GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit PoCs for MARMALDE 2 (CVE-2025-67780) vulnerability in Starlink Dishes
URL:https://github.com/SteveAkawLabs/MARMALADE-2-CVE-2025-67780-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit PoCs for MARMALDE 2 (CVE-2025-67780) vulnerability in Starlink Dishes
URL:https://github.com/SteveAkawLabs/MARMALADE-2-CVE-2025-67780-Exploit
标签:#CVE-2025
GitHub
GitHub - SteveAkawLabs/MARMALADE-2-CVE-2025-67780-Exploit: Exploit PoCs for MARMALDE 2 (CVE-2025-67780) vulnerability in Starlink…
Exploit PoCs for MARMALDE 2 (CVE-2025-67780) vulnerability in Starlink Dishes - SteveAkawLabs/MARMALADE-2-CVE-2025-67780-Exploit
GitHub监控消息提醒!!!
更新了:攻防
描述:一款专注于 Java 主流 Web 中间件的内存马快速生成工具,致力于简化安全研究人员和红队成员的工作流程,提升攻防效率
URL:https://github.com/lje02/wp-manager
标签:#攻防
更新了:攻防
描述:一款专注于 Java 主流 Web 中间件的内存马快速生成工具,致力于简化安全研究人员和红队成员的工作流程,提升攻防效率
URL:https://github.com/lje02/wp-manager
标签:#攻防
GitHub
GitHub - lje02/wp-manager: # 🐳 WordPress Docker 集群一键管家 (V49) 这是一个专为 VPS 设计的轻量级运维脚本,一键解决 WordPress 建站的所有痛点。 ## ✨ 核心亮点 * **🚀 极速部署**:一键安装…
# 🐳 WordPress Docker 集群一键管家 (V49) 这是一个专为 VPS 设计的轻量级运维脚本,一键解决 WordPress 建站的所有痛点。 ## ✨ 核心亮点 * **🚀 极速部署**:一键安装 Docker、WordPress、MySQL、Redis。 * **🔒 自动 HTTPS**:自动申请、续签 SSL 证书,支持证书监控。 * **🛡️ 安全防御**:内置防...
GitHub监控消息提醒!!!
更新了:钓鱼
描述:基于网络流量特征的钓鱼网站检测系统 - 本科毕业设计
URL:https://github.com/Yhhef/phishing-detection
标签:#钓鱼
更新了:钓鱼
描述:基于网络流量特征的钓鱼网站检测系统 - 本科毕业设计
URL:https://github.com/Yhhef/phishing-detection
标签:#钓鱼
GitHub
GitHub - Yhhef/phishing-detection: 基于网络流量特征的钓鱼网站检测系统 - 本科毕业设计
基于网络流量特征的钓鱼网站检测系统 - 本科毕业设计. Contribute to Yhhef/phishing-detection development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:GIT vulnerability | Carriage Return and RCE on cloning
URL:https://github.com/Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478
标签:#RCE
更新了:RCE
描述:GIT vulnerability | Carriage Return and RCE on cloning
URL:https://github.com/Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478
标签:#RCE
GitHub
GitHub - Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478: An advanced vulnerability scanner for detecting **CVE-2025…
An advanced vulnerability scanner for detecting **CVE-2025-55182** and **CVE-2025-66478** - critical Remote Code Execution (RCE) vulnerabilities in Next.js applications using React Server Component...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:ce for CVE-2025-23339
URL:https://github.com/SpiralBL0CK/ce-for-CVE-2025-23339
标签:#CVE-2025
更新了:CVE-2025
描述:ce for CVE-2025-23339
URL:https://github.com/SpiralBL0CK/ce-for-CVE-2025-23339
标签:#CVE-2025
GitHub
GitHub - SpiralBL0CK/ce-for-CVE-2025-23339: ce for CVE-2025-23339
ce for CVE-2025-23339. Contribute to SpiralBL0CK/ce-for-CVE-2025-23339 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypass av
描述:通过Patch白文件实现免杀
URL:https://github.com/Sakura529/BypassAV
标签:#bypass av
更新了:bypass av
描述:通过Patch白文件实现免杀
URL:https://github.com/Sakura529/BypassAV
标签:#bypass av
GitHub
GitHub - Sakura529/BypassAV: 通过Patch白文件实现免杀
通过Patch白文件实现免杀. Contribute to Sakura529/BypassAV development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A POC for the CVE-2025-66516 Apache Tika Vulnerability for eductational pruposes only
URL:https://github.com/sid6224/CVE-2025-66516-POC
标签:#CVE-2025
更新了:CVE-2025
描述:A POC for the CVE-2025-66516 Apache Tika Vulnerability for eductational pruposes only
URL:https://github.com/sid6224/CVE-2025-66516-POC
标签:#CVE-2025
GitHub
GitHub - sid6224/CVE-2025-66516-POC: A POC for the CVE-2025-66516 Apache Tika Vulnerability for educational purposes only
A POC for the CVE-2025-66516 Apache Tika Vulnerability for educational purposes only - sid6224/CVE-2025-66516-POC
GitHub监控消息提醒!!!
更新了:应急响应
描述: 一个自动化的安全应急响应工具,支持远程主机的安全检查、威胁排查和响应处置,集成威胁情报分析和 AI 驱动的安全事件分析能力。
URL:https://github.com/Lserein/mcp-irt
标签:#应急响应
更新了:应急响应
描述: 一个自动化的安全应急响应工具,支持远程主机的安全检查、威胁排查和响应处置,集成威胁情报分析和 AI 驱动的安全事件分析能力。
URL:https://github.com/Lserein/mcp-irt
标签:#应急响应
GitHub
Lserein/mcp-irt
一个自动化的安全应急响应工具,支持远程主机的安全检查、威胁排查和响应处置,集成威胁情报分析和 AI 驱动的安全事件分析能力。 - Lserein/mcp-irt
GitHub监控消息提醒!!!
更新了:代码审计
描述:DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署 ,一键生成报告。让安全不再昂贵,让审计不再复杂。
URL:https://github.com/David-headhunting/-Rust--remote
标签:#代码审计
更新了:代码审计
描述:DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署 ,一键生成报告。让安全不再昂贵,让审计不再复杂。
URL:https://github.com/David-headhunting/-Rust--remote
标签:#代码审计
GitHub
David-headhunting/-Rust--remote
核心职责: 主导Rust跨平台核心组件与系统的架构、开发与性能优化。 攻克FFI绑定、系统集成及底层性能调优等高复杂度技术难题。 建立并推行代码规范、CI/CD及测试体系,主导技术方案创新与落地。 设计维护共享组件库,提升团队开发效率与系统可维护性。 作为技术负责人,进行架构评审、技术指导,推动团队成长与工程文化。 必备要求: 计算机相关专业本科及以上学历。 6年以上开发经验,其中3年以上...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Automated Red Teaming Framework for Agentic Workflows
URL:https://github.com/d01ki/Agent-Slayer
标签:#Red Team
更新了:Red Team
描述:Automated Red Teaming Framework for Agentic Workflows
URL:https://github.com/d01ki/Agent-Slayer
标签:#Red Team
GitHub
GitHub - d01ki/Agent-Slayer: Automated Red Teaming Framework for Agentic Workflows
Automated Red Teaming Framework for Agentic Workflows - d01ki/Agent-Slayer
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Script em python scanner safe-check da CVE-2025-23419
URL:https://github.com/harley-ghostie/safe-check-CVE-2025-23419
标签:#CVE-2025
更新了:CVE-2025
描述:Script em python scanner safe-check da CVE-2025-23419
URL:https://github.com/harley-ghostie/safe-check-CVE-2025-23419
标签:#CVE-2025
GitHub
GitHub - harley-ghostie/safe-check-CVE-2025-23419: Script em python scanner safe-check da CVE-2025-23419
Script em python scanner safe-check da CVE-2025-23419 - harley-ghostie/safe-check-CVE-2025-23419
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔍 Enhance AI-driven Red Teaming with RAIDER, combining reinforcement learning and language models for intelligent web exploitation and real-time reconnaissance.
URL:https://github.com/ArmitaKazemiNajafabadi/Multi-Adversary-CAGE4
标签:#Red Team
更新了:Red Team
描述:🔍 Enhance AI-driven Red Teaming with RAIDER, combining reinforcement learning and language models for intelligent web exploitation and real-time reconnaissance.
URL:https://github.com/ArmitaKazemiNajafabadi/Multi-Adversary-CAGE4
标签:#Red Team
GitHub
GitHub - ArmitaKazemiNajafabadi/Multi-Adversary-CAGE4: Extension of CybORG's CAGE Challenge 4, featuring 11 specialized Red Agents…
Extension of CybORG's CAGE Challenge 4, featuring 11 specialized Red Agents with diverse attack strategies and prioritization mechanisms. Extends the original FiniteStateRedAgent framework ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)
URL:https://github.com/jedisct1/CVE-2025-65945-poc
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)
URL:https://github.com/jedisct1/CVE-2025-65945-poc
标签:#CVE-2025
GitHub
GitHub - jedisct1/CVE-2025-65945-poc: PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)
PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws) - jedisct1/CVE-2025-65945-poc
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2shell vulnerable lab (CVE-2025-55182)
URL:https://github.com/pwnxpl0it/react2shell-lab
标签:#CVE-2025
更新了:CVE-2025
描述:React2shell vulnerable lab (CVE-2025-55182)
URL:https://github.com/pwnxpl0it/react2shell-lab
标签:#CVE-2025
GitHub
GitHub - pwnxpl0it/react2shell-lab: React2shell vulnerable lab (CVE-2025-55182)
React2shell vulnerable lab (CVE-2025-55182) . Contribute to pwnxpl0it/react2shell-lab development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Nixon-H/CVE-2025-68147-OSPOS-Stored-XSS
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Nixon-H/CVE-2025-68147-OSPOS-Stored-XSS
标签:#CVE-2025
GitHub
GitHub - Nixon-H/CVE-2025-68147-OSPOS-Stored-XSS: PoC repository for CVE-2025-68147: Stored Cross-Site Scripting (XSS) in OpenSourcePOS.…
PoC repository for CVE-2025-68147: Stored Cross-Site Scripting (XSS) in OpenSourcePOS. Vulnerability allows privilege escalation via malicious JavaScript injection in the Store Config module. Inclu...
GitHub监控消息提醒!!!
更新了:反序列化
描述:旨在提供一套简单高效、跨语言的数据封包(FB)与解包(deFB)方案(包含复杂对象序列化/反序列化),便于在对数据进行统一的二进制参数级交互(封包中无需存档额外元信息)
URL:https://github.com/xbcsoft/BC-FB-Standard
标签:#反序列化
更新了:反序列化
描述:旨在提供一套简单高效、跨语言的数据封包(FB)与解包(deFB)方案(包含复杂对象序列化/反序列化),便于在对数据进行统一的二进制参数级交互(封包中无需存档额外元信息)
URL:https://github.com/xbcsoft/BC-FB-Standard
标签:#反序列化
GitHub
xbcsoft/BC-FB-Standard
旨在提供一套简单高效、跨语言的数据封包(FB)与解包(deFB)方案(包含复杂对象序列化/反序列化),便于在对数据进行统一的二进制参数级交互(封包中无需存档额外元信息) - xbcsoft/BC-FB-Standard
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1
URL:https://github.com/Nosiume/CVE-2025-14700-poc
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1
URL:https://github.com/Nosiume/CVE-2025-14700-poc
标签:#CVE-2025
GitHub
GitHub - Nosiume/CVE-2025-14700-poc: Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1
Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1 - Nosiume/CVE-2025-14700-poc