:RCE
描述:IIS-Reverse-Shell uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines.
URL:https://github.com/Lcdemi/IIS-Reverse-Shell
标签:#RCE
GitHub
GitHub - Lcdemi/IIS-Reverse-Shell: IIS-Reverse-Shell uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server…
IIS-Reverse-Shell uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines. - Lcdemi/IIS-Rev...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:SQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via time-based blind SQLi. For authorized penetration testing only.
URL:https://github.com/XploitGh0st/CVE-2025-26794-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:SQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via time-based blind SQLi. For authorized penetration testing only.
URL:https://github.com/XploitGh0st/CVE-2025-26794-exploit
标签:#CVE-2025
GitHub
GitHub - XploitGh0st/CVE-2025-26794-exploit: SQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via…
SQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via time-based blind SQLi. For authorized penetration testing only. - XploitGh0st/CVE-2025-26794-exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-concept for CVE-2025-49844
URL:https://github.com/saneki/cve-2025-49844
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-concept for CVE-2025-49844
URL:https://github.com/saneki/cve-2025-49844
标签:#CVE-2025
GitHub
GitHub - saneki/cve-2025-49844: Proof-of-concept for CVE-2025-49844
Proof-of-concept for CVE-2025-49844. Contribute to saneki/cve-2025-49844 development by creating an account on GitHub.