GitHub监控消息提醒!!!
更新了:反序列化
描述:一个基于 Serde 的 JCE 协议序列化/反序列化库.
URL:https://github.com/ColorSkyFun/serde-jce
标签:#反序列化
更新了:反序列化
描述:一个基于 Serde 的 JCE 协议序列化/反序列化库.
URL:https://github.com/ColorSkyFun/serde-jce
标签:#反序列化
GitHub
ColorSkyFun/serde-jce
一个基于 Serde 的 JCE 协议序列化/反序列化库. Contribute to ColorSkyFun/serde-jce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI Agent Evaluator & Red Team Platform
URL:https://github.com/qualifire-dev/rogue
标签:#Red Team
更新了:Red Team
描述:AI Agent Evaluator & Red Team Platform
URL:https://github.com/qualifire-dev/rogue
标签:#Red Team
GitHub
GitHub - qualifire-dev/rogue: AI Agent Evaluator & Red Team Platform
AI Agent Evaluator & Red Team Platform. Contribute to qualifire-dev/rogue development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Karintown/Sakura-Windows-SmartScreen-Bypass-Chrome-Exe-Edge
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Karintown/Sakura-Windows-SmartScreen-Bypass-Chrome-Exe-Edge
标签:#bypass AntiVirus
GitHub
GitHub - Karintown/Sakura-Windows-SmartScreen-Bypass-Chrome-Exe-Edge: Crypters and FUD tools focus on obfuscation to bypass antivirus…
Crypters and FUD tools focus on obfuscation to bypass antivirus, SmartScreen, and Windows Defender. These tools encrypt payloads, create backdoors, and ensure stealthy execution on Windows systems ...
GitHub监控消息提醒!!!
更新了:sql注入
描述:真实漏洞检测平台 - 包含XSS、SQL注入、原型链污染等安全漏洞演示
URL:https://github.com/qfac/vulnerability-detector-platform
标签:#sql注入
更新了:sql注入
描述:真实漏洞检测平台 - 包含XSS、SQL注入、原型链污染等安全漏洞演示
URL:https://github.com/qfac/vulnerability-detector-platform
标签:#sql注入
GitHub
qfac/vulnerability-detector-platform
真实漏洞检测平台 - 包含XSS、SQL注入、原型链污染等安全漏洞演示. Contribute to qfac/vulnerability-detector-platform development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Goultarde/CVE-2022-42889-text4shell
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Goultarde/CVE-2022-42889-text4shell
标签:#RCE
GitHub
GitHub - Goultarde/CVE-2022-42889-text4shell: Proof of Concept (PoC) for CVE-2022-42889 (Text4Shell) targeting Apache Commons Text…
Proof of Concept (PoC) for CVE-2022-42889 (Text4Shell) targeting Apache Commons Text versions prior to 1.10.0. This script automates Remote Code Execution (RCE) via script interpolation to establis...
GitHub监控消息提醒!!!
更新了:红队
描述:全网首发!!!最全的网安面试题附参考答案(涵盖护网、红队、逆向、密码学、二进制、AI、区块链)
URL:https://github.com/hi-unc1e/Auto_JB_APE
标签:#红队
更新了:红队
描述:全网首发!!!最全的网安面试题附参考答案(涵盖护网、红队、逆向、密码学、二进制、AI、区块链)
URL:https://github.com/hi-unc1e/Auto_JB_APE
标签:#红队
GitHub
GitHub - hi-unc1e/Auto_JB_APE: 一个基于 LangGraph 的自动化 LLM 越狱(Jailbreak)框架,通过多智能体协作,自动生成并迭代攻击提示词,旨在绕过目标大模型的安全护栏,用于红队测试,用于红队测试。An Automated…
一个基于 LangGraph 的自动化 LLM 越狱(Jailbreak)框架,通过多智能体协作,自动生成并迭代攻击提示词,旨在绕过目标大模型的安全护栏,用于红队测试,用于红队测试。An Automated LLM Jailbreak Framework (APE) for red team testing, works good in HTB AI Red Teamer course vu...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:基于 Chrome Manifest V3 的前端安全辅助插件,用于快速发现页面输入点、评估 CSP 风险、嗅探潜在敏感资产、识别常见前端框架指纹,并内置常用编码转换工具,帮助进行合法合规的渗透测试与安全检查
URL:https://github.com/duckpigdog/XMCVE-JS-Sec
标签:#渗透测试
更新了:渗透测试
描述:基于 Chrome Manifest V3 的前端安全辅助插件,用于快速发现页面输入点、评估 CSP 风险、嗅探潜在敏感资产、识别常见前端框架指纹,并内置常用编码转换工具,帮助进行合法合规的渗透测试与安全检查
URL:https://github.com/duckpigdog/XMCVE-JS-Sec
标签:#渗透测试
GitHub
duckpigdog/XMCVE-JS-Sec
基于 Chrome Manifest V3 的前端安全辅助插件,用于快速发现页面输入点、评估 CSP 风险、嗅探潜在敏感资产、识别常见前端框架指纹,并内置常用编码转换工具,帮助进行合法合规的渗透测试与安全检查 - duckpigdog/XMCVE-JS-Sec
GitHub监控消息提醒!!!
更新了:代码审计
描述:🔍 AI-Powered Autonomous Code Audit Agent with Multi-Expert Team (UI/UX, Product, Architecture, Logic Masters) - Built on Claude Agent SDK | 基于 Claude Agent SDK 的自主代码审计系统
URL:https://github.com/miounet11/scagent
标签:#代码审计
更新了:代码审计
描述:🔍 AI-Powered Autonomous Code Audit Agent with Multi-Expert Team (UI/UX, Product, Architecture, Logic Masters) - Built on Claude Agent SDK | 基于 Claude Agent SDK 的自主代码审计系统
URL:https://github.com/miounet11/scagent
标签:#代码审计
GitHub
GitHub - miounet11/scagent: 🔍 AI-Powered Autonomous Code Audit Agent with Multi-Expert Team (UI/UX, Product, Architecture, Logic…
🔍 AI-Powered Autonomous Code Audit Agent with Multi-Expert Team (UI/UX, Product, Architecture, Logic Masters) - Built on Claude Agent SDK | 基于 Claude Agent SDK 的自主代码审计系统 - miounet11/scagent
GitHub监控消息提醒!!!
更新了:RCE
描述:Detect CVE-2025-55182 (React2Shell) RCE vulnerability in React Server Components. Fast, accurate scanner with zero false positives.
URL:https://github.com/nxgn-kd01/react2shell-scanner
标签:#RCE
更新了:RCE
描述:Detect CVE-2025-55182 (React2Shell) RCE vulnerability in React Server Components. Fast, accurate scanner with zero false positives.
URL:https://github.com/nxgn-kd01/react2shell-scanner
标签:#RCE
GitHub
GitHub - nxgn-kd01/react2shell-scanner: Detect CVE-2025-55182 (React2Shell) RCE vulnerability in React Server Components. Fast…
Detect CVE-2025-55182 (React2Shell) RCE vulnerability in React Server Components. Fast, accurate scanner with zero false positives. - nxgn-kd01/react2shell-scanner
GitHub监控消息提醒!!!
更新了:RCE
描述:React2Shell - CVE-2025-66478 RCE Exploit
URL:https://github.com/khadafigans/React2Shell
标签:#RCE
更新了:RCE
描述:React2Shell - CVE-2025-66478 RCE Exploit
URL:https://github.com/khadafigans/React2Shell
标签:#RCE
GitHub
GitHub - khadafigans/React2Shell: React2Shell - CVE-2025-66478 RCE Exploit
React2Shell - CVE-2025-66478 RCE Exploit. Contribute to khadafigans/React2Shell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:n8n RCE (CVE-2025-68613) - Proof of Concept
URL:https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613
标签:#RCE
更新了:RCE
描述:n8n RCE (CVE-2025-68613) - Proof of Concept
URL:https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613
标签:#RCE
GitHub
ahmedshamsddin/n8n-RCE-CVE-2025-68613
n8n RCE (CVE-2025-68613) - Proof of Concept. Contribute to ahmedshamsddin/n8n-RCE-CVE-2025-68613 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:Linux Miner Killer & System Audit Script Linux 服务器的应急响应脚本
URL:https://github.com/gkdgkd123/miner_killer
标签:#应急响应
更新了:应急响应
描述:Linux Miner Killer & System Audit Script Linux 服务器的应急响应脚本
URL:https://github.com/gkdgkd123/miner_killer
标签:#应急响应
GitHub
GitHub - gkdgkd123/miner_killer: Linux Miner Killer & System Audit Script Linux 服务器的应急响应脚本
Linux Miner Killer & System Audit Script Linux 服务器的应急响应脚本 - gkdgkd123/miner_killer
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/An4si/THM-LookUp-Writeup-ES-
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/An4si/THM-LookUp-Writeup-ES-
标签:#RCE
GitHub
GitHub - An4si/THM-LookUp-Writeup-ES-: Writeup completo de la máquina LookUp (TryHackMe). Pentesting de principio a fin: Explotación…
Writeup completo de la máquina LookUp (TryHackMe). Pentesting de principio a fin: Explotación de elFinder (RCE), Enumeración de usuarios con Python, PATH Hijacking y Privilege Escalation mediante S...
GitHub监控消息提醒!!!
更新了:RCE
描述:Explotación de RCE en CMS SPIP y escalada de privilegios avanzada mediante bypass de perfiles de AppArmor y abuso de binarios SUID.
URL:https://github.com/An4si/THM---Publisher-De-RCE-en-SPIP-a-Bypass-de-AppArmor
标签:#RCE
更新了:RCE
描述:Explotación de RCE en CMS SPIP y escalada de privilegios avanzada mediante bypass de perfiles de AppArmor y abuso de binarios SUID.
URL:https://github.com/An4si/THM---Publisher-De-RCE-en-SPIP-a-Bypass-de-AppArmor
标签:#RCE
GitHub
GitHub - An4si/THM---Publisher-De-RCE-en-SPIP-a-Bypass-de-AppArmor: Explotación de RCE en CMS SPIP y escalada de privilegios avanzada…
Explotación de RCE en CMS SPIP y escalada de privilegios avanzada mediante bypass de perfiles de AppArmor y abuso de binarios SUID. - An4si/THM---Publisher-De-RCE-en-SPIP-a-Bypass-de-AppArmor
GitHub监控消息提醒!!!
更新了:RCE
描述:Scan para verificar RCE no DRUPAL em versões <8.5.1
URL:https://github.com/SrKocmoc/Drupal_SCAN
标签:#RCE
更新了:RCE
描述:Scan para verificar RCE no DRUPAL em versões <8.5.1
URL:https://github.com/SrKocmoc/Drupal_SCAN
标签:#RCE
GitHub
GitHub - SrKocmoc/Drupal_SCAN: Scan para verificar RCE no DRUPAL em versões <8.5.1
Scan para verificar RCE no DRUPAL em versões <8.5.1 - SrKocmoc/Drupal_SCAN