GitHub监控消息提醒!!!
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite
标签:#Red Team
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite
标签:#Red Team
GitHub
GitHub - 7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite: This repository contains a comprehensive corpus of Large…
This repository contains a comprehensive corpus of Large Language Model (LLM) attack vectors and a Python test harness to evaluate model robustness. It covers techniques ranging from basic prompt i...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/Ashwesker/Blackash-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/Ashwesker/Blackash-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-55182: CVE-2025-55182
CVE-2025-55182. Contribute to Ashwesker/Blackash-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:基于 CVE-2025-55182 burpsuite 被动扫描插件
URL:https://github.com/Pizz33/CVE-2025-55182-burpscanner
标签:#CVE-2025
更新了:CVE-2025
描述:基于 CVE-2025-55182 burpsuite 被动扫描插件
URL:https://github.com/Pizz33/CVE-2025-55182-burpscanner
标签:#CVE-2025
GitHub
GitHub - Pizz33/CVE-2025-55182-burpscanner: 基于 CVE-2025-55182 漏洞检测 burpsuite 被动扫描插件
基于 CVE-2025-55182 漏洞检测 burpsuite 被动扫描插件. Contribute to Pizz33/CVE-2025-55182-burpscanner development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:lab_demo CVE-2025-55182
URL:https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:lab_demo CVE-2025-55182
URL:https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182
标签:#CVE-2025
GitHub
Sotatek-KhaiNguyen3/CVE-2025-55182
lab_demo CVE-2025-55182. Contribute to Sotatek-KhaiNguyen3/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Elitamz/Cobalt-Strike-csload-plugin
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Elitamz/Cobalt-Strike-csload-plugin
标签:#bypass AntiVirus
GitHub
GitHub - Elitamz/Cobalt-Strike-csload-plugin: A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software. - Elitamz/Cobalt-Strike-csload-plugin
GitHub监控消息提醒!!!
更新了:免杀
描述:SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
URL:https://github.com/6yx1n/sharkBlind
标签:#免杀
更新了:免杀
描述:SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
URL:https://github.com/6yx1n/sharkBlind
标签:#免杀
GitHub
GitHub - 6yx1n/sharkBlind: SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。 - 6yx1n/sharkBlind
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/aingram702/Recon-Superpowers
标签:#Red Team
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/aingram702/Recon-Superpowers
标签:#Red Team
GitHub
GitHub - aingram702/Recon-Superpowers: The swiss-army knife of recon tools! Recon-Superpowers is just like the name suggests, it…
The swiss-army knife of recon tools! Recon-Superpowers is just like the name suggests, it is a superpower for any security analyst or red-teamer to perform quick recon in single interface! If you p...
GitHub监控消息提醒!!!
更新了:burp
描述:sql-injection, burp suite, bypass validation, sql map
URL:https://github.com/PoeenCy/web-ctf-challenge
标签:#burp
更新了:burp
描述:sql-injection, burp suite, bypass validation, sql map
URL:https://github.com/PoeenCy/web-ctf-challenge
标签:#burp
GitHub
GitHub - PoeenCy/web-ctf-challenge: sql-injection, burp suite, bypass validation, sql map
sql-injection, burp suite, bypass validation, sql map - GitHub - PoeenCy/web-ctf-challenge: sql-injection, burp suite, bypass validation, sql map
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2021-3007 Vulnerable Test Environment - Laminas/Zend Framework Deserialization RCE
URL:https://github.com/KrE80r/cve-2021-3007-vulnerable
标签:#RCE
更新了:RCE
描述:CVE-2021-3007 Vulnerable Test Environment - Laminas/Zend Framework Deserialization RCE
URL:https://github.com/KrE80r/cve-2021-3007-vulnerable
标签:#RCE
GitHub
GitHub - KrE80r/cve-2021-3007-vulnerable: CVE-2021-3007 Vulnerable Test Environment - Laminas/Zend Framework Deserialization RCE
CVE-2021-3007 Vulnerable Test Environment - Laminas/Zend Framework Deserialization RCE - KrE80r/cve-2021-3007-vulnerable
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:An analysis of CVE-2025-55182 and CVE-2025-66478 -- the vulnerabilities behind React2Shell. Tools, technical information, etc
URL:https://github.com/freeqaz/react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:An analysis of CVE-2025-55182 and CVE-2025-66478 -- the vulnerabilities behind React2Shell. Tools, technical information, etc
URL:https://github.com/freeqaz/react2shell
标签:#CVE-2025
GitHub
GitHub - freeqaz/react2shell: An analysis of CVE-2025-55182 and CVE-2025-66478 -- the vulnerabilities behind React2Shell. Tools…
An analysis of CVE-2025-55182 and CVE-2025-66478 -- the vulnerabilities behind React2Shell. Tools, technical information, etc - freeqaz/react2shell
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Docker lab for CVE-2025-55182 detection and exploitation
URL:https://github.com/l4rm4nd/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Docker lab for CVE-2025-55182 detection and exploitation
URL:https://github.com/l4rm4nd/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - l4rm4nd/CVE-2025-55182: Docker poc lab for CVE-2025-55182 / CVE-2025-66478 (React2Shell) detection and exploitation
Docker poc lab for CVE-2025-55182 / CVE-2025-66478 (React2Shell) detection and exploitation - l4rm4nd/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:浅谈React Server Components RCE 漏洞分析
URL:https://github.com/Airis101/CVE-2025-55182-analysis
标签:#CVE-2025
更新了:CVE-2025
描述:浅谈React Server Components RCE 漏洞分析
URL:https://github.com/Airis101/CVE-2025-55182-analysis
标签:#CVE-2025
GitHub
GitHub - Airis101/CVE-2025-55182-analysis: 浅谈React Server Components RCE 漏洞分析
浅谈React Server Components RCE 漏洞分析. Contribute to Airis101/CVE-2025-55182-analysis development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:React Server Components 远程代码执行漏洞(CVE-2025-55182)
URL:https://github.com/GelukCrab/React-Server-Components-RCE
标签:#RCE
更新了:RCE
描述:React Server Components 远程代码执行漏洞(CVE-2025-55182)
URL:https://github.com/GelukCrab/React-Server-Components-RCE
标签:#RCE
GitHub
GitHub - GelukCrab/React-Server-Components-RCE: React Server Components 远程代码执行漏洞(CVE-2025-55182)
React Server Components 远程代码执行漏洞(CVE-2025-55182). Contribute to GelukCrab/React-Server-Components-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Interactive RCE Web Shell (CVE-2025-55182) BY Golden-Security
URL:https://github.com/Golden-Secure/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Interactive RCE Web Shell (CVE-2025-55182) BY Golden-Security
URL:https://github.com/Golden-Secure/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Golden-Secure/CVE-2025-55182: Interactive RCE Web Shell (CVE-2025-55182) BY Golden-Security
Interactive RCE Web Shell (CVE-2025-55182) BY Golden-Security - Golden-Secure/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit/PoC code for CVE-2025-1913
URL:https://github.com/S0haib518-KSA/CVE-2025-1913-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit/PoC code for CVE-2025-1913
URL:https://github.com/S0haib518-KSA/CVE-2025-1913-PoC
标签:#CVE-2025
GitHub
GitHub - S0haib518-KSA/CVE-2025-1913-PoC: A PoC demonstrating CVE-2025-1913, showing how the plugin’s unsafe unserialize handling…
A PoC demonstrating CVE-2025-1913, showing how the plugin’s unsafe unserialize handling can lead to high-impact behavior in controlled environments. Contains a harmful payload for authorized testin...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:研究CVE-2025-55182全版本利用漏洞
URL:https://github.com/XiaomingX/CVE-2025-55182-poc
标签:#CVE-2025
更新了:CVE-2025
描述:研究CVE-2025-55182全版本利用漏洞
URL:https://github.com/XiaomingX/CVE-2025-55182-poc
标签:#CVE-2025
GitHub
GitHub - XiaomingX/CVE-2025-55182-poc: 研究CVE-2025-55182全版本利用漏洞
研究CVE-2025-55182全版本利用漏洞. Contribute to XiaomingX/CVE-2025-55182-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:研究CVE-2025-55182全版本利用漏洞
URL:https://github.com/Rat5ak/CVE-2025-55182-React2Shell-RCE-POC
标签:#CVE-2025
更新了:CVE-2025
描述:研究CVE-2025-55182全版本利用漏洞
URL:https://github.com/Rat5ak/CVE-2025-55182-React2Shell-RCE-POC
标签:#CVE-2025
GitHub
GitHub - Rat5ak/CVE-2025-55182-React2Shell-RCE-POC: This repository documents research into deserialization behavior within Next.js…
This repository documents research into deserialization behavior within Next.js React Server Components (RSC) using the Flight protocol. It focuses on how malformed multipart bodies combined with S...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cooolis-ms is a tool that incorporates the Metasploit Payload Loader, Cobalt Strike External C2 Loader, and Reflective DLL injection.
URL:https://github.com/otuhsgcasg/Cooolis-ms-C2-Loader-Metasploit
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cooolis-ms is a tool that incorporates the Metasploit Payload Loader, Cobalt Strike External C2 Loader, and Reflective DLL injection.
URL:https://github.com/otuhsgcasg/Cooolis-ms-C2-Loader-Metasploit
标签:#Cobalt Strike
GitHub
GitHub - otuhsgcasg/Cooolis-ms-C2-Loader-Metasploit: Cooolis-ms is a tool that incorporates the Metasploit Payload Loader, Cobalt…
Cooolis-ms is a tool that incorporates the Metasploit Payload Loader, Cobalt Strike External C2 Loader, and Reflective DLL injection. - otuhsgcasg/Cooolis-ms-C2-Loader-Metasploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC: CVE-2025-55182 (React) and CVE-2025-66478 (Next.js)
URL:https://github.com/nehkark/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:PoC: CVE-2025-55182 (React) and CVE-2025-66478 (Next.js)
URL:https://github.com/nehkark/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - nehkark/CVE-2025-55182: PoC: CVE-2025-55182 (React) and CVE-2025-66478 (Next.js)
PoC: CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) - nehkark/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:RCE
描述:Host-based detection rules for the RCE vulnerability in the React JavaScript framework.
URL:https://github.com/nerium-security/CVE-2025-55182
标签:#RCE
更新了:RCE
描述:Host-based detection rules for the RCE vulnerability in the React JavaScript framework.
URL:https://github.com/nerium-security/CVE-2025-55182
标签:#RCE
GitHub
GitHub - nerium-security/CVE-2025-55182: Host-based detection rules for the RCE vulnerability in the React JavaScript framework.
Host-based detection rules for the RCE vulnerability in the React JavaScript framework. - nerium-security/CVE-2025-55182