GitHub监控消息提醒!!!
更新了:Red Team
描述:Automated Red Teaming Framework for Agentic Workflows
URL:https://github.com/d01ki/Agent-Slayer
标签:#Red Team
更新了:Red Team
描述:Automated Red Teaming Framework for Agentic Workflows
URL:https://github.com/d01ki/Agent-Slayer
标签:#Red Team
GitHub
GitHub - d01ki/Agent-Slayer: Automated Red Teaming Framework for Agentic Workflows
Automated Red Teaming Framework for Agentic Workflows - d01ki/Agent-Slayer
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Script em python scanner safe-check da CVE-2025-23419
URL:https://github.com/harley-ghostie/safe-check-CVE-2025-23419
标签:#CVE-2025
更新了:CVE-2025
描述:Script em python scanner safe-check da CVE-2025-23419
URL:https://github.com/harley-ghostie/safe-check-CVE-2025-23419
标签:#CVE-2025
GitHub
GitHub - harley-ghostie/safe-check-CVE-2025-23419: Script em python scanner safe-check da CVE-2025-23419
Script em python scanner safe-check da CVE-2025-23419 - harley-ghostie/safe-check-CVE-2025-23419
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔍 Enhance AI-driven Red Teaming with RAIDER, combining reinforcement learning and language models for intelligent web exploitation and real-time reconnaissance.
URL:https://github.com/ArmitaKazemiNajafabadi/Multi-Adversary-CAGE4
标签:#Red Team
更新了:Red Team
描述:🔍 Enhance AI-driven Red Teaming with RAIDER, combining reinforcement learning and language models for intelligent web exploitation and real-time reconnaissance.
URL:https://github.com/ArmitaKazemiNajafabadi/Multi-Adversary-CAGE4
标签:#Red Team
GitHub
GitHub - ArmitaKazemiNajafabadi/Multi-Adversary-CAGE4: Extension of CybORG's CAGE Challenge 4, featuring 11 specialized Red Agents…
Extension of CybORG's CAGE Challenge 4, featuring 11 specialized Red Agents with diverse attack strategies and prioritization mechanisms. Extends the original FiniteStateRedAgent framework ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)
URL:https://github.com/jedisct1/CVE-2025-65945-poc
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)
URL:https://github.com/jedisct1/CVE-2025-65945-poc
标签:#CVE-2025
GitHub
GitHub - jedisct1/CVE-2025-65945-poc: PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)
PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws) - jedisct1/CVE-2025-65945-poc
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2shell vulnerable lab (CVE-2025-55182)
URL:https://github.com/pwnxpl0it/react2shell-lab
标签:#CVE-2025
更新了:CVE-2025
描述:React2shell vulnerable lab (CVE-2025-55182)
URL:https://github.com/pwnxpl0it/react2shell-lab
标签:#CVE-2025
GitHub
GitHub - pwnxpl0it/react2shell-lab: React2shell vulnerable lab (CVE-2025-55182)
React2shell vulnerable lab (CVE-2025-55182) . Contribute to pwnxpl0it/react2shell-lab development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Nixon-H/CVE-2025-68147-OSPOS-Stored-XSS
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Nixon-H/CVE-2025-68147-OSPOS-Stored-XSS
标签:#CVE-2025
GitHub
GitHub - Nixon-H/CVE-2025-68147-OSPOS-Stored-XSS: PoC repository for CVE-2025-68147: Stored Cross-Site Scripting (XSS) in OpenSourcePOS.…
PoC repository for CVE-2025-68147: Stored Cross-Site Scripting (XSS) in OpenSourcePOS. Vulnerability allows privilege escalation via malicious JavaScript injection in the Store Config module. Inclu...
GitHub监控消息提醒!!!
更新了:反序列化
描述:旨在提供一套简单高效、跨语言的数据封包(FB)与解包(deFB)方案(包含复杂对象序列化/反序列化),便于在对数据进行统一的二进制参数级交互(封包中无需存档额外元信息)
URL:https://github.com/xbcsoft/BC-FB-Standard
标签:#反序列化
更新了:反序列化
描述:旨在提供一套简单高效、跨语言的数据封包(FB)与解包(deFB)方案(包含复杂对象序列化/反序列化),便于在对数据进行统一的二进制参数级交互(封包中无需存档额外元信息)
URL:https://github.com/xbcsoft/BC-FB-Standard
标签:#反序列化
GitHub
xbcsoft/BC-FB-Standard
旨在提供一套简单高效、跨语言的数据封包(FB)与解包(deFB)方案(包含复杂对象序列化/反序列化),便于在对数据进行统一的二进制参数级交互(封包中无需存档额外元信息) - xbcsoft/BC-FB-Standard
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1
URL:https://github.com/Nosiume/CVE-2025-14700-poc
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1
URL:https://github.com/Nosiume/CVE-2025-14700-poc
标签:#CVE-2025
GitHub
GitHub - Nosiume/CVE-2025-14700-poc: Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1
Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1 - Nosiume/CVE-2025-14700-poc
GitHub监控消息提醒!!!
更新了:RCE
描述:A comprehensive vulnerability scanner for CVE-2025-13780, a Remote Code Execution (RCE) vulnerability in pgAdmin 4 versions ≤ 8.14.
URL:https://github.com/ThemeHackers/CVE-2025-13780
标签:#RCE
更新了:RCE
描述:A comprehensive vulnerability scanner for CVE-2025-13780, a Remote Code Execution (RCE) vulnerability in pgAdmin 4 versions ≤ 8.14.
URL:https://github.com/ThemeHackers/CVE-2025-13780
标签:#RCE
GitHub
GitHub - ThemeHackers/CVE-2025-13780: Under development. Please read me carefully.
Under development. Please read me carefully. Contribute to ThemeHackers/CVE-2025-13780 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/aleksandrova834/react2shell-bypasswaf
标签:#CVE-2025
更新了:CVE-2025
描述:High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/aleksandrova834/react2shell-bypasswaf
标签:#CVE-2025
GitHub
GitHub - aleksandrova834/react2shell-bypasswaf: High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025…
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478) - aleksandrova834/react2shell-bypasswaf
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Ce dépôt fournit des règles Sigma prêtes pour la production afin de détecter l’exploitation de la vulnérabilité CVE-2025-6218 affectant WinRAR sous Windows.
URL:https://github.com/thesystemowner/CVE-2025-20393-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Ce dépôt fournit des règles Sigma prêtes pour la production afin de détecter l’exploitation de la vulnérabilité CVE-2025-6218 affectant WinRAR sous Windows.
URL:https://github.com/thesystemowner/CVE-2025-20393-POC
标签:#CVE-2025
GitHub
GitHub - thesystemowner/CVE-2025-20393-POC: This scanner detects Cisco SEG/SEWM appliances vulnerable to CVE-2025-20393, a…
This scanner detects Cisco SEG/SEWM appliances vulnerable to CVE-2025-20393, a critical unauthenticated RCE vulnerability in Cisco AsyncOS affecting devices with Spam Quarantine feature...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-40602
URL:https://github.com/rxerium/CVE-2025-40602
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-40602
URL:https://github.com/rxerium/CVE-2025-40602
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-40602: Detection for CVE-2025-40602
Detection for CVE-2025-40602. Contribute to rxerium/CVE-2025-40602 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:“银狐木马”应急响应工具包
URL:https://github.com/anonymous-echo/Silver_Fox_IncidentResponse
标签:#应急响应
更新了:应急响应
描述:“银狐木马”应急响应工具包
URL:https://github.com/anonymous-echo/Silver_Fox_IncidentResponse
标签:#应急响应
GitHub
GitHub - anonymous-echo/Silver_Fox_IncidentResponse: “银狐木马”应急响应工具包
“银狐木马”应急响应工具包. Contribute to anonymous-echo/Silver_Fox_IncidentResponse development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182.
URL:https://github.com/r4j3sh-com/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182.
URL:https://github.com/r4j3sh-com/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - r4j3sh-com/CVE-2025-55182: Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182.
Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182. - r4j3sh-com/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller
URL:https://github.com/secdongle/POC_CVE-2025-14700
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller
URL:https://github.com/secdongle/POC_CVE-2025-14700
标签:#CVE-2025
GitHub
GitHub - secdongle/POC_CVE-2025-14700: Proof of Concept for Authenticated RCE in Crafty Controller
Proof of Concept for Authenticated RCE in Crafty Controller - secdongle/POC_CVE-2025-14700
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Satirush/CVE-2025-14174-Poc
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Satirush/CVE-2025-14174-Poc
标签:#CVE-2025
GitHub
GitHub - Satirush/CVE-2025-14174-Poc: Proof-of-Concept exploit for CVE-2025-14174 (EUVD-2025-203113) - Memory corruption in ANGLE…
Proof-of-Concept exploit for CVE-2025-14174 (EUVD-2025-203113) - Memory corruption in ANGLE allowing out-of-bounds access and RCE in web browsers. Reliable on iOS/Android/Windows, including patched...
GitHub监控消息提醒!!!
更新了:RCE
描述:Hands-on penetration testing lab exploiting a Laravel Debug RCE vulnerability in a controlled environment.
URL:https://github.com/BlackOussema/laravel-debug-rce-lab
标签:#RCE
更新了:RCE
描述:Hands-on penetration testing lab exploiting a Laravel Debug RCE vulnerability in a controlled environment.
URL:https://github.com/BlackOussema/laravel-debug-rce-lab
标签:#RCE
GitHub
GitHub - BlackOussema/laravel-debug-rce-lab: Hands-on penetration testing lab exploiting a Laravel Debug RCE vulnerability in a…
Hands-on penetration testing lab exploiting a Laravel Debug RCE vulnerability in a controlled environment. - BlackOussema/laravel-debug-rce-lab
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-37164
URL:https://github.com/rxerium/CVE-2025-37164
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-37164
URL:https://github.com/rxerium/CVE-2025-37164
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-37164: Detection for CVE-2025-37164
Detection for CVE-2025-37164. Contribute to rxerium/CVE-2025-37164 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Notes about Active Directory Red Teaming from CRTP
URL:https://github.com/k1tch0p/CRTP
标签:#Red Team
更新了:Red Team
描述:Notes about Active Directory Red Teaming from CRTP
URL:https://github.com/k1tch0p/CRTP
标签:#Red Team
GitHub
GitHub - k1tch0p/CRTP: Notes about Active Directory Red Teaming from CRTP
Notes about Active Directory Red Teaming from CRTP - GitHub - k1tch0p/CRTP: Notes about Active Directory Red Teaming from CRTP