GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance.
URL:https://github.com/TheStingR/CVE-2025-68613-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance.
URL:https://github.com/TheStingR/CVE-2025-68613-POC
标签:#CVE-2025
GitHub
GitHub - TheStingR/CVE-2025-68613-POC: Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation…
Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance....
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/3886370410/HjowDVDhMr
标签:#应急响应
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/3886370410/HjowDVDhMr
标签:#应急响应
GitHub
GitHub - 3886370410/HjowDVDhMr: 本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简…
本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。 - 3886370410/HjowDVDhMr
GitHub监控消息提醒!!!
更新了:Red Team
描述:Stealthy Windows audio-capture tool with UDP exfiltration and randomized transmission intervals, designed for evasion-focused Red Team operations.
URL:https://github.com/Drew-Alleman/wiretap
标签:#Red Team
更新了:Red Team
描述:Stealthy Windows audio-capture tool with UDP exfiltration and randomized transmission intervals, designed for evasion-focused Red Team operations.
URL:https://github.com/Drew-Alleman/wiretap
标签:#Red Team
GitHub
GitHub - Drew-Alleman/wiretap: Stealthy Windows audio-capture tool with UDP exfiltration and randomized transmission intervals…
Stealthy Windows audio-capture tool with UDP exfiltration and randomized transmission intervals, designed for evasion-focused Red Team operations. - Drew-Alleman/wiretap
GitHub监控消息提醒!!!
更新了:RCE
描述:Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance.
URL:https://github.com/TheStingR/CVE-2025-68613
标签:#RCE
更新了:RCE
描述:Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance.
URL:https://github.com/TheStingR/CVE-2025-68613
标签:#RCE
GitHub
GitHub - TheStingR/CVE-2025-68613: Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation…
Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance....
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:🛠️ Automate Cobalt Strike operations with YAML-based workflows for streamlined beacon management and complex task execution.
URL:https://github.com/Zakarim73/csbot
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:🛠️ Automate Cobalt Strike operations with YAML-based workflows for streamlined beacon management and complex task execution.
URL:https://github.com/Zakarim73/csbot
标签:#Cobalt Strike
GitHub
GitHub - Zakarim73/csbot: 🛠️ Automate Cobalt Strike operations with YAML-based workflows for streamlined beacon management and…
🛠️ Automate Cobalt Strike operations with YAML-based workflows for streamlined beacon management and complex task execution. - Zakarim73/csbot
GitHub监控消息提醒!!!
更新了:钓鱼
描述:MailAssistant - 本地化轻量级 AI 邮件助理,实现邮件内容总结(50 字内)、钓鱼邮件概率评估、垃圾邮件识别,前后端分离设计
URL:https://github.com/AsdfAlex-learning/MailAssistant
标签:#钓鱼
更新了:钓鱼
描述:MailAssistant - 本地化轻量级 AI 邮件助理,实现邮件内容总结(50 字内)、钓鱼邮件概率评估、垃圾邮件识别,前后端分离设计
URL:https://github.com/AsdfAlex-learning/MailAssistant
标签:#钓鱼
GitHub
GitHub - AsdfAlex-learning/MailAssistant: MailAssistant - 本地化轻量级 AI 邮件助理,实现邮件内容总结(50 字内)、钓鱼邮件概率评估、垃圾邮件识别,前后端分离设计
MailAssistant - 本地化轻量级 AI 邮件助理,实现邮件内容总结(50 字内)、钓鱼邮件概率评估、垃圾邮件识别,前后端分离设计 - AsdfAlex-learning/MailAssistant
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-68613: n8n RCE vulnerability exploit and documentation
URL:https://github.com/wioui/n8n-CVE-2025-68613-exploit
标签:#RCE
更新了:RCE
描述:CVE-2025-68613: n8n RCE vulnerability exploit and documentation
URL:https://github.com/wioui/n8n-CVE-2025-68613-exploit
标签:#RCE
GitHub
GitHub - wioui/n8n-CVE-2025-68613-exploit: CVE-2025-68613: n8n RCE vulnerability exploit and documentation
CVE-2025-68613: n8n RCE vulnerability exploit and documentation - wioui/n8n-CVE-2025-68613-exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components 19.0.0-19.2.0. Exploits unsafe deserialization for unauthenticated remote code execution.
URL:https://github.com/S3cr3t-SDN/React4Shell
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components 19.0.0-19.2.0. Exploits unsafe deserialization for unauthenticated remote code execution.
URL:https://github.com/S3cr3t-SDN/React4Shell
标签:#CVE-2025
GitHub
GitHub - S3cr3t-SDN/React4Shell: Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components…
Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components 19.0.0-19.2.0. Exploits unsafe deserialization for unauthenticated remote code execution. - S3cr3t-...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public security advisory for CVE-2025-66209, CVE-2025-66210, CVE-2025-66211, CVE-2025-66212, and CVE-2025-66213
URL:https://github.com/0xrakan/coolify-cve-2025-66209-66213
标签:#CVE-2025
更新了:CVE-2025
描述:Public security advisory for CVE-2025-66209, CVE-2025-66210, CVE-2025-66211, CVE-2025-66212, and CVE-2025-66213
URL:https://github.com/0xrakan/coolify-cve-2025-66209-66213
标签:#CVE-2025
GitHub
GitHub - 0xrakan/coolify-cve-2025-66209-66213: Public security advisory for CVE-2025-66209, CVE-2025-66210, CVE-2025-66211, CVE…
Public security advisory for CVE-2025-66209, CVE-2025-66210, CVE-2025-66211, CVE-2025-66212, and CVE-2025-66213 - 0xrakan/coolify-cve-2025-66209-66213
GitHub监控消息提醒!!!
更新了:攻防
描述:一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
URL:https://github.com/CakeSystem/CMS
标签:#攻防
更新了:攻防
描述:一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
URL:https://github.com/CakeSystem/CMS
标签:#攻防
GitHub
GitHub - CakeSystem/CMS: CakeMiner-CMS本地隧道、数据压缩、加密、公网连接数压缩的强大本地客户端,极限降低延迟,防止中间人攻击, 最大限度提升安全性及矿场利润。 Powerful local client for local…
CakeMiner-CMS本地隧道、数据压缩、加密、公网连接数压缩的强大本地客户端,极限降低延迟,防止中间人攻击, 最大限度提升安全性及矿场利润。 Powerful local client for local tunnel, data compression, encryption, and public network connection number compression can ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:a controlled environment to test CVE-2025-55182.
URL:https://github.com/ckex/test-vuln
标签:#CVE-2025
更新了:CVE-2025
描述:a controlled environment to test CVE-2025-55182.
URL:https://github.com/ckex/test-vuln
标签:#CVE-2025
GitHub
GitHub - ckex/test-vuln: a controlled environment to test CVE-2025-55182.
a controlled environment to test CVE-2025-55182. Contribute to ckex/test-vuln development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:🛠️ Leverage advanced evasion techniques with Furtim, a Rust-based malware dropper for Red Teaming and educational security research.
URL:https://github.com/ShreenandNaik/Furtim-Advanced-Rust-Dropper
标签:#Red Team
更新了:Red Team
描述:🛠️ Leverage advanced evasion techniques with Furtim, a Rust-based malware dropper for Red Teaming and educational security research.
URL:https://github.com/ShreenandNaik/Furtim-Advanced-Rust-Dropper
标签:#Red Team
GitHub
GitHub - ShreenandNaik/Furtim-Advanced-Rust-Dropper: 🛠️ Leverage advanced evasion techniques with Furtim, a Rust-based malware…
🛠️ Leverage advanced evasion techniques with Furtim, a Rust-based malware dropper for Red Teaming and educational security research. - ShreenandNaik/Furtim-Advanced-Rust-Dropper
GitHub监控消息提醒!!!
更新了:Red Team
描述:Your Ultimate Pentest & Red Team Cheatsheets Hub - A comprehensive collection of curated resources, cheatsheets, and tools for security professionals, penetration testers, and red teamers.
URL:https://github.com/DivakarSure/ATSA---Advanced-Threat-Simulation-Assistant
标签:#Red Team
更新了:Red Team
描述:Your Ultimate Pentest & Red Team Cheatsheets Hub - A comprehensive collection of curated resources, cheatsheets, and tools for security professionals, penetration testers, and red teamers.
URL:https://github.com/DivakarSure/ATSA---Advanced-Threat-Simulation-Assistant
标签:#Red Team
GitHub
GitHub - DivakarSure/ATSA---Advanced-Threat-Simulation-Assistant: An advanced threat simulation and red teaming assistant that…
An advanced threat simulation and red teaming assistant that models realistic, multi-phase cyberattacks using kill-chain logic and machine learning to evaluate and stress-test defensive security sy...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:通过GitHub Copilot 辅助分析CVE-2025-68613漏洞
URL:https://github.com/intbjw/CVE-2025-68613-poc-via-copilot
标签:#CVE-2025
更新了:CVE-2025
描述:通过GitHub Copilot 辅助分析CVE-2025-68613漏洞
URL:https://github.com/intbjw/CVE-2025-68613-poc-via-copilot
标签:#CVE-2025
GitHub
GitHub - intbjw/CVE-2025-68613-poc-via-copilot: 通过GitHub Copilot 辅助分析CVE-2025-68613漏洞
通过GitHub Copilot 辅助分析CVE-2025-68613漏洞. Contribute to intbjw/CVE-2025-68613-poc-via-copilot development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65964-POC
URL:https://github.com/Pinus97/CVE-2025-65964-POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65964-POC
URL:https://github.com/Pinus97/CVE-2025-65964-POC
标签:#CVE-2025
GitHub
GitHub - Pinus97/CVE-2025-65964-POC: CVE-2025-65964-POC
CVE-2025-65964-POC. Contribute to Pinus97/CVE-2025-65964-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP
URL:https://github.com/theman001/CVE-2025-62215
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP
URL:https://github.com/theman001/CVE-2025-62215
标签:#CVE-2025
GitHub
GitHub - theman001/CVE-2025-62215: CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP
CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP - theman001/CVE-2025-62215
GitHub监控消息提醒!!!
更新了:钓鱼
描述:AI 钓鱼邮件检测网关,通过集成多源威胁情报(如 VirusTotal、微步在线)、沙箱技术以及 AI 算法,实现对邮件来源 IP、域名、URL、附件及内容关键字的深度识别、告警与拦截,并支持通过本地知识库持续学习进化。
URL:https://github.com/HaoY-l/MyPhishing-Web
标签:#钓鱼
更新了:钓鱼
描述:AI 钓鱼邮件检测网关,通过集成多源威胁情报(如 VirusTotal、微步在线)、沙箱技术以及 AI 算法,实现对邮件来源 IP、域名、URL、附件及内容关键字的深度识别、告警与拦截,并支持通过本地知识库持续学习进化。
URL:https://github.com/HaoY-l/MyPhishing-Web
标签:#钓鱼
GitHub
GitHub - HaoY-l/MyPhishing-Web: AI 钓鱼邮件检测网关,通过集成多源威胁情报(如 VirusTotal、微步在线)、沙箱技术以及 AI 算法,实现对邮件来源 IP、域名、URL、附件及内容关键字的深度识别、告警与拦截,并…
AI 钓鱼邮件检测网关,通过集成多源威胁情报(如 VirusTotal、微步在线)、沙箱技术以及 AI 算法,实现对邮件来源 IP、域名、URL、附件及内容关键字的深度识别、告警与拦截,并支持通过本地知识库持续学习进化。 - HaoY-l/MyPhishing-Web
GitHub监控消息提醒!!!
更新了:渗透测试
描述:自动化渗透测试助手 - 基于 LangGraph 的自主渗透测试系统
URL:https://github.com/desirepathh/AutoPentest-Agent
标签:#渗透测试
更新了:渗透测试
描述:自动化渗透测试助手 - 基于 LangGraph 的自主渗透测试系统
URL:https://github.com/desirepathh/AutoPentest-Agent
标签:#渗透测试
GitHub
GitHub - desirepathh/AutoPentest-Agent: 自动化渗透测试助手 - 基于 LangGraph 的自主渗透测试系统
自动化渗透测试助手 - 基于 LangGraph 的自主渗透测试系统. Contribute to desirepathh/AutoPentest-Agent development by creating an account on GitHub.