GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65637: Logrus Denial of Service Vulnerability
URL:https://github.com/mjuanxd/logrus-dos-poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65637: Logrus Denial of Service Vulnerability
URL:https://github.com/mjuanxd/logrus-dos-poc
标签:#CVE-2025
GitHub
GitHub - mjuanxd/logrus-dos-poc: CVE-2025-65637: Logrus Denial of Service Vulnerability
CVE-2025-65637: Logrus Denial of Service Vulnerability - mjuanxd/logrus-dos-poc
GitHub监控消息提醒!!!
更新了:应急响应
描述:基于若依框架的综合性应急指挥管理系统,提供应急响应、资源管理、视频监控、知识库等一体化解决方案
URL:https://github.com/oliverxu1996/aegis-command
标签:#应急响应
更新了:应急响应
描述:基于若依框架的综合性应急指挥管理系统,提供应急响应、资源管理、视频监控、知识库等一体化解决方案
URL:https://github.com/oliverxu1996/aegis-command
标签:#应急响应
GitHub
GitHub - oliverxu1996/aegis-command: 基于若依框架的综合性应急指挥管理系统,提供应急响应、资源管理、视频监控、知识库等一体化解决方案
基于若依框架的综合性应急指挥管理系统,提供应急响应、资源管理、视频监控、知识库等一体化解决方案. Contribute to oliverxu1996/aegis-command development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙
URL:https://github.com/Maleick/Cobalt-Docker
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙
URL:https://github.com/Maleick/Cobalt-Docker
标签:#Cobalt Strike
GitHub
GitHub - Maleick/Cobalt-Docker: Updated for 4.12. This project provides a simple way to build and run a Cobalt Strike team server…
Updated for 4.12. This project provides a simple way to build and run a Cobalt Strike team server in a Docker container. It includes a Dockerfile for building the image, a shell script for automati...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept exploit for the Untrusted Pointer Dereference vulnerability in Windows Graphics Component (CVE-2025-50165).
URL:https://github.com/useci-sys/CVE-2025-50165
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept exploit for the Untrusted Pointer Dereference vulnerability in Windows Graphics Component (CVE-2025-50165).
URL:https://github.com/useci-sys/CVE-2025-50165
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔒 Manage your server's IP whitelist with ease using iptables, featuring backup, logging, and interactive modes for Red Team vs Blue Team competitions.
URL:https://github.com/DEVayman20/firewall-whitelist-admin
标签:#Red Team
更新了:Red Team
描述:🔒 Manage your server's IP whitelist with ease using iptables, featuring backup, logging, and interactive modes for Red Team vs Blue Team competitions.
URL:https://github.com/DEVayman20/firewall-whitelist-admin
标签:#Red Team
GitHub
GitHub - DEVayman20/firewall-whitelist-admin: 🔒 Manage your server's IP whitelist with ease using iptables, featuring backup, logging…
🔒 Manage your server's IP whitelist with ease using iptables, featuring backup, logging, and interactive modes for Red Team vs Blue Team competitions. - DEVayman20/firewall-whitelist-admin
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59427 Cloudflare & Vite/Wrangler With Simple 403 Bypass
URL:https://github.com/ibnurusdianto/CVE-2025-59427
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59427 Cloudflare & Vite/Wrangler With Simple 403 Bypass
URL:https://github.com/ibnurusdianto/CVE-2025-59427
标签:#CVE-2025
GitHub
GitHub - ibnurusdianto/CVE-2025-59427: CVE-2025-59427 Cloudflare & Vite/Wrangler With Simple 403 Bypass
CVE-2025-59427 Cloudflare & Vite/Wrangler With Simple 403 Bypass - ibnurusdianto/CVE-2025-59427
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/sharma19d/CVE-2025-61148
标签:#CVE-2025
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/sharma19d/CVE-2025-61148
标签:#CVE-2025
GitHub
GitHub - sharma19d/CVE-2025-61148: The vulnerability exists in the Student Payment API. The application fails to properly validate…
The vulnerability exists in the Student Payment API. The application fails to properly validate whether the user requesting a receipt is authorized to view it. By modifying the rec_no parameter in ...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一个用于 AI 驱动的渗透测试竞赛的**模型上下文协议 (MCP)** 服务器。该工 具提供了一个完整的 API 接口,使 LLM 能够自主参与 CTF 挑战。
URL:https://github.com/m-sec-org/ez-xbow-platform-mcp
标签:#渗透测试
更新了:渗透测试
描述:一个用于 AI 驱动的渗透测试竞赛的**模型上下文协议 (MCP)** 服务器。该工 具提供了一个完整的 API 接口,使 LLM 能够自主参与 CTF 挑战。
URL:https://github.com/m-sec-org/ez-xbow-platform-mcp
标签:#渗透测试
GitHub
GitHub - m-sec-org/ez-xbow-platform-mcp: 一个用于 AI 驱动的渗透测试竞赛的**模型上下文协议 (MCP)** 服务器。该工 具提供了一个完整的 API 接口,使 LLM 能够自主参与 CTF 挑战。
一个用于 AI 驱动的渗透测试竞赛的**模型上下文协议 (MCP)** 服务器。该工 具提供了一个完整的 API 接口,使 LLM 能够自主参与 CTF 挑战。 - m-sec-org/ez-xbow-platform-mcp
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/kevinyang5771323/YXZgWWDpWA
标签:#应急响应
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/kevinyang5771323/YXZgWWDpWA
标签:#应急响应
GitHub
GitHub - kevinyang5771323/YXZgWWDpWA: 本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技…
本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。 - kevinyang5771323/YXZgWWDpWA
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/laowang111101/tpUlcWKBAT
标签:#应急响应
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/laowang111101/tpUlcWKBAT
标签:#应急响应
GitHub
GitHub - laowang111101/tpUlcWKBAT: 本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构…
本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。 - laowang111101/tpUlcWKBAT
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:🛠️ Leverage BOF Spawn for advanced process injection and shellcode execution with evasion techniques to enhance your Cobalt Strike operations.
URL:https://github.com/KaztoRay/Cardinal-C2-Framework
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:🛠️ Leverage BOF Spawn for advanced process injection and shellcode execution with evasion techniques to enhance your Cobalt Strike operations.
URL:https://github.com/KaztoRay/Cardinal-C2-Framework
标签:#Cobalt Strike
GitHub
GitHub - KaztoRay/Cardinal-C2-Framework: Cardinal C2 Framework is a comprehensive Command & Control system specifically designed…
Cardinal C2 Framework is a comprehensive Command & Control system specifically designed for penetration testing legacy Windows environments. It provides a modern, Cobalt Strike-inspired int...
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/Shiva108/ai-llm-red-team-handbook
标签:#Red Team
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/Shiva108/ai-llm-red-team-handbook
标签:#Red Team
GitHub
GitHub - Shiva108/ai-llm-red-team-handbook: AI / LLM Red Team Field Manual & Consultant’s Handbook
AI / LLM Red Team Field Manual & Consultant’s Handbook - Shiva108/ai-llm-red-team-handbook
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-13372
URL:https://github.com/Ashwesker/Blackash-CVE-2025-13372
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-13372
URL:https://github.com/Ashwesker/Blackash-CVE-2025-13372
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-13372: CVE-2025-13372
CVE-2025-13372. Contribute to Ashwesker/Blackash-CVE-2025-13372 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Blue Team vs Red Team fight in a Wi-Fi enabled scenario
URL:https://github.com/NS-Projects-Unina/WiFi_Blue_vs_Red_1
标签:#Red Team
更新了:Red Team
描述:Blue Team vs Red Team fight in a Wi-Fi enabled scenario
URL:https://github.com/NS-Projects-Unina/WiFi_Blue_vs_Red_1
标签:#Red Team
GitHub
GitHub - NS-Projects-Unina/WiFi_Blue_vs_Red_1: Blue Team vs Red Team fight in a Wi-Fi enabled scenario
Blue Team vs Red Team fight in a Wi-Fi enabled scenario - NS-Projects-Unina/WiFi_Blue_vs_Red_1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-24091
URL:https://github.com/TS0NW0RK/CVE-2025-24091
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-24091
URL:https://github.com/TS0NW0RK/CVE-2025-24091
标签:#CVE-2025
GitHub
TS0NW0RK/CVE-2025-24091
PoC for CVE-2025-24091. Contribute to TS0NW0RK/CVE-2025-24091 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Understanding prompt injection SSRF, RCE and other stuff
URL:https://github.com/noypearl/PromptInjectionPoC
标签:#RCE
更新了:RCE
描述:Understanding prompt injection SSRF, RCE and other stuff
URL:https://github.com/noypearl/PromptInjectionPoC
标签:#RCE
GitHub
noypearl/PromptInjectionPoC
Understanding prompt injection SSRF, RCE and other stuff - noypearl/PromptInjectionPoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public exploit for CVE-2025-41744
URL:https://github.com/gromila7813/CVE-2025-41744
标签:#CVE-2025
更新了:CVE-2025
描述:Public exploit for CVE-2025-41744
URL:https://github.com/gromila7813/CVE-2025-41744
标签:#CVE-2025
GitHub
GitHub - gromila7813/CVE-2025-41744: Public exploit for CVE-2025-41744
Public exploit for CVE-2025-41744. Contribute to gromila7813/CVE-2025-41744 development by creating an account on GitHub.