GitHub监控消息提醒!!!
更新了:攻防
描述:一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
URL:https://github.com/Huu1j/crawl_xz
标签:#攻防
更新了:攻防
描述:一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
URL:https://github.com/Huu1j/crawl_xz
标签:#攻防
GitHub
GitHub - Huu1j/crawl_xz: 一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出 - Huu1j/crawl_xz
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a POC script for CVE-2025-55182 (React SSR RCE)
URL:https://github.com/Darker-Ink/react-ssr-vulnerability
标签:#RCE
更新了:RCE
描述:This is a POC script for CVE-2025-55182 (React SSR RCE)
URL:https://github.com/Darker-Ink/react-ssr-vulnerability
标签:#RCE
GitHub
GitHub - Darker-Ink/react-ssr-vulnerability: This is a POC script for CVE-2025-55182 (React SSR RCE)
This is a POC script for CVE-2025-55182 (React SSR RCE) - Darker-Ink/react-ssr-vulnerability
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for CVE-2025-55182
URL:https://github.com/emadshanab/POC-for-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:POC for CVE-2025-55182
URL:https://github.com/emadshanab/POC-for-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - emadshanab/POC-for-CVE-2025-55182: POC for CVE-2025-55182
POC for CVE-2025-55182. Contribute to emadshanab/POC-for-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Exploit for CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
标签:#RCE
更新了:RCE
描述:Exploit for CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
标签:#RCE
GitHub
GitHub - pyroxenites/Nextjs_RCE_Exploit_Tool: Exploit for CVE-2025-55182 & CVE-2025-66478
Exploit for CVE-2025-55182 & CVE-2025-66478. Contribute to pyroxenites/Nextjs_RCE_Exploit_Tool development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Next.js React Server Components RCE exploit for CVE-2025-55182
URL:https://github.com/Chocapikk/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Next.js React Server Components RCE exploit for CVE-2025-55182
URL:https://github.com/Chocapikk/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Chocapikk/CVE-2025-55182: Next.js React Server Components RCE exploit for CVE-2025-55182
Next.js React Server Components RCE exploit for CVE-2025-55182 - Chocapikk/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182.
URL:https://github.com/mrknow001/RSC_Detector
标签:#CVE-2025
更新了:CVE-2025
描述:Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182.
URL:https://github.com/mrknow001/RSC_Detector
标签:#CVE-2025
GitHub
GitHub - mrknow001/RSC_Detector: Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182.
Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182. - mrknow001/RSC_Detector
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool
URL:https://github.com/Spritualkb/CVE-2025-55182-exp
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool
URL:https://github.com/Spritualkb/CVE-2025-55182-exp
标签:#CVE-2025
GitHub
GitHub - Spritualkb/CVE-2025-55182-exp: CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool
CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool - Spritualkb/CVE-2025-55182-exp
GitHub监控消息提醒!!!
更新了:绕过
描述:LSPosed模块 - 关闭OKHttp3 SSL证书校验,用于绕过证书固定
URL:https://github.com/banchengkemeng/LSPosed_OKHttp3_SSLBypass
标签:#绕过
更新了:绕过
描述:LSPosed模块 - 关闭OKHttp3 SSL证书校验,用于绕过证书固定
URL:https://github.com/banchengkemeng/LSPosed_OKHttp3_SSLBypass
标签:#绕过
GitHub
GitHub - banchengkemeng/LSPosed_OKHttp3_SSLBypass: LSPosed模块 - 关闭OKHttp3 SSL证书校验,用于绕过证书固定
LSPosed模块 - 关闭OKHttp3 SSL证书校验,用于绕过证书固定. Contribute to banchengkemeng/LSPosed_OKHttp3_SSLBypass development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications
URL:https://github.com/Saturate/CVE-2025-55182-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications
URL:https://github.com/Saturate/CVE-2025-55182-Scanner
标签:#CVE-2025
GitHub
GitHub - Saturate/CVE-2025-55182-Scanner: A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications
A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications - Saturate/CVE-2025-55182-Scanner
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite
标签:#Red Team
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite
标签:#Red Team
GitHub
GitHub - 7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite: This repository contains a comprehensive corpus of Large…
This repository contains a comprehensive corpus of Large Language Model (LLM) attack vectors and a Python test harness to evaluate model robustness. It covers techniques ranging from basic prompt i...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/Ashwesker/Blackash-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/Ashwesker/Blackash-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-55182: CVE-2025-55182
CVE-2025-55182. Contribute to Ashwesker/Blackash-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:基于 CVE-2025-55182 burpsuite 被动扫描插件
URL:https://github.com/Pizz33/CVE-2025-55182-burpscanner
标签:#CVE-2025
更新了:CVE-2025
描述:基于 CVE-2025-55182 burpsuite 被动扫描插件
URL:https://github.com/Pizz33/CVE-2025-55182-burpscanner
标签:#CVE-2025
GitHub
GitHub - Pizz33/CVE-2025-55182-burpscanner: 基于 CVE-2025-55182 漏洞检测 burpsuite 被动扫描插件
基于 CVE-2025-55182 漏洞检测 burpsuite 被动扫描插件. Contribute to Pizz33/CVE-2025-55182-burpscanner development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:lab_demo CVE-2025-55182
URL:https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:lab_demo CVE-2025-55182
URL:https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182
标签:#CVE-2025
GitHub
Sotatek-KhaiNguyen3/CVE-2025-55182
lab_demo CVE-2025-55182. Contribute to Sotatek-KhaiNguyen3/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Elitamz/Cobalt-Strike-csload-plugin
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Elitamz/Cobalt-Strike-csload-plugin
标签:#bypass AntiVirus
GitHub
GitHub - Elitamz/Cobalt-Strike-csload-plugin: A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software. - Elitamz/Cobalt-Strike-csload-plugin
GitHub监控消息提醒!!!
更新了:免杀
描述:SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
URL:https://github.com/6yx1n/sharkBlind
标签:#免杀
更新了:免杀
描述:SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
URL:https://github.com/6yx1n/sharkBlind
标签:#免杀
GitHub
GitHub - 6yx1n/sharkBlind: SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。 - 6yx1n/sharkBlind
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/aingram702/Recon-Superpowers
标签:#Red Team
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/aingram702/Recon-Superpowers
标签:#Red Team
GitHub
GitHub - aingram702/Recon-Superpowers: The swiss-army knife of recon tools! Recon-Superpowers is just like the name suggests, it…
The swiss-army knife of recon tools! Recon-Superpowers is just like the name suggests, it is a superpower for any security analyst or red-teamer to perform quick recon in single interface! If you p...
GitHub监控消息提醒!!!
更新了:burp
描述:sql-injection, burp suite, bypass validation, sql map
URL:https://github.com/PoeenCy/web-ctf-challenge
标签:#burp
更新了:burp
描述:sql-injection, burp suite, bypass validation, sql map
URL:https://github.com/PoeenCy/web-ctf-challenge
标签:#burp
GitHub
GitHub - PoeenCy/web-ctf-challenge: sql-injection, burp suite, bypass validation, sql map
sql-injection, burp suite, bypass validation, sql map - GitHub - PoeenCy/web-ctf-challenge: sql-injection, burp suite, bypass validation, sql map