GitHub监控消息提醒!!!
更新了:CVE-2026
描述:authorized CYBERDUDEBIVASH ECOSYSTEM tool for detecting CVE-2026-23550 in WordPress Modular DS plugin
URL:https://github.com/cyberdudebivash/CYBERDUDEBIVASH-Modular-DS-CVE-2026-23550-Detector
标签:#CVE-2026
更新了:CVE-2026
描述:authorized CYBERDUDEBIVASH ECOSYSTEM tool for detecting CVE-2026-23550 in WordPress Modular DS plugin
URL:https://github.com/cyberdudebivash/CYBERDUDEBIVASH-Modular-DS-CVE-2026-23550-Detector
标签:#CVE-2026
GitHub
GitHub - cyberdudebivash/CYBERDUDEBIVASH-Modular-DS-CVE-2026-23550-Detector: authorized CYBERDUDEBIVASH ECOSYSTEM tool for detecting…
authorized CYBERDUDEBIVASH ECOSYSTEM tool for detecting CVE-2026-23550 in WordPress Modular DS plugin - cyberdudebivash/CYBERDUDEBIVASH-Modular-DS-CVE-2026-23550-Detector
GitHub监控消息提醒!!!
更新了:Red Team
描述:Living-Off-the-Land (LOTL) attack detection using native Windows tools. Red Team + Blue Team investigation with MITRE ATT&CK mapping.
URL:https://github.com/RJRevies/NightFall-Project-01-LOTL-Detection
标签:#Red Team
更新了:Red Team
描述:Living-Off-the-Land (LOTL) attack detection using native Windows tools. Red Team + Blue Team investigation with MITRE ATT&CK mapping.
URL:https://github.com/RJRevies/NightFall-Project-01-LOTL-Detection
标签:#Red Team
GitHub
GitHub - RJRevies/NightFall-Project-01-LOTL-Detection: Living-Off-the-Land (LOTL) attack detection using native Windows tools.…
Living-Off-the-Land (LOTL) attack detection using native Windows tools. Red Team + Blue Team investigation with MITRE ATT&CK mapping. - RJRevies/NightFall-Project-01-LOTL-Detection
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:SSRF vulnerability in Xiaomi Mi Router 4A Gigabit Edition via Host Header Injection (CVE-2026-XXXXX)
URL:https://github.com/iwallplace/CVE-2026-XIAOMI-SSRF-HostHeaderInjection
标签:#CVE-2026
更新了:CVE-2026
描述:SSRF vulnerability in Xiaomi Mi Router 4A Gigabit Edition via Host Header Injection (CVE-2026-XXXXX)
URL:https://github.com/iwallplace/CVE-2026-XIAOMI-SSRF-HostHeaderInjection
标签:#CVE-2026
GitHub
GitHub - iwallplace/CVE-2026-XIAOMI-SSRF-HostHeaderInjection: SSRF vulnerability in Xiaomi Mi Router 4A Gigabit Edition via Host…
SSRF vulnerability in Xiaomi Mi Router 4A Gigabit Edition via Host Header Injection (CVE-2026-XXXXX) - iwallplace/CVE-2026-XIAOMI-SSRF-HostHeaderInjection
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-24367: Cacti AuthN Graph Template RCE in posix sh
URL:https://github.com/matesz44/CVE-2025-24367
标签:#RCE
更新了:RCE
描述:CVE-2025-24367: Cacti AuthN Graph Template RCE in posix sh
URL:https://github.com/matesz44/CVE-2025-24367
标签:#RCE
GitHub
GitHub - matesz44/CVE-2025-24367: CVE-2025-24367: Cacti AuthN Graph Template RCE in posix sh
CVE-2025-24367: Cacti AuthN Graph Template RCE in posix sh - matesz44/CVE-2025-24367
GitHub监控消息提醒!!!
更新了:信息收集
描述:期货信息收集与分发系统 - 基于Miniflux的Go服务端
URL:https://github.com/DayDayUpGamer/AIFutures-Server
标签:#信息收集
更新了:信息收集
描述:期货信息收集与分发系统 - 基于Miniflux的Go服务端
URL:https://github.com/DayDayUpGamer/AIFutures-Server
标签:#信息收集
GitHub
GitHub - DayDayUpGamer/AIFutures-Server: 期货信息收集与分发系统 - 基于Miniflux的Go服务端
期货信息收集与分发系统 - 基于Miniflux的Go服务端. Contribute to DayDayUpGamer/AIFutures-Server development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-666 - ShadowWeb Framework Remote Code Execution Vulnerability
URL:https://github.com/adriangigliotti/CVE-2026-666
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-666 - ShadowWeb Framework Remote Code Execution Vulnerability
URL:https://github.com/adriangigliotti/CVE-2026-666
标签:#CVE-2026
GitHub
adriangigliotti/CVE-2026-666
CVE-2026-666 - ShadowWeb Framework Remote Code Execution Vulnerability - adriangigliotti/CVE-2026-666
GitHub监控消息提醒!!!
更新了:信息收集
描述:基于 Python 的轻量级域名信息收集工具,支持子域名扫描、端口扫描和标题爬取
URL:https://github.com/Dametime-0/domain-recon
标签:#信息收集
更新了:信息收集
描述:基于 Python 的轻量级域名信息收集工具,支持子域名扫描、端口扫描和标题爬取
URL:https://github.com/Dametime-0/domain-recon
标签:#信息收集
GitHub
GitHub - Dametime-0/domain-recon: 基于 Python 的轻量级域名信息收集工具,支持子域名扫描、端口扫描和标题爬取
基于 Python 的轻量级域名信息收集工具,支持子域名扫描、端口扫描和标题爬取. Contribute to Dametime-0/domain-recon development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Network Diff Scanner in Python for detecting port changes over time (Red Team & Blue Team fundamentals)
URL:https://github.com/Matizuni/Network-diff-scanner
标签:#Red Team
更新了:Red Team
描述:Network Diff Scanner in Python for detecting port changes over time (Red Team & Blue Team fundamentals)
URL:https://github.com/Matizuni/Network-diff-scanner
标签:#Red Team
GitHub
Matizuni/Network-diff-scanner
Network Diff Scanner in Python for detecting port changes over time (Red Team & Blue Team fundamentals) - Matizuni/Network-diff-scanner
GitHub监控消息提醒!!!
更新了:信息收集
描述:Hacker Agent 是一个专业的渗透测试 AI 助手,具备 OSCP、CEH 等专业认证知识体系。通过集成 MCP 服务器调用 Kali Linux 工具,实现从信息收集到权限提升的完整渗透测试流程。项目采用 ReAct (推理-行动) 方法论,让 AI 能够进行多步骤推理和决策,系统化地发现安全漏洞。
URL:https://github.com/jasontan1024/hacker-agent
标签:#信息收集
更新了:信息收集
描述:Hacker Agent 是一个专业的渗透测试 AI 助手,具备 OSCP、CEH 等专业认证知识体系。通过集成 MCP 服务器调用 Kali Linux 工具,实现从信息收集到权限提升的完整渗透测试流程。项目采用 ReAct (推理-行动) 方法论,让 AI 能够进行多步骤推理和决策,系统化地发现安全漏洞。
URL:https://github.com/jasontan1024/hacker-agent
标签:#信息收集
GitHub
GitHub - jasontan1024/hacker-agent: Hacker Agent 是一个专业的渗透测试 AI 助手,具备 OSCP、CEH 等专业认证知识体系。通过集成 MCP 服务器调用 Kali Linux 工具,实现从信息收集到权…
Hacker Agent 是一个专业的渗透测试 AI 助手,具备 OSCP、CEH 等专业认证知识体系。通过集成 MCP 服务器调用 Kali Linux 工具,实现从信息收集到权限提升的完整渗透测试流程。项目采用 ReAct (推理-行动) 方法论,让 AI 能够进行多步骤推理和决策,系统化地发现安全漏洞。 - jasontan1024/hacker-agent
GitHub监控消息提醒!!!
更新了:渗透测试
描述:MPET (Multi-Protocol Exploitation Toolkit) 是一款专业的多协议安全测试工具,基于 Wails 框架构建的现代化桌面应用。它提供了对 25+ 种主流服务协议的连接测试、未授权访问检测、弱口令检测和漏洞利用能力,是安全研究人员和渗透测试工程师的得力助手。
URL:https://github.com/onewinner/MPET
标签:#渗透测试
更新了:渗透测试
描述:MPET (Multi-Protocol Exploitation Toolkit) 是一款专业的多协议安全测试工具,基于 Wails 框架构建的现代化桌面应用。它提供了对 25+ 种主流服务协议的连接测试、未授权访问检测、弱口令检测和漏洞利用能力,是安全研究人员和渗透测试工程师的得力助手。
URL:https://github.com/onewinner/MPET
标签:#渗透测试
GitHub
GitHub - onewinner/MPET: MPET (Multi-Protocol Exploitation Toolkit) 是一款专业的多协议安全测试工具,基于 Wails 框架构建的现代化桌面应用。它提供了对 25+ 种主流服务协议的连接…
MPET (Multi-Protocol Exploitation Toolkit) 是一款专业的多协议安全测试工具,基于 Wails 框架构建的现代化桌面应用。它提供了对 25+ 种主流服务协议的连接测试、未授权访问检测、弱口令检测和漏洞利用能力,是安全研究人员和渗透测试工程师的得力助手。 - onewinner/MPET
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-22812
URL:https://github.com/Udyz/CVE-2026-22812-Exp
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-22812
URL:https://github.com/Udyz/CVE-2026-22812-Exp
标签:#CVE-2026
GitHub
GitHub - Udyz/CVE-2026-22812-Exp: CVE-2026-22812
CVE-2026-22812. Contribute to Udyz/CVE-2026-22812-Exp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/Su-m-up/xv6-public
标签:#绕过
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/Su-m-up/xv6-public
标签:#绕过
GitHub
GitHub - Su-m-up/xv6-public: 一、实践背景 本实践基于 MIT xv6(x86 版本),围绕操作系统从 bootloader 到内核 main 函数的完 整启动流程展开,配合视频学习 bootblock、bootasm.S…
一、实践背景 本实践基于 MIT xv6(x86 版本),围绕操作系统从 bootloader 到内核 main 函数的完 整启动流程展开,配合视频学习 bootblock、bootasm.S、bootmain.c、entry.S 以及内 核页表初始化过程。 二、实践目标 1. 理解 xv6 启动链路:bootblock → bootasm.S → bootmain.c → entry...
GitHub监控消息提醒!!!
更新了:RCE
描述:16x CRITICAL Memory Corruption Bugs | Production RCE Expert
URL:https://github.com/harshvardhan1gour/harshvardhan-gour-bugs
标签:#RCE
更新了:RCE
描述:16x CRITICAL Memory Corruption Bugs | Production RCE Expert
URL:https://github.com/harshvardhan1gour/harshvardhan-gour-bugs
标签:#RCE
GitHub
GitHub - harshvardhan1gour/harshvardhan-gour-bugs: 16x CRITICAL Memory Corruption Bugs | Production RCE Expert
16x CRITICAL Memory Corruption Bugs | Production RCE Expert - harshvardhan1gour/harshvardhan-gour-bugs
GitHub监控消息提醒!!!
更新了:RCE
描述:Execute commands across Windows systems using multiple RCE methods
URL:https://github.com/KhaelK138/authfinder
标签:#RCE
更新了:RCE
描述:Execute commands across Windows systems using multiple RCE methods
URL:https://github.com/KhaelK138/authfinder
标签:#RCE
GitHub
GitHub - KhaelK138/authfinder: Execute commands across Windows systems using multiple RCE methods
Execute commands across Windows systems using multiple RCE methods - KhaelK138/authfinder
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Proof of Concept exploit for CVE-2026-XXXXX in OpenWrt luci-app-https-dns-proxy
URL:https://github.com/iwallplace/CVE-2026-XXXXX-OpenWrt-Exploit
标签:#CVE-2026
更新了:CVE-2026
描述:Proof of Concept exploit for CVE-2026-XXXXX in OpenWrt luci-app-https-dns-proxy
URL:https://github.com/iwallplace/CVE-2026-XXXXX-OpenWrt-Exploit
标签:#CVE-2026
GitHub
GitHub - iwallplace/CVE-2026-XXXXX-OpenWrt-Exploit: Proof of Concept exploit for CVE-2026-XXXXX in OpenWrt luci-app-https-dns-proxy
Proof of Concept exploit for CVE-2026-XXXXX in OpenWrt luci-app-https-dns-proxy - iwallplace/CVE-2026-XXXXX-OpenWrt-Exploit
GitHub监控消息提醒!!!
更新了:RCE
描述:Tool for inserting make4ht-generated HTML into the CanvasRCE using a local server + bookmarklet.
URL:https://github.com/brichwin/canvas-rce-html-uploader
标签:#RCE
更新了:RCE
描述:Tool for inserting make4ht-generated HTML into the CanvasRCE using a local server + bookmarklet.
URL:https://github.com/brichwin/canvas-rce-html-uploader
标签:#RCE
GitHub
GitHub - brichwin/canvas-rce-html-uploader: Tool for inserting make4ht-generated HTML into the CanvasRCE using a local server +…
Tool for inserting make4ht-generated HTML into the CanvasRCE using a local server + bookmarklet. - brichwin/canvas-rce-html-uploader
GitHub监控消息提醒!!!
更新了:内网渗透
描述:FlyWheel is an intranet penetration aid developed based on Rust FlyWheel是一个基于Rust开发的内网渗透辅助工具
URL:https://github.com/BlkSword/IntraSweep
标签:#内网渗透
更新了:内网渗透
描述:FlyWheel is an intranet penetration aid developed based on Rust FlyWheel是一个基于Rust开发的内网渗透辅助工具
URL:https://github.com/BlkSword/IntraSweep
标签:#内网渗透
GitHub
GitHub - BlkSword/IntraSweep: IntraSweep is an intranet penetration aid developed based on Rust IntraSweep是一个基于Rust开发的内网渗透辅助工具
IntraSweep is an intranet penetration aid developed based on Rust IntraSweep是一个基于Rust开发的内网渗透辅助工具 - BlkSword/IntraSweep
GitHub监控消息提醒!!!
更新了:RCE
描述:Rynkowa Cena Energii (RCE) for HAos - API v2 ranking setup
URL:https://github.com/Tommyleesue/RCE-PSE-tommyleesue
标签:#RCE
更新了:RCE
描述:Rynkowa Cena Energii (RCE) for HAos - API v2 ranking setup
URL:https://github.com/Tommyleesue/RCE-PSE-tommyleesue
标签:#RCE
GitHub
GitHub - Tommyleesue/RCE-PSE-tommyleesue: Rynkowa Cena Energii (RCE) for HAos - API v2 ranking setup
Rynkowa Cena Energii (RCE) for HAos - API v2 ranking setup - Tommyleesue/RCE-PSE-tommyleesue
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit
URL:https://github.com/sastraadiwiguna-purpleeliteteaming/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit
标签:#CVE-2026
更新了:CVE-2026
描述:SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit
URL:https://github.com/sastraadiwiguna-purpleeliteteaming/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit
标签:#CVE-2026
GitHub
GitHub - sastraadiwiguna-purpleeliteteaming/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit: SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic…
SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit. Contribute to sastraadiwiguna-purpleeliteteaming/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit development by creating an account on GitHub.
Forwarded from 🌈盘丝洞防失联|导航|广告|管理✨
Forwarded from Y3-无双
8月13号 神秘玩家仅用300u爆奖140万u,成功提款1088888u
8月16号 反水1700u仅用80u爆奖54万u,成功提款60万u
10月10号 大哥在PG麻将胡了爆奖260万u,成功提款210万u
12月6号 神秘盘总PA真人豪赢400万u,成功提款370万u
Please open Telegram to view this post
VIEW IN TELEGRAM