GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.
URL:https://github.com/CodeXTF2/CustomC2ChannelTemplate
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.
URL:https://github.com/CodeXTF2/CustomC2ChannelTemplate
标签:#Cobalt Strike
GitHub
GitHub - CodeXTF2/CustomC2ChannelTemplate: template for developing custom C2 channels for Cobalt Strike using IAT hooks applied…
template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader. - CodeXTF2/CustomC2ChannelTemplate
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public exploit for CVE-2025-13559
URL:https://github.com/twiggy23buck/CVE-2025-13559-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Public exploit for CVE-2025-13559
URL:https://github.com/twiggy23buck/CVE-2025-13559-Exploit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public exploit for CVE-2025-13559
URL:https://github.com/nehkark/CVE-2025-62168
标签:#CVE-2025
更新了:CVE-2025
描述:Public exploit for CVE-2025-13559
URL:https://github.com/nehkark/CVE-2025-62168
标签:#CVE-2025
GitHub
GitHub - nehkark/CVE-2025-62168: Proof-of-Concept (PoC) for CVE-2025-62168 👾
Proof-of-Concept (PoC) for CVE-2025-62168 👾 . Contribute to nehkark/CVE-2025-62168 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:Cloudflare Worker代理 · IP伪装与指纹轮换 · 无需Cookie · 随机住宅IP生成 · X-Forwarded-For等多头注入 · 32位Hex指纹生成 · 智能重试机制(3次) · 绕过设备限制 · 实时身份切换 · OpenAI API兼容 · 流式响应支持 · Web调试面板 · 多风格多比例支持 · 单文件部署
URL:https://github.com/lza6/nanobananaai.org-2api-cfwork
标签:#绕过
更新了:绕过
描述:Cloudflare Worker代理 · IP伪装与指纹轮换 · 无需Cookie · 随机住宅IP生成 · X-Forwarded-For等多头注入 · 32位Hex指纹生成 · 智能重试机制(3次) · 绕过设备限制 · 实时身份切换 · OpenAI API兼容 · 流式响应支持 · Web调试面板 · 多风格多比例支持 · 单文件部署
URL:https://github.com/lza6/nanobananaai.org-2api-cfwork
标签:#绕过
GitHub
GitHub - lza6/nanobananaai.org-2api-cfwork: Cloudflare Worker代理 · IP伪装与指纹轮换 · 无需Cookie · 随机住宅IP生成 · X-Forwarded-For等多头注入 · 32位Hex指纹生成…
Cloudflare Worker代理 · IP伪装与指纹轮换 · 无需Cookie · 随机住宅IP生成 · X-Forwarded-For等多头注入 · 32位Hex指纹生成 · 智能重试机制(3次) · 绕过设备限制 · 实时身份切换 · OpenAI API兼容 · 流式响应支持 · Web调试面板 · 多风格多比例支持 · 单文件部署 - lza6/nanobananaai.org...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept exploits for CVE-2025-34322 and CVE-2025-34323 in Nagios Log Server
URL:https://github.com/mcorybillington/CVE-2025-34322_CVE-2025-34323_Nagios_Log_Server
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept exploits for CVE-2025-34322 and CVE-2025-34323 in Nagios Log Server
URL:https://github.com/mcorybillington/CVE-2025-34322_CVE-2025-34323_Nagios_Log_Server
标签:#CVE-2025
GitHub
GitHub - mcorybillington/CVE-2025-34322_CVE-2025-34323_Nagios_Log_Server: Proof of Concept exploits for CVE-2025-34322 and CVE…
Proof of Concept exploits for CVE-2025-34322 and CVE-2025-34323 in Nagios Log Server - mcorybillington/CVE-2025-34322_CVE-2025-34323_Nagios_Log_Server
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC Lab for CVE-2025-32421 – Next.js Race Condition Cache Poisoning Simulation
URL:https://github.com/Delfaster/CVE-2025-32421---Race-Condition-Vulnerability---Next.js
标签:#CVE-2025
更新了:CVE-2025
描述:PoC Lab for CVE-2025-32421 – Next.js Race Condition Cache Poisoning Simulation
URL:https://github.com/Delfaster/CVE-2025-32421---Race-Condition-Vulnerability---Next.js
标签:#CVE-2025
GitHub
GitHub - Delfaster/CVE-2025-32421---Race-Condition-Vulnerability---Next.js: PoC Lab for CVE-2025-32421 – Next.js Race Condition…
PoC Lab for CVE-2025-32421 – Next.js Race Condition Cache Poisoning Simulation - Delfaster/CVE-2025-32421---Race-Condition-Vulnerability---Next.js
GitHub监控消息提醒!!!
更新了:渗透测试
描述:AegisScan是一款“自动化”的“渗透测试”扫描工具。
URL:https://github.com/Zer08Bytes/AegisScan
标签:#渗透测试
更新了:渗透测试
描述:AegisScan是一款“自动化”的“渗透测试”扫描工具。
URL:https://github.com/Zer08Bytes/AegisScan
标签:#渗透测试
GitHub
GitHub - Zer08Bytes/AegisScan: AegisScan是一款“自动化”的“渗透测试”扫描工具。
AegisScan是一款“自动化”的“渗透测试”扫描工具。. Contribute to Zer08Bytes/AegisScan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:无头浏览器模拟 (Chrome扩展身份) · 随机UUID匿名身份池 · 自动绕过Railway限制 · 原生OpenAI API格式兼容 · 伪流式输出模拟 · 多模型智能路由 (推理/标准/应用) · Cloudflare Worker无服务器部署 · 内置开发者驾驶舱UI · CORS自动处理 · 环境变量密钥管理 · 单文件全功能封装
URL:https://github.com/lza6/teleprompt-2api-cfwork
标签:#绕过
更新了:绕过
描述:无头浏览器模拟 (Chrome扩展身份) · 随机UUID匿名身份池 · 自动绕过Railway限制 · 原生OpenAI API格式兼容 · 伪流式输出模拟 · 多模型智能路由 (推理/标准/应用) · Cloudflare Worker无服务器部署 · 内置开发者驾驶舱UI · CORS自动处理 · 环境变量密钥管理 · 单文件全功能封装
URL:https://github.com/lza6/teleprompt-2api-cfwork
标签:#绕过
GitHub
GitHub - lza6/teleprompt-2api-cfwork: 无头浏览器模拟 (Chrome扩展身份) · 随机UUID匿名身份池 · 自动绕过Railway限制 · 原生OpenAI API格式兼容 · 伪流式输出模拟 · 多模型智能路由…
无头浏览器模拟 (Chrome扩展身份) · 随机UUID匿名身份池 · 自动绕过Railway限制 · 原生OpenAI API格式兼容 · 伪流式输出模拟 · 多模型智能路由 (推理/标准/应用) · Cloudflare Worker无服务器部署 · 内置开发者驾驶舱UI · CORS自动处理 · 环境变量密钥管理 · 单文件全功能封装 - lza6/teleprompt-2api-c...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Road for Become God Of Red Teaming
URL:https://github.com/RicheByte/pentesterplaybook
标签:#Red Team
更新了:Red Team
描述:Road for Become God Of Red Teaming
URL:https://github.com/RicheByte/pentesterplaybook
标签:#Red Team
GitHub
GitHub - RicheByte/pentesterplaybook: Road for Become God Of Red Teaming
Road for Become God Of Red Teaming . Contribute to RicheByte/pentesterplaybook development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:MALTRAIL 0.52 Unauthenticated RCE Exploit
URL:https://github.com/chalabizada/Maltrail-0.52-Exploit-RCE
标签:#RCE
更新了:RCE
描述:MALTRAIL 0.52 Unauthenticated RCE Exploit
URL:https://github.com/chalabizada/Maltrail-0.52-Exploit-RCE
标签:#RCE
GitHub
GitHub - chalabizada/Maltrail-0.52-Exploit-RCE: MALTRAIL 0.52 Unauthenticated RCE Exploit
MALTRAIL 0.52 Unauthenticated RCE Exploit. Contribute to chalabizada/Maltrail-0.52-Exploit-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-58360
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-58360
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-58360
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-58360
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-58360: CVE-2025-58360
CVE-2025-58360. Contribute to Ashwesker/Blackash-CVE-2025-58360 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-29306
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-29306
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-29306
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-29306
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-29306: CVE-2025-29306
CVE-2025-29306. Contribute to Ashwesker/Blackash-CVE-2025-29306 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A public repository containing comprehensive mitigations for currently active RCE exploits in COD games.
URL:https://github.com/Peribunt/COD-RCE-Mitigations
标签:#RCE
更新了:RCE
描述:A public repository containing comprehensive mitigations for currently active RCE exploits in COD games.
URL:https://github.com/Peribunt/COD-RCE-Mitigations
标签:#RCE
GitHub
GitHub - Peribunt/COD-RCE-Mitigations: A public repository containing comprehensive mitigations for currently active RCE exploits…
A public repository containing comprehensive mitigations for currently active RCE exploits in COD games. - Peribunt/COD-RCE-Mitigations
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:automation untuk CVE-2025-65862
URL:https://github.com/rimbadirgantara/opac-fast-automation
标签:#CVE-2025
更新了:CVE-2025
描述:automation untuk CVE-2025-65862
URL:https://github.com/rimbadirgantara/opac-fast-automation
标签:#CVE-2025
GitHub
GitHub - rimbadirgantara/opac-fast-automation: automation untuk CVE-2025-65862
automation untuk CVE-2025-65862. Contribute to rimbadirgantara/opac-fast-automation development by creating an account on GitHub.