GitHub监控消息提醒!!!
更新了:护网
描述:开发了一个基于大语言模型(DeepSeek)的智能钓鱼邮件检测系统,能够识别传统钓鱼、AI生成钓鱼和混合型钓鱼攻击,为网络安全防护提供智能化解决方案。
URL:https://github.com/ANAISMUSE/phishing-detector-based-on-LLM
标签:#护网
更新了:护网
描述:开发了一个基于大语言模型(DeepSeek)的智能钓鱼邮件检测系统,能够识别传统钓鱼、AI生成钓鱼和混合型钓鱼攻击,为网络安全防护提供智能化解决方案。
URL:https://github.com/ANAISMUSE/phishing-detector-based-on-LLM
标签:#护网
GitHub
GitHub - ANAISMUSE/phishing-detector-based-on-LLM: 开发了一个基于大语言模型(DeepSeek)的智能钓鱼邮件检测系统,能够识别传统钓鱼、AI生成钓鱼和混合型钓鱼攻击,为网络安全防护提供智能化解决方案。
开发了一个基于大语言模型(DeepSeek)的智能钓鱼邮件检测系统,能够识别传统钓鱼、AI生成钓鱼和混合型钓鱼攻击,为网络安全防护提供智能化解决方案。 - ANAISMUSE/phishing-detector-based-on-LLM
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:🔧 Experiment with replacing Cobalt Strike's evasion techniques using Crystal Palace PIC(O)s for enhanced evasion in advanced scenarios.
URL:https://github.com/EndrewDev/Crystal-Kit
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:🔧 Experiment with replacing Cobalt Strike's evasion techniques using Crystal Palace PIC(O)s for enhanced evasion in advanced scenarios.
URL:https://github.com/EndrewDev/Crystal-Kit
标签:#Cobalt Strike
GitHub
GitHub - EndrewDev/Crystal-Kit: 🔧 Experiment with replacing Cobalt Strike's evasion techniques using Crystal Palace PIC(O)s for…
🔧 Experiment with replacing Cobalt Strike's evasion techniques using Crystal Palace PIC(O)s for enhanced evasion in advanced scenarios. - EndrewDev/Crystal-Kit
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI Cybersecurity Analyst – Blue & Red Team Assistant for Gemini/ChatGPT
URL:https://github.com/Latowmwo/ShellCode-Encrypt-Tool-Xor-Aes-Fud-Stable
标签:#Red Team
更新了:Red Team
描述:AI Cybersecurity Analyst – Blue & Red Team Assistant for Gemini/ChatGPT
URL:https://github.com/Latowmwo/ShellCode-Encrypt-Tool-Xor-Aes-Fud-Stable
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-61481
URL:https://github.com/B1ack4sh/CVE-2025-61481
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-61481
URL:https://github.com/B1ack4sh/CVE-2025-61481
标签:#CVE-2025
GitHub
GitHub - B1ack4sh/CVE-2025-61481: CVE-2025-61481
CVE-2025-61481. Contribute to B1ack4sh/CVE-2025-61481 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-61481
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-61481
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-61481
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-61481
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55752
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-55752
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55752
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-55752
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59287 注入WolfShell内存马
URL:https://github.com/0x7556/CVE-2025-59287
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59287 注入WolfShell内存马
URL:https://github.com/0x7556/CVE-2025-59287
标签:#CVE-2025
GitHub
GitHub - 0x7556/CVE-2025-59287: CVE-2025-59287 注入WolfShell内存马
CVE-2025-59287 注入WolfShell内存马. Contribute to 0x7556/CVE-2025-59287 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:一个覆盖常见 PHP 代码审计知识点的本地靶场。参考 DVWA / Pikachu 的组织方式,含安装向导与通关教程。
URL:https://github.com/duckpigdog/PHP-Code-Sec
标签:#代码审计
更新了:代码审计
描述:一个覆盖常见 PHP 代码审计知识点的本地靶场。参考 DVWA / Pikachu 的组织方式,含安装向导与通关教程。
URL:https://github.com/duckpigdog/PHP-Code-Sec
标签:#代码审计
GitHub监控消息提醒!!!
更新了:RCE
描述:A simple script to protect Windows from attacks like SMB RCE
URL:https://github.com/Mr-DS-ML-85/Harden-Windows
标签:#RCE
更新了:RCE
描述:A simple script to protect Windows from attacks like SMB RCE
URL:https://github.com/Mr-DS-ML-85/Harden-Windows
标签:#RCE
GitHub
GitHub - Mr-DS-ML-85/Harden-Windows: A simple script to protect Windows from attacks like SMB RCE
A simple script to protect Windows from attacks like SMB RCE - GitHub - Mr-DS-ML-85/Harden-Windows: A simple script to protect Windows from attacks like SMB RCE
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Teaming Extension for Chrome
URL:https://github.com/delher/RTapp
标签:#Red Team
更新了:Red Team
描述:Red Teaming Extension for Chrome
URL:https://github.com/delher/RTapp
标签:#Red Team
GitHub
GitHub - delher/RTapp: Red Teaming Extension for Chrome
Red Teaming Extension for Chrome. Contribute to delher/RTapp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-10035
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-10035
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-10035
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-10035
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-26625
URL:https://github.com/Mitchellzhou1/CVE_2025_26625
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-26625
URL:https://github.com/Mitchellzhou1/CVE_2025_26625
标签:#CVE-2025
GitHub
GitHub - Mitchellzhou1/CVE_2025_26625_PoC: testing
testing. Contribute to Mitchellzhou1/CVE_2025_26625_PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for CVE-2025-24367
URL:https://github.com/TheCyberGeek/CVE-2025-24367-Cacti-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for CVE-2025-24367
URL:https://github.com/TheCyberGeek/CVE-2025-24367-Cacti-PoC
标签:#CVE-2025
GitHub
GitHub - TheCyberGeek/CVE-2025-24367-Cacti-PoC: Proof of Concept for CVE-2025-24367
Proof of Concept for CVE-2025-24367. Contribute to TheCyberGeek/CVE-2025-24367-Cacti-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:IIS-Reverse-Shell uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines.
URL:https://github.com/Lcdemi/IIS-Reverse-Shell
标签:#RCE
更新了:RCE
描述:IIS-Reverse-Shell uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines.
URL:https://github.com/Lcdemi/IIS-Reverse-Shell
标签:#RCE
GitHub
GitHub - Lcdemi/IIS-Reverse-Shell: IIS-Reverse-Shell uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server…
IIS-Reverse-Shell uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines. - Lcdemi/IIS-Rev...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:SQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via time-based blind SQLi. For authorized penetration testing only.
URL:https://github.com/XploitGh0st/CVE-2025-26794-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:SQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via time-based blind SQLi. For authorized penetration testing only.
URL:https://github.com/XploitGh0st/CVE-2025-26794-exploit
标签:#CVE-2025
GitHub
GitHub - XploitGh0st/CVE-2025-26794-exploit: SQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via…
SQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via time-based blind SQLi. For authorized penetration testing only. - XploitGh0st/CVE-2025-26794-exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-concept for CVE-2025-49844
URL:https://github.com/saneki/cve-2025-49844
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-concept for CVE-2025-49844
URL:https://github.com/saneki/cve-2025-49844
标签:#CVE-2025
GitHub
GitHub - saneki/cve-2025-49844: Proof-of-concept for CVE-2025-49844
Proof-of-concept for CVE-2025-49844. Contribute to saneki/cve-2025-49844 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A deliberately vulnerable web application demonstrating various SQL injection techniques and PostgreSQL RCE escalation.
URL:https://github.com/tramanh2604/SQL-Injection-Lab
标签:#RCE
更新了:RCE
描述:A deliberately vulnerable web application demonstrating various SQL injection techniques and PostgreSQL RCE escalation.
URL:https://github.com/tramanh2604/SQL-Injection-Lab
标签:#RCE
GitHub
GitHub - tramanh2604/SQL-Injection-Lab: A deliberately vulnerable web application demonstrating various SQL injection techniques…
A deliberately vulnerable web application demonstrating various SQL injection techniques and PostgreSQL RCE escalation. - tramanh2604/SQL-Injection-Lab
GitHub监控消息提醒!!!
更新了:渗透测试
描述:AiScan-N 来了!这是一款基于人工智能的Ai全自动化渗透测试工具,专为企业和个人用户打造,尤其适合初学者(小白)快速上手使用,让你轻松迈入智能安全攻防时代!
URL:https://github.com/SecNN/AiScan-N
标签:#渗透测试
更新了:渗透测试
描述:AiScan-N 来了!这是一款基于人工智能的Ai全自动化渗透测试工具,专为企业和个人用户打造,尤其适合初学者(小白)快速上手使用,让你轻松迈入智能安全攻防时代!
URL:https://github.com/SecNN/AiScan-N
标签:#渗透测试
GitHub
GitHub - SecNN/AiScan-N: AiScan-N 来了!这是一款基于人工智能驱动的Ai自动化网络安全(运维)工具,专注于网络安全评估、漏洞扫描、运维、应急响应、渗透测试自动化,Ai大模型工具集【CLI Agent】 ,Ai驱动的安全检…
AiScan-N 来了!这是一款基于人工智能驱动的Ai自动化网络安全(运维)工具,专注于网络安全评估、漏洞扫描、运维、应急响应、渗透测试自动化,Ai大模型工具集【CLI Agent】 ,Ai驱动的安全检测技术,提升安全测试(运维)效率,专为企业和个人用户打造,尤其适合初学者(小白)快速上手使用,让你轻松迈入智能安全攻防时代!适用场景 :如(红队演练、CTF比赛、Web应用渗透测试、内网横向移...