GitHub监控消息提醒!!!
更新了:Red Team
描述:Stealthy Windows audio-capture tool with UDP exfiltration and randomized transmission intervals, designed for evasion-focused Red Team operations.
URL:https://github.com/Drew-Alleman/wiretap
标签:#Red Team
更新了:Red Team
描述:Stealthy Windows audio-capture tool with UDP exfiltration and randomized transmission intervals, designed for evasion-focused Red Team operations.
URL:https://github.com/Drew-Alleman/wiretap
标签:#Red Team
GitHub
GitHub - Drew-Alleman/wiretap: Stealthy Windows audio-capture tool with UDP exfiltration and randomized transmission intervals…
Stealthy Windows audio-capture tool with UDP exfiltration and randomized transmission intervals, designed for evasion-focused Red Team operations. - Drew-Alleman/wiretap
GitHub监控消息提醒!!!
更新了:RCE
描述:Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance.
URL:https://github.com/TheStingR/CVE-2025-68613
标签:#RCE
更新了:RCE
描述:Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance.
URL:https://github.com/TheStingR/CVE-2025-68613
标签:#RCE
GitHub
GitHub - TheStingR/CVE-2025-68613: Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation…
Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance....
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:🛠️ Automate Cobalt Strike operations with YAML-based workflows for streamlined beacon management and complex task execution.
URL:https://github.com/Zakarim73/csbot
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:🛠️ Automate Cobalt Strike operations with YAML-based workflows for streamlined beacon management and complex task execution.
URL:https://github.com/Zakarim73/csbot
标签:#Cobalt Strike
GitHub
GitHub - Zakarim73/csbot: 🛠️ Automate Cobalt Strike operations with YAML-based workflows for streamlined beacon management and…
🛠️ Automate Cobalt Strike operations with YAML-based workflows for streamlined beacon management and complex task execution. - Zakarim73/csbot
GitHub监控消息提醒!!!
更新了:钓鱼
描述:MailAssistant - 本地化轻量级 AI 邮件助理,实现邮件内容总结(50 字内)、钓鱼邮件概率评估、垃圾邮件识别,前后端分离设计
URL:https://github.com/AsdfAlex-learning/MailAssistant
标签:#钓鱼
更新了:钓鱼
描述:MailAssistant - 本地化轻量级 AI 邮件助理,实现邮件内容总结(50 字内)、钓鱼邮件概率评估、垃圾邮件识别,前后端分离设计
URL:https://github.com/AsdfAlex-learning/MailAssistant
标签:#钓鱼
GitHub
GitHub - AsdfAlex-learning/MailAssistant: MailAssistant - 本地化轻量级 AI 邮件助理,实现邮件内容总结(50 字内)、钓鱼邮件概率评估、垃圾邮件识别,前后端分离设计
MailAssistant - 本地化轻量级 AI 邮件助理,实现邮件内容总结(50 字内)、钓鱼邮件概率评估、垃圾邮件识别,前后端分离设计 - AsdfAlex-learning/MailAssistant
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-68613: n8n RCE vulnerability exploit and documentation
URL:https://github.com/wioui/n8n-CVE-2025-68613-exploit
标签:#RCE
更新了:RCE
描述:CVE-2025-68613: n8n RCE vulnerability exploit and documentation
URL:https://github.com/wioui/n8n-CVE-2025-68613-exploit
标签:#RCE
GitHub
GitHub - wioui/n8n-CVE-2025-68613-exploit: CVE-2025-68613: n8n RCE vulnerability exploit and documentation
CVE-2025-68613: n8n RCE vulnerability exploit and documentation - wioui/n8n-CVE-2025-68613-exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components 19.0.0-19.2.0. Exploits unsafe deserialization for unauthenticated remote code execution.
URL:https://github.com/S3cr3t-SDN/React4Shell
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components 19.0.0-19.2.0. Exploits unsafe deserialization for unauthenticated remote code execution.
URL:https://github.com/S3cr3t-SDN/React4Shell
标签:#CVE-2025
GitHub
GitHub - S3cr3t-SDN/React4Shell: Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components…
Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components 19.0.0-19.2.0. Exploits unsafe deserialization for unauthenticated remote code execution. - S3cr3t-...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public security advisory for CVE-2025-66209, CVE-2025-66210, CVE-2025-66211, CVE-2025-66212, and CVE-2025-66213
URL:https://github.com/0xrakan/coolify-cve-2025-66209-66213
标签:#CVE-2025
更新了:CVE-2025
描述:Public security advisory for CVE-2025-66209, CVE-2025-66210, CVE-2025-66211, CVE-2025-66212, and CVE-2025-66213
URL:https://github.com/0xrakan/coolify-cve-2025-66209-66213
标签:#CVE-2025
GitHub
GitHub - 0xrakan/coolify-cve-2025-66209-66213: Public security advisory for CVE-2025-66209, CVE-2025-66210, CVE-2025-66211, CVE…
Public security advisory for CVE-2025-66209, CVE-2025-66210, CVE-2025-66211, CVE-2025-66212, and CVE-2025-66213 - 0xrakan/coolify-cve-2025-66209-66213
GitHub监控消息提醒!!!
更新了:攻防
描述:一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
URL:https://github.com/CakeSystem/CMS
标签:#攻防
更新了:攻防
描述:一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
URL:https://github.com/CakeSystem/CMS
标签:#攻防
GitHub
GitHub - CakeSystem/CMS: CakeMiner-CMS本地隧道、数据压缩、加密、公网连接数压缩的强大本地客户端,极限降低延迟,防止中间人攻击, 最大限度提升安全性及矿场利润。 Powerful local client for local…
CakeMiner-CMS本地隧道、数据压缩、加密、公网连接数压缩的强大本地客户端,极限降低延迟,防止中间人攻击, 最大限度提升安全性及矿场利润。 Powerful local client for local tunnel, data compression, encryption, and public network connection number compression can ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:a controlled environment to test CVE-2025-55182.
URL:https://github.com/ckex/test-vuln
标签:#CVE-2025
更新了:CVE-2025
描述:a controlled environment to test CVE-2025-55182.
URL:https://github.com/ckex/test-vuln
标签:#CVE-2025
GitHub
GitHub - ckex/test-vuln: a controlled environment to test CVE-2025-55182.
a controlled environment to test CVE-2025-55182. Contribute to ckex/test-vuln development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:🛠️ Leverage advanced evasion techniques with Furtim, a Rust-based malware dropper for Red Teaming and educational security research.
URL:https://github.com/ShreenandNaik/Furtim-Advanced-Rust-Dropper
标签:#Red Team
更新了:Red Team
描述:🛠️ Leverage advanced evasion techniques with Furtim, a Rust-based malware dropper for Red Teaming and educational security research.
URL:https://github.com/ShreenandNaik/Furtim-Advanced-Rust-Dropper
标签:#Red Team
GitHub
GitHub - ShreenandNaik/Furtim-Advanced-Rust-Dropper: 🛠️ Leverage advanced evasion techniques with Furtim, a Rust-based malware…
🛠️ Leverage advanced evasion techniques with Furtim, a Rust-based malware dropper for Red Teaming and educational security research. - ShreenandNaik/Furtim-Advanced-Rust-Dropper
GitHub监控消息提醒!!!
更新了:Red Team
描述:Your Ultimate Pentest & Red Team Cheatsheets Hub - A comprehensive collection of curated resources, cheatsheets, and tools for security professionals, penetration testers, and red teamers.
URL:https://github.com/DivakarSure/ATSA---Advanced-Threat-Simulation-Assistant
标签:#Red Team
更新了:Red Team
描述:Your Ultimate Pentest & Red Team Cheatsheets Hub - A comprehensive collection of curated resources, cheatsheets, and tools for security professionals, penetration testers, and red teamers.
URL:https://github.com/DivakarSure/ATSA---Advanced-Threat-Simulation-Assistant
标签:#Red Team
GitHub
GitHub - DivakarSure/ATSA---Advanced-Threat-Simulation-Assistant: An advanced threat simulation and red teaming assistant that…
An advanced threat simulation and red teaming assistant that models realistic, multi-phase cyberattacks using kill-chain logic and machine learning to evaluate and stress-test defensive security sy...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:通过GitHub Copilot 辅助分析CVE-2025-68613漏洞
URL:https://github.com/intbjw/CVE-2025-68613-poc-via-copilot
标签:#CVE-2025
更新了:CVE-2025
描述:通过GitHub Copilot 辅助分析CVE-2025-68613漏洞
URL:https://github.com/intbjw/CVE-2025-68613-poc-via-copilot
标签:#CVE-2025
GitHub
GitHub - intbjw/CVE-2025-68613-poc-via-copilot: 通过GitHub Copilot 辅助分析CVE-2025-68613漏洞
通过GitHub Copilot 辅助分析CVE-2025-68613漏洞. Contribute to intbjw/CVE-2025-68613-poc-via-copilot development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65964-POC
URL:https://github.com/Pinus97/CVE-2025-65964-POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65964-POC
URL:https://github.com/Pinus97/CVE-2025-65964-POC
标签:#CVE-2025
GitHub
GitHub - Pinus97/CVE-2025-65964-POC: CVE-2025-65964-POC
CVE-2025-65964-POC. Contribute to Pinus97/CVE-2025-65964-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP
URL:https://github.com/theman001/CVE-2025-62215
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP
URL:https://github.com/theman001/CVE-2025-62215
标签:#CVE-2025
GitHub
GitHub - theman001/CVE-2025-62215: CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP
CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP - theman001/CVE-2025-62215
GitHub监控消息提醒!!!
更新了:钓鱼
描述:AI 钓鱼邮件检测网关,通过集成多源威胁情报(如 VirusTotal、微步在线)、沙箱技术以及 AI 算法,实现对邮件来源 IP、域名、URL、附件及内容关键字的深度识别、告警与拦截,并支持通过本地知识库持续学习进化。
URL:https://github.com/HaoY-l/MyPhishing-Web
标签:#钓鱼
更新了:钓鱼
描述:AI 钓鱼邮件检测网关,通过集成多源威胁情报(如 VirusTotal、微步在线)、沙箱技术以及 AI 算法,实现对邮件来源 IP、域名、URL、附件及内容关键字的深度识别、告警与拦截,并支持通过本地知识库持续学习进化。
URL:https://github.com/HaoY-l/MyPhishing-Web
标签:#钓鱼
GitHub
GitHub - HaoY-l/MyPhishing-Web: AI 钓鱼邮件检测网关,通过集成多源威胁情报(如 VirusTotal、微步在线)、沙箱技术以及 AI 算法,实现对邮件来源 IP、域名、URL、附件及内容关键字的深度识别、告警与拦截,并…
AI 钓鱼邮件检测网关,通过集成多源威胁情报(如 VirusTotal、微步在线)、沙箱技术以及 AI 算法,实现对邮件来源 IP、域名、URL、附件及内容关键字的深度识别、告警与拦截,并支持通过本地知识库持续学习进化。 - HaoY-l/MyPhishing-Web
GitHub监控消息提醒!!!
更新了:渗透测试
描述:自动化渗透测试助手 - 基于 LangGraph 的自主渗透测试系统
URL:https://github.com/desirepathh/AutoPentest-Agent
标签:#渗透测试
更新了:渗透测试
描述:自动化渗透测试助手 - 基于 LangGraph 的自主渗透测试系统
URL:https://github.com/desirepathh/AutoPentest-Agent
标签:#渗透测试
GitHub
GitHub - desirepathh/AutoPentest-Agent: 自动化渗透测试助手 - 基于 LangGraph 的自主渗透测试系统
自动化渗透测试助手 - 基于 LangGraph 的自主渗透测试系统. Contribute to desirepathh/AutoPentest-Agent development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.
URL:https://github.com/NtDallas/BOF_ExecuteAssembly
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.
URL:https://github.com/NtDallas/BOF_ExecuteAssembly
标签:#Cobalt Strike
GitHub
GitHub - NtDallas/BOF_ExecuteAssembly: Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion…
Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques. - GitHub - NtDallas/BOF_ExecuteAssembly: Beacon Object File for Cobalt Strike that executes .N...
GitHub监控消息提醒!!!
更新了:命令注入
描述:CVE-2024-31317 Android Zygote命令注入漏洞研究与部署工具 | Android 9-13 漏洞利用框架
URL:https://github.com/ANLINSTUDIO/AsPettor
标签:#命令注入
更新了:命令注入
描述:CVE-2024-31317 Android Zygote命令注入漏洞研究与部署工具 | Android 9-13 漏洞利用框架
URL:https://github.com/ANLINSTUDIO/AsPettor
标签:#命令注入
GitHub
GitHub - ANLINSTUDIO/AsPettor: AsPettor(俟吾者)是一款功能性窗口式集成工具,在它的加持下,你可以实现:直接打开复制的网络链接、磁盘地址、注册表地址,直接运行复制的Powershell指令,一次性运行下载的安装包等…
AsPettor(俟吾者)是一款功能性窗口式集成工具,在它的加持下,你可以实现:直接打开复制的网络链接、磁盘地址、注册表地址,直接运行复制的Powershell指令,一次性运行下载的安装包等;其次,可以通过快捷键(Menu菜单键或者Copilot键)执行各种内置或者从社区下载的命令,如像素检测关机、系统深色模式切换、调色板;当然,内置的如逾期文件夹等功能同样十分实用。预计之后加入AOI傲语智...
GitHub监控消息提醒!!!
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/iamhash/microservice-manufacturing-platform
标签:#绕过
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/iamhash/microservice-manufacturing-platform
标签:#绕过
GitHub
GitHub - iamhash/microservice-manufacturing-platform: 本项目是一个基于 Spring Cloud 生态构建的微服务管理平台示例,围绕订单处理、生产调度、资源管理与系统可观测性等核心场景,设计并实现了…
本项目是一个基于 Spring Cloud 生态构建的微服务管理平台示例,围绕订单处理、生产调度、资源管理与系统可观测性等核心场景,设计并实现了一套完整的分布式系统架构。项目采用微服务拆分模式,各服务独立部署、独立数据源,并通过服务注册发现、API 网关、熔断限流与链路追踪等机制,保障系统的高可用性与可扩展性。 系统重点关注微服务之间的协作关系与工程实践能力,包括服务治理、动态路由、容错降...