GitHub监控消息提醒!!!
更新了:攻防
描述:基于智能体和大模型的自动化渗透决策系统的原理,是将大模型的战略性、关联 性推理能力与渗透工具的海量战术执行能力相结合,通过一个感知-决策-行动-学习的自主 闭环,模拟人类渗透专家的思维过程,实现网络攻防的认知自动化。
URL:https://github.com/xuanye1122/AutoPentestAgent
标签:#攻防
更新了:攻防
描述:基于智能体和大模型的自动化渗透决策系统的原理,是将大模型的战略性、关联 性推理能力与渗透工具的海量战术执行能力相结合,通过一个感知-决策-行动-学习的自主 闭环,模拟人类渗透专家的思维过程,实现网络攻防的认知自动化。
URL:https://github.com/xuanye1122/AutoPentestAgent
标签:#攻防
GitHub
GitHub - xuanye1122/AutoPentestAgent: 基于智能体和大模型的自动化渗透决策系统的原理,是将大模型的战略性、关联 性推理能力与渗透工具的海量战术执行能力相结合,通过一个感知-决策-行动-学习的自主 闭环,模拟人类渗透专…
基于智能体和大模型的自动化渗透决策系统的原理,是将大模型的战略性、关联 性推理能力与渗透工具的海量战术执行能力相结合,通过一个感知-决策-行动-学习的自主 闭环,模拟人类渗透专家的思维过程,实现网络攻防的认知自动化。 - xuanye1122/AutoPentestAgent
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Interactive visualization - CVE-2026 chain attack demo
URL:https://github.com/MehdiLeDeaut/CVE-2026-Dashboard
标签:#CVE-2026
更新了:CVE-2026
描述:Interactive visualization - CVE-2026 chain attack demo
URL:https://github.com/MehdiLeDeaut/CVE-2026-Dashboard
标签:#CVE-2026
GitHub
MehdiLeDeaut/CVE-2026-Dashboard
Interactive visualization - CVE-2026 chain attack demo - MehdiLeDeaut/CVE-2026-Dashboard
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Interactive visualization - CVE-2026 chain attack demo
URL:https://github.com/fevar54/CVE-2026-20805-POC
标签:#CVE-2026
更新了:CVE-2026
描述:Interactive visualization - CVE-2026 chain attack demo
URL:https://github.com/fevar54/CVE-2026-20805-POC
标签:#CVE-2026
GitHub
GitHub - fevar54/CVE-2026-20805-POC: # CVE-2026-20805 PoC Prueba de concepto para la vulnerabilidad de divulgación de información…
# CVE-2026-20805 PoC Prueba de concepto para la vulnerabilidad de divulgación de información en **Desktop Windows Manager (dwm.exe)** de Microsoft. ## 📋 Resumen de la Vulnerabilidad - **ID:** CV...
GitHub监控消息提醒!!!
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/arvin010/JYZYY
标签:#信息收集
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/arvin010/JYZYY
标签:#信息收集
GitHub
arvin010/JYZYY
加油站运营系统是一个集成了多种功能的综合管理平台,系统提供H5、小程序,支持微信支付、支付宝支付、拉卡拉支付。帮助加油站实现高效、精准的运营管理。该系统涵盖了从员工管理、广告投放(如轮播图广告、优惠活动推广)到油品管理(包括油价、油号列表及油品信息维护)、资金管理(如资金流水监控、拉卡拉分账商户及接收方管理)、订单处理(涵盖订单列表、订单详情查看、退款订单管理)以及客户管理(例如加油卡发行、...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team & Penetration Testing Reporting Framework
URL:https://github.com/JoseMariaMicoli/VectorVue
标签:#Red Team
更新了:Red Team
描述:Red Team & Penetration Testing Reporting Framework
URL:https://github.com/JoseMariaMicoli/VectorVue
标签:#Red Team
GitHub
GitHub - JoseMariaMicoli/VectorVue: Red Team & Penetration Testing Reporting Framework
Red Team & Penetration Testing Reporting Framework - JoseMariaMicoli/VectorVue
GitHub监控消息提醒!!!
更新了:RCE
描述:Automated remediation of CVE-2025-53783 (Teams RCE) using PowerShell
URL:https://github.com/ksgassama-lab/MSTeams---Vulnerability---Remediation
标签:#RCE
更新了:RCE
描述:Automated remediation of CVE-2025-53783 (Teams RCE) using PowerShell
URL:https://github.com/ksgassama-lab/MSTeams---Vulnerability---Remediation
标签:#RCE
GitHub
GitHub - ksgassama-lab/MSTeams---Vulnerability---Remediation: Automated remediation of CVE-2025-53783 (Teams RCE) using PowerShell
Automated remediation of CVE-2025-53783 (Teams RCE) using PowerShell - ksgassama-lab/MSTeams---Vulnerability---Remediation
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:Enterprise distributed network asset scanning platform with port scanning, subdomain enumeration, fingerprinting, and vulnerability detection. Built with Go-Zero + Vue3.(端口扫描/子域名枚举/指纹识别/漏洞检测)
URL:https://github.com/tangxiaofeng7/cscan
标签:#漏洞检测
更新了:漏洞检测
描述:Enterprise distributed network asset scanning platform with port scanning, subdomain enumeration, fingerprinting, and vulnerability detection. Built with Go-Zero + Vue3.(端口扫描/子域名枚举/指纹识别/漏洞检测)
URL:https://github.com/tangxiaofeng7/cscan
标签:#漏洞检测
GitHub
GitHub - tangxiaofeng7/cscan: 企业级分布式网络资产扫描平台
企业级分布式网络资产扫描平台. Contribute to tangxiaofeng7/cscan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/JoseMariaMicoli/Log4Shell-PoC
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/JoseMariaMicoli/Log4Shell-PoC
标签:#RCE
GitHub
GitHub - JoseMariaMicoli/Log4Shell-PoC: **Log4Shell PoC is a high-fidelity exploitation environment designed to replicate the CVE…
**Log4Shell PoC is a high-fidelity exploitation environment designed to replicate the CVE-2021-44228 vulnerability.** It provides a containerized sandbox to demonstrate JNDI injection, LDAP/RMI ref...
GitHub监控消息提醒!!!
更新了:RCE
描述:Run scripts for PINACLES Radiative-Convective Equilibrium (RCE) experiments with various domain sizes, resolutions, and configurations
URL:https://github.com/WACCEM/pinacles-rce-runscripts
标签:#RCE
更新了:RCE
描述:Run scripts for PINACLES Radiative-Convective Equilibrium (RCE) experiments with various domain sizes, resolutions, and configurations
URL:https://github.com/WACCEM/pinacles-rce-runscripts
标签:#RCE
GitHub
GitHub - WACCEM/pinacles-rce-runscripts: Run scripts for PINACLES Radiative-Convective Equilibrium (RCE) experiments with various…
Run scripts for PINACLES Radiative-Convective Equilibrium (RCE) experiments with various domain sizes, resolutions, and configurations - WACCEM/pinacles-rce-runscripts
GitHub监控消息提醒!!!
更新了:RCE
描述:Fivem fileinjection RCE
URL:https://github.com/mmohnad/CVE-Fivem-FXServer-file-injection
标签:#RCE
更新了:RCE
描述:Fivem fileinjection RCE
URL:https://github.com/mmohnad/CVE-Fivem-FXServer-file-injection
标签:#RCE
GitHub
GitHub - mmohnad/CVE-Fivem-FXServer-file-injection: Fivem fileinjection RCE
Fivem fileinjection RCE. Contribute to mmohnad/CVE-Fivem-FXServer-file-injection development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a POC for Google Gemini RCE
URL:https://github.com/RootUp/gemini-rce
标签:#RCE
更新了:RCE
描述:This is a POC for Google Gemini RCE
URL:https://github.com/RootUp/gemini-rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:渗透测试
描述:这是一个集合dir扫描、全量指纹识别、xss识别以及爬虫的综合工具,适合HW以及渗透测试使用。
URL:https://github.com/qwerasdzx-123/YQHunter
标签:#渗透测试
更新了:渗透测试
描述:这是一个集合dir扫描、全量指纹识别、xss识别以及爬虫的综合工具,适合HW以及渗透测试使用。
URL:https://github.com/qwerasdzx-123/YQHunter
标签:#渗透测试
GitHub
GitHub - qwerasdzx-123/YQHunter: 这是一个集合dir扫描、全量指纹识别、xss识别以及爬虫的综合工具,适合HW以及渗透测试使用。
这是一个集合dir扫描、全量指纹识别、xss识别以及爬虫的综合工具,适合HW以及渗透测试使用。. Contribute to qwerasdzx-123/YQHunter development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:WordPress的News and Blog Designer Bundle插件在1.1及之前所有版本中,存在通过template参数导致的本地文件包含漏洞。该漏洞使得未经身份验证的攻击者能够包含并执行服务器上的任意.php文件,从而运行这些文件中的任何PHP代码。在允许上传和包含.php文件类型的场景下,攻击者可利用此漏洞绕过访问控制、获取敏感数据或实现代码执行。
URL:https://github.com/Kai-One001/WordPress-News-and-Blog-Designer-Bundle-CVE-2025-14502
标签:#绕过
更新了:绕过
描述:WordPress的News and Blog Designer Bundle插件在1.1及之前所有版本中,存在通过template参数导致的本地文件包含漏洞。该漏洞使得未经身份验证的攻击者能够包含并执行服务器上的任意.php文件,从而运行这些文件中的任何PHP代码。在允许上传和包含.php文件类型的场景下,攻击者可利用此漏洞绕过访问控制、获取敏感数据或实现代码执行。
URL:https://github.com/Kai-One001/WordPress-News-and-Blog-Designer-Bundle-CVE-2025-14502
标签:#绕过
GitHub
GitHub - Kai-One001/WordPress-News-and-Blog-Designer-Bundle-CVE-2025-14502: WordPress的News and Blog Designer Bundle插件在1.1及之前所有…
WordPress的News and Blog Designer Bundle插件在1.1及之前所有版本中,存在通过template参数导致的本地文件包含漏洞。该漏洞使得未经身份验证的攻击者能够包含并执行服务器上的任意.php文件,从而运行这些文件中的任何PHP代码。在允许上传和包含.php文件类型的场景下,攻击者可利用此漏洞绕过访问控制、获取敏感数据或实现代码执行。 - Kai-One00...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Kevlar Benchmark: OWASP Top 10 for Agentic Apps (AI-Agents) 2026 a Red Team Benchmark
URL:https://github.com/toxy4ny/kevlar-benchmark
标签:#Red Team
更新了:Red Team
描述:Kevlar Benchmark: OWASP Top 10 for Agentic Apps (AI-Agents) 2026 a Red Team Benchmark
URL:https://github.com/toxy4ny/kevlar-benchmark
标签:#Red Team
GitHub
GitHub - toxy4ny/kevlar-benchmark: Kevlar Benchmark: OWASP Top 10 for Agentic Apps (AI-Agents) 2026 a Red Team Benchmark
Kevlar Benchmark: OWASP Top 10 for Agentic Apps (AI-Agents) 2026 a Red Team Benchmark - toxy4ny/kevlar-benchmark
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-67246
URL:https://github.com/CDipper/CVE-Publication
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-67246
URL:https://github.com/CDipper/CVE-Publication
标签:#CVE-2026
GitHub
GitHub - CDipper/CVE-Publication: CVE-2026-67246
CVE-2026-67246. Contribute to CDipper/CVE-Publication development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:authorized CYBERDUDEBIVASH ECOSYSTEM tool for detecting CVE-2026-23550 in WordPress Modular DS plugin
URL:https://github.com/cyberdudebivash/CYBERDUDEBIVASH-Modular-DS-CVE-2026-23550-Detector
标签:#CVE-2026
更新了:CVE-2026
描述:authorized CYBERDUDEBIVASH ECOSYSTEM tool for detecting CVE-2026-23550 in WordPress Modular DS plugin
URL:https://github.com/cyberdudebivash/CYBERDUDEBIVASH-Modular-DS-CVE-2026-23550-Detector
标签:#CVE-2026
GitHub
GitHub - cyberdudebivash/CYBERDUDEBIVASH-Modular-DS-CVE-2026-23550-Detector: authorized CYBERDUDEBIVASH ECOSYSTEM tool for detecting…
authorized CYBERDUDEBIVASH ECOSYSTEM tool for detecting CVE-2026-23550 in WordPress Modular DS plugin - cyberdudebivash/CYBERDUDEBIVASH-Modular-DS-CVE-2026-23550-Detector
GitHub监控消息提醒!!!
更新了:Red Team
描述:Living-Off-the-Land (LOTL) attack detection using native Windows tools. Red Team + Blue Team investigation with MITRE ATT&CK mapping.
URL:https://github.com/RJRevies/NightFall-Project-01-LOTL-Detection
标签:#Red Team
更新了:Red Team
描述:Living-Off-the-Land (LOTL) attack detection using native Windows tools. Red Team + Blue Team investigation with MITRE ATT&CK mapping.
URL:https://github.com/RJRevies/NightFall-Project-01-LOTL-Detection
标签:#Red Team
GitHub
GitHub - RJRevies/NightFall-Project-01-LOTL-Detection: Living-Off-the-Land (LOTL) attack detection using native Windows tools.…
Living-Off-the-Land (LOTL) attack detection using native Windows tools. Red Team + Blue Team investigation with MITRE ATT&CK mapping. - RJRevies/NightFall-Project-01-LOTL-Detection
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:SSRF vulnerability in Xiaomi Mi Router 4A Gigabit Edition via Host Header Injection (CVE-2026-XXXXX)
URL:https://github.com/iwallplace/CVE-2026-XIAOMI-SSRF-HostHeaderInjection
标签:#CVE-2026
更新了:CVE-2026
描述:SSRF vulnerability in Xiaomi Mi Router 4A Gigabit Edition via Host Header Injection (CVE-2026-XXXXX)
URL:https://github.com/iwallplace/CVE-2026-XIAOMI-SSRF-HostHeaderInjection
标签:#CVE-2026
GitHub
GitHub - iwallplace/CVE-2026-XIAOMI-SSRF-HostHeaderInjection: SSRF vulnerability in Xiaomi Mi Router 4A Gigabit Edition via Host…
SSRF vulnerability in Xiaomi Mi Router 4A Gigabit Edition via Host Header Injection (CVE-2026-XXXXX) - iwallplace/CVE-2026-XIAOMI-SSRF-HostHeaderInjection