GitHub监控消息提醒!!!
更新了:Red Team
描述:🛡️ AI Security Platform: Defense (200 engines) + Offense (39K+ payloads) | OWASP LLM Top 10 | Red Team toolkit for AI | Protect & Pentest your LLMs
URL:https://github.com/Iborrareddy/Recon-Enhanced
标签:#Red Team
更新了:Red Team
描述:🛡️ AI Security Platform: Defense (200 engines) + Offense (39K+ payloads) | OWASP LLM Top 10 | Red Team toolkit for AI | Protect & Pentest your LLMs
URL:https://github.com/Iborrareddy/Recon-Enhanced
标签:#Red Team
GitHub
GitHub - Iborrareddy/Recon-Enhanced: A Professional‑grade reconnaissance automation script that basically runs like a mini‑recon…
A Professional‑grade reconnaissance automation script that basically runs like a mini‑recon engine for a target domain. Built for security researchers, Blue/Red team beginners (like you know, the...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-52691
URL:https://github.com/rxerium/CVE-2025-52691
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-52691
URL:https://github.com/rxerium/CVE-2025-52691
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-52691: Detection for CVE-2025-52691
Detection for CVE-2025-52691. Contribute to rxerium/CVE-2025-52691 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:AiYue_Pro 是一款专为 Burp Suite 设计的高级被动扫描插件,旨在自动化检测 越权漏洞 (IDOR / Broken Access Control)。 它结合了多账号并发重放、智能染色和 AI 大模型深度分析技术,能够精准识别低权限或未授权账号是否能访问高敏感接口,极大降低了人工测试的成本和误报率。
URL:https://github.com/JohnLone00/AiYue
标签:#漏洞检测
更新了:漏洞检测
描述:AiYue_Pro 是一款专为 Burp Suite 设计的高级被动扫描插件,旨在自动化检测 越权漏洞 (IDOR / Broken Access Control)。 它结合了多账号并发重放、智能染色和 AI 大模型深度分析技术,能够精准识别低权限或未授权账号是否能访问高敏感接口,极大降低了人工测试的成本和误报率。
URL:https://github.com/JohnLone00/AiYue
标签:#漏洞检测
GitHub
GitHub - JohnLone00/AiYue: AiYue_Pro 是一款专为 Burp Suite 设计的高级被动扫描插件,旨在自动化检测 越权漏洞 (IDOR / Broken Access Control)。 它结合了多账号并发重放、智能染色和…
AiYue_Pro 是一款专为 Burp Suite 设计的高级被动扫描插件,旨在自动化检测 越权漏洞 (IDOR / Broken Access Control)。 它结合了多账号并发重放、智能染色和 AI 大模型深度分析技术,能够精准识别低权限或未授权账号是否能访问高敏感接口,极大降低了人工测试的成本和误报率。 - JohnLone00/AiYue
GitHub监控消息提醒!!!
更新了:红蓝对抗
描述:Rshell是一款开源的golang编写的支持多平台的C2框架,旨在帮助安服人员渗透测试、红蓝对抗。
URL:https://github.com/muddlelife/windfire
标签:#红蓝对抗
更新了:红蓝对抗
描述:Rshell是一款开源的golang编写的支持多平台的C2框架,旨在帮助安服人员渗透测试、红蓝对抗。
URL:https://github.com/muddlelife/windfire
标签:#红蓝对抗
GitHub
GitHub - muddlelife/windfire: Blazing fast, asynchronous URL prober & fingerprinting scanner built in Rust. Optimized for large…
Blazing fast, asynchronous URL prober & fingerprinting scanner built in Rust. Optimized for large-scale OSINT, reconnaissance, and bug bounty hunting. | 基于 Rust 的极速异步 URL 测活与指纹识别工具。专为大规模资产收...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/git0xLai/React2ShellPoC
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/git0xLai/React2ShellPoC
标签:#CVE-2025
GitHub
GitHub - git0xLai/React2ShellPoC: This repository provides a proof-of-concept for CVE-2025-55182 (React2Shell), a remote code execution…
This repository provides a proof-of-concept for CVE-2025-55182 (React2Shell), a remote code execution vulnerability in React Server Components. It demonstrates how the exploit works, including the ...
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Jancema/ShellCode-Elevator-Uac-Bypass-Inject-Any-X64-fud
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Jancema/ShellCode-Elevator-Uac-Bypass-Inject-Any-X64-fud
标签:#bypass AntiVirus
GitHub
GitHub - Jancema/ShellCode-Elevator-Uac-Bypass-Inject-Any-X64-fud: Shellcode development involves creating payloads for post-exploitation…
Shellcode development involves creating payloads for post-exploitation tasks like antivirus evasion and UAC bypass. Tools like shellcode loaders and injectors enable execution, while assembly and e...
GitHub监控消息提醒!!!
更新了:应急响应
描述:Sentinel 是一个功能强大AI赋能的跨平台(Windows/Linux)应急响应自动化分析工具,专注于威胁检测、恶意软件分析和安全评估。
URL:https://github.com/bg7iae/CarAlert
标签:#应急响应
更新了:应急响应
描述:Sentinel 是一个功能强大AI赋能的跨平台(Windows/Linux)应急响应自动化分析工具,专注于威胁检测、恶意软件分析和安全评估。
URL:https://github.com/bg7iae/CarAlert
标签:#应急响应
GitHub
bg7iae/CarAlert
CarAlert - 挪车通知系统 一个简洁优雅的挪车通知服务。用户通过网页输入车牌号,系统自动向 Telegram 群组发送挪车通知,并支持重复提醒直到车主响应。 核心特性: • 舒缓的青绿粉色渐变设计,缓解用户焦急情绪 • 响应式界面,完美适配 PC 和移动端 • 智能车牌输入,省份字块选择器避免输入法冲突 • 车牌格式验证和白名单验证 • 智能通知管理(授权车牌重复通知,非授权车牌...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Burp Suite extension to detect CVE-2025-14847 (MongoBleed) via manual leak tests from a dedicated UI tab.
URL:https://github.com/j0lt-github/mongobleedburp
标签:#CVE-2025
更新了:CVE-2025
描述:Burp Suite extension to detect CVE-2025-14847 (MongoBleed) via manual leak tests from a dedicated UI tab.
URL:https://github.com/j0lt-github/mongobleedburp
标签:#CVE-2025
GitHub
j0lt-github/mongobleedburp
Burp Suite extension to detect CVE-2025-14847 (MongoBleed) via manual leak tests from a dedicated UI tab. - j0lt-github/mongobleedburp
GitHub监控消息提醒!!!
更新了:burp
描述:Burp Suite extension to detect CVE-2025-14847 (MongoBleed) via manual leak tests from a dedicated UI tab.
URL:https://github.com/j0lt-github/wireup
标签:#burp
更新了:burp
描述:Burp Suite extension to detect CVE-2025-14847 (MongoBleed) via manual leak tests from a dedicated UI tab.
URL:https://github.com/j0lt-github/wireup
标签:#burp
GitHub
GitHub - j0lt-github/wireup: WireUp is a Burp Suite extension that enables seamless VPN integration for penetration testing and…
WireUp is a Burp Suite extension that enables seamless VPN integration for penetration testing and security research. It automatically creates isolated Docker containers running VPN clients with SO...
GitHub监控消息提醒!!!
更新了:webshell
描述:A simple yet powerful tool to generate reverse, bind and webshells
URL:https://github.com/0liverFlow/shellerator-ng
标签:#webshell
更新了:webshell
描述:A simple yet powerful tool to generate reverse, bind and webshells
URL:https://github.com/0liverFlow/shellerator-ng
标签:#webshell
GitHub
GitHub - 0liverFlow/shellerator-ng: A simple yet powerful tool to generate reverse, bind and webshells
A simple yet powerful tool to generate reverse, bind and webshells - 0liverFlow/shellerator-ng
GitHub监控消息提醒!!!
更新了:Red Team
描述:An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers
URL:https://github.com/jakehildreth/Locksmith2
标签:#Red Team
更新了:Red Team
描述:An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers
URL:https://github.com/jakehildreth/Locksmith2
标签:#Red Team
GitHub
GitHub - jakehildreth/Locksmith2: An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers
An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers - jakehildreth/Locksmith2
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-14847 MongoBleed - MongoDB Memory Leak Vulnerability PoC
URL:https://github.com/FurkanKAYAPINAR/CVE-2025-14847-MongoDB
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-14847 MongoBleed - MongoDB Memory Leak Vulnerability PoC
URL:https://github.com/FurkanKAYAPINAR/CVE-2025-14847-MongoDB
标签:#CVE-2025
GitHub
GitHub - FurkanKAYAPINAR/CVE-2025-14847-MongoDB: CVE-2025-14847 MongoBleed - MongoDB Memory Leak Vulnerability PoC
CVE-2025-14847 MongoBleed - MongoDB Memory Leak Vulnerability PoC - FurkanKAYAPINAR/CVE-2025-14847-MongoDB
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A PoC for CVE-2025-40019 in ESSIV module. (exploit WIP)
URL:https://github.com/xooxo/CVE-2025-40019-Essiv
标签:#CVE-2025
更新了:CVE-2025
描述:A PoC for CVE-2025-40019 in ESSIV module. (exploit WIP)
URL:https://github.com/xooxo/CVE-2025-40019-Essiv
标签:#CVE-2025
GitHub
GitHub - xooxo/CVE-2025-40019-Essiv: A PoC for CVE-2025-40019 in ESSIV module. (exploit WIP)
A PoC for CVE-2025-40019 in ESSIV module. (exploit WIP) - xooxo/CVE-2025-40019-Essiv
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:🛠️ Execute PE files in-memory using Cobalt Strike's Beacon, eliminating child processes and consoles for stealthy operations and efficient output handling.
URL:https://github.com/evelyn67a/BOF_RunPe
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:🛠️ Execute PE files in-memory using Cobalt Strike's Beacon, eliminating child processes and consoles for stealthy operations and efficient output handling.
URL:https://github.com/evelyn67a/BOF_RunPe
标签:#Cobalt Strike
GitHub
GitHub - evelyn67a/BOF_RunPe: 🛠️ Execute PE files in-memory using Cobalt Strike's Beacon, eliminating child processes and consoles…
🛠️ Execute PE files in-memory using Cobalt Strike's Beacon, eliminating child processes and consoles for stealthy operations and efficient output handling. - evelyn67a/BOF_RunPe
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-14847 MongoBleed - MongoDB Memory Leak Vulnerability PoC
URL:https://github.com/FurkanKAYAPINAR/CVE-2025-14847-MongoBleed-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-14847 MongoBleed - MongoDB Memory Leak Vulnerability PoC
URL:https://github.com/FurkanKAYAPINAR/CVE-2025-14847-MongoBleed-Exploit
标签:#CVE-2025
GitHub
GitHub - FurkanKAYAPINAR/CVE-2025-14847-MongoBleed-Exploit: CVE-2025-14847 MongoBleed - MongoDB Memory Leak Vulnerability PoC
CVE-2025-14847 MongoBleed - MongoDB Memory Leak Vulnerability PoC - FurkanKAYAPINAR/CVE-2025-14847-MongoBleed-Exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Academic proof-of-concept demonstrating CVE-2025-68645 for authorized security research.
URL:https://github.com/chinaxploiter/CVE-2025-68645-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Academic proof-of-concept demonstrating CVE-2025-68645 for authorized security research.
URL:https://github.com/chinaxploiter/CVE-2025-68645-PoC
标签:#CVE-2025
GitHub
GitHub - chinaxploiter/CVE-2025-68645-PoC: Academic proof-of-concept demonstrating CVE-2025-68645 for authorized security research.
Academic proof-of-concept demonstrating CVE-2025-68645 for authorized security research. - chinaxploiter/CVE-2025-68645-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repo contains my python script version of CVE-2025-14847 (MongoBleed)
URL:https://github.com/NoNameError/MongoBLEED---CVE-2025-14847-POC-
标签:#CVE-2025
更新了:CVE-2025
描述:This repo contains my python script version of CVE-2025-14847 (MongoBleed)
URL:https://github.com/NoNameError/MongoBLEED---CVE-2025-14847-POC-
标签:#CVE-2025
GitHub
GitHub - NoNameError/MongoBLEED---CVE-2025-14847-POC-: This repo contains my python script version of CVE-2025-14847 (MongoBleed)
This repo contains my python script version of CVE-2025-14847 (MongoBleed) - NoNameError/MongoBLEED---CVE-2025-14847-POC-