🚨 GitHub 监控消息提醒
🚨 发现关键词: #Red Team
📦 项目名称: RedTeamLearningJourney
👤 项目作者: VOONYUECHENG
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 18:59:27
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Red Team
📦 项目名称: RedTeamLearningJourney
👤 项目作者: VOONYUECHENG
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 18:59:27
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - VOONYUECHENG/RedTeamLearningJourney
Contribute to VOONYUECHENG/RedTeamLearningJourney development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: CVE-2023-27163---SSRF-Baskets-Requests
👤 项目作者: thealchimist86
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 18:37:56
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: CVE-2023-27163---SSRF-Baskets-Requests
👤 项目作者: thealchimist86
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 18:37:56
📝 项目描述:
Exploit for CVE-2023-27163 - SSRF Baskets Requests🔗 点击访问项目地址
GitHub
GitHub - thealchimist86/CVE-2023-27163---SSRF-Baskets-Requests: Exploit for CVE-2023-27163 - SSRF Baskets Requests
Exploit for CVE-2023-27163 - SSRF Baskets Requests - thealchimist86/CVE-2023-27163---SSRF-Baskets-Requests
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: pdo-secure-login-system
👤 项目作者: Roger530
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 19:04:11
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: pdo-secure-login-system
👤 项目作者: Roger530
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 19:04:11
📝 项目描述:
Secure Login System using PHP, PDO, and MySQL with CSRF and Session protection. Developed by Manus AI.🔗 点击访问项目地址
GitHub
GitHub - Roger530/pdo-secure-login-system: Secure Login System using PHP, PDO, and MySQL with CSRF and Session protection. Developed…
Secure Login System using PHP, PDO, and MySQL with CSRF and Session protection. Developed by Manus AI. - Roger530/pdo-secure-login-system
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS
📦 项目名称: wshawk
👤 项目作者: noobforanonymous
🛠 开发语言: Python
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-01-18 01:31:43
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS
📦 项目名称: wshawk
👤 项目作者: noobforanonymous
🛠 开发语言: Python
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-01-18 01:31:43
📝 项目描述:
Professional WebSocket security scanner with real XSS verification, OAST integration, session hijacking tests, and CVSS scoring. 22K+ payloads included.🔗 点击访问项目地址
GitHub
GitHub - noobforanonymous/wshawk: Professional WebSocket security scanner with real XSS verification, OAST integration, session…
Professional WebSocket security scanner with real XSS verification, OAST integration, session hijacking tests, and CVSS scoring. 22K+ payloads included. - noobforanonymous/wshawk
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Fuzzing
📦 项目名称: rca-tool
👤 项目作者: KuchikiRenji
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 19:06:17
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Fuzzing
📦 项目名称: rca-tool
👤 项目作者: KuchikiRenji
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 19:06:17
📝 项目描述:
CLI root cause analysis (RCA) tool using OpenAI to analyze software crash stack traces. TypeScript + Node.js. NTU MSCS Capstone.🔗 点击访问项目地址
GitHub
GitHub - KuchikiRenji/rca-tool: CLI root cause analysis (RCA) tool using OpenAI to analyze software crash stack traces. TypeScript…
CLI root cause analysis (RCA) tool using OpenAI to analyze software crash stack traces. TypeScript + Node.js. NTU MSCS Capstone. - KuchikiRenji/rca-tool
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Reverse Shell
📦 项目名称: reverseshell
👤 项目作者: CyberKareem
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 18:43:36
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Reverse Shell
📦 项目名称: reverseshell
👤 项目作者: CyberKareem
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 18:43:36
📝 项目描述:
Reverse shells🔗 点击访问项目地址
GitHub
GitHub - CyberKareem/reverseshell: Reverse shells
Reverse shells. Contribute to CyberKareem/reverseshell development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: obrunolima1910.github.io
👤 项目作者: obrunolima1910
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 19:49:34
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: obrunolima1910.github.io
👤 项目作者: obrunolima1910
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 19:49:34
📝 项目描述:
🔍 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd, for instant root shell access without authentication.🔗 点击访问项目地址
GitHub
GitHub - obrunolima1910/obrunolima1910.github.io: 🔍 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils…
🔍 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd, for instant root shell access without authentication. - obrunolima1910/obrunolima1910.github.io
🚨 GitHub 监控消息提醒
🚨 发现关键词: #bypass
📦 项目名称: Muck-MASS-SMS-Sender-Whatsapp-Boomber
👤 项目作者: Tawwz
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 10 | 🍴 Fork数量: 2
📅 更新时间: 2026-02-03 20:01:13
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #bypass
📦 项目名称: Muck-MASS-SMS-Sender-Whatsapp-Boomber
👤 项目作者: Tawwz
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 10 | 🍴 Fork数量: 2
📅 更新时间: 2026-02-03 20:01:13
📝 项目描述:
SMS APIs and gateways enable services like messaging, verification, and spamming. Tools like SMS bombers or prank apps exploit these systems, while bypassing platforms like WhatsApp, Telegram, and Instagram for malicious or recreational hacking purposes.🔗 点击访问项目地址
GitHub
GitHub - Tawwz/Muck-MASS-SMS-Sender-Whatsapp-Boomber: SMS APIs and gateways enable services like messaging, verification, and spamming.…
SMS APIs and gateways enable services like messaging, verification, and spamming. Tools like SMS bombers or prank apps exploit these systems, while bypassing platforms like WhatsApp, Telegram, and ...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp
📦 项目名称: Diff-Hunter
👤 项目作者: Justice-Reaper
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 19:56:40
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp
📦 项目名称: Diff-Hunter
👤 项目作者: Justice-Reaper
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 19:56:40
📝 项目描述:
A Burp Suite extension for comparing HTTP requests and responses to identify differences between them🔗 点击访问项目地址
GitHub
GitHub - Justice-Reaper/Diff-Hunter: A Burp Suite extension for comparing HTTP requests and responses to identify differences between…
A Burp Suite extension for comparing HTTP requests and responses to identify differences between them - Justice-Reaper/Diff-Hunter
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Loader
📦 项目名称: loader_moonhub
👤 项目作者: nick0022
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 20:05:57
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Loader
📦 项目名称: loader_moonhub
👤 项目作者: nick0022
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 20:05:57
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - nick0022/loader_moonhub
Contribute to nick0022/loader_moonhub development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Fuzzing
📦 项目名称: Python-Blacklist-Breaker
👤 项目作者: Froezens
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 20:02:02
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Fuzzing
📦 项目名称: Python-Blacklist-Breaker
👤 项目作者: Froezens
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 20:02:02
📝 项目描述:
It is an automated Python virtual machine escape payload skipping framework that helps security researchers discover viable payload variants under strict character blacklist restrictions.🔗 点击访问项目地址
GitHub
GitHub - Froezens/Python-Blacklist-Breaker: It is an automated Python virtual machine escape payload skipping framework that helps…
It is an automated Python virtual machine escape payload skipping framework that helps security researchers discover viable payload variants under strict character blacklist restrictions. - Froezen...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-XXXX-Pixeon-WebLaudos-AuthBypass
👤 项目作者: Sanmiir
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 20:15:28
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-XXXX-Pixeon-WebLaudos-AuthBypass
👤 项目作者: Sanmiir
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 20:15:28
📝 项目描述:
critical vulnerability, Authentication Bypass via Client-Side + Unauthenticated IDOR, discovered in Pixeon WebLaudos🔗 点击访问项目地址
GitHub
GitHub - Sanmiir/CVE-2026-XXXX-Pixeon-WebLaudos-AuthBypass: critical vulnerability, Authentication Bypass via Client-Side + Unauthenticated…
critical vulnerability, Authentication Bypass via Client-Side + Unauthenticated IDOR, discovered in Pixeon WebLaudos - Sanmiir/CVE-2026-XXXX-Pixeon-WebLaudos-AuthBypass
🚨 GitHub 监控消息提醒
🚨 发现关键词: #护网
📦 项目名称: BTN-Collected-Rules
👤 项目作者: PBH-BTN
🛠 开发语言: Python
⭐ Star数量: 534 | 🍴 Fork数量: 17
📅 更新时间: 2026-02-03 20:30:25
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #护网
📦 项目名称: BTN-Collected-Rules
👤 项目作者: PBH-BTN
🛠 开发语言: Python
⭐ Star数量: 534 | 🍴 Fork数量: 17
📅 更新时间: 2026-02-03 20:30:25
📝 项目描述:
由 BTN 网络统计分析和维护的 BitTorrent 恶意/疑似恶意 IP 地址集合🔗 点击访问项目地址
GitHub
GitHub - PBH-BTN/BTN-Collected-Rules: 由 BTN 网络统计分析和维护的 BitTorrent 恶意/疑似恶意 IP 地址集合
由 BTN 网络统计分析和维护的 BitTorrent 恶意/疑似恶意 IP 地址集合. Contribute to PBH-BTN/BTN-Collected-Rules development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #bypass
📦 项目名称: emergency-pull-request-probot-app
👤 项目作者: github
🛠 开发语言: JavaScript
⭐ Star数量: 55 | 🍴 Fork数量: 6
📅 更新时间: 2026-02-03 21:01:06
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #bypass
📦 项目名称: emergency-pull-request-probot-app
👤 项目作者: github
🛠 开发语言: JavaScript
⭐ Star数量: 55 | 🍴 Fork数量: 6
📅 更新时间: 2026-02-03 21:01:06
📝 项目描述:
Bypass approval and checks in order to merge an emergency change to the main branch with audit controls.🔗 点击访问项目地址
GitHub
GitHub - github/emergency-pull-request-probot-app: Bypass approval and checks in order to merge an emergency change to the main…
Bypass approval and checks in order to merge an emergency change to the main branch with audit controls. - github/emergency-pull-request-probot-app
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp
📦 项目名称: BurpSuite
👤 项目作者: soy-oreocato
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 20:56:21
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp
📦 项目名称: BurpSuite
👤 项目作者: soy-oreocato
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 20:56:21
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - soy-oreocato/BurpSuite
Contribute to soy-oreocato/BurpSuite development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode
📦 项目名称: MSSQLServer-CLR-CommandKit
👤 项目作者: FlameBudy
🛠 开发语言: C#
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 21:04:29
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode
📦 项目名称: MSSQLServer-CLR-CommandKit
👤 项目作者: FlameBudy
🛠 开发语言: C#
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 21:04:29
📝 项目描述:
A single stored procedure transformed into a multi-functional tool like a Swiss Army knife after exploitation — an attack-focused SQL CLR toolset: file system control, payload preparation, privilege escalation, and shellcode/assembly loaders.🔗 点击访问项目地址
GitHub
GitHub - FlameBudy/MSSQLServer-CLR-CommandKit: A single stored procedure transformed into a multi-functional tool like a Swiss…
A single stored procedure transformed into a multi-functional tool like a Swiss Army knife after exploitation — an attack-focused SQL CLR toolset: file system control, payload preparation, privileg...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-24061-POC
👤 项目作者: Good123321-bot
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 21:32:53
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-24061-POC
👤 项目作者: Good123321-bot
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 21:32:53
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - Good123321-bot/CVE-2026-24061-POC
Contribute to Good123321-bot/CVE-2026-24061-POC development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-24854-ChurchCRM-6.7.2-Authenticated-Numeric-SQL-Injection
👤 项目作者: mbanyamer
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:00:00
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-24854-ChurchCRM-6.7.2-Authenticated-Numeric-SQL-Injection
👤 项目作者: mbanyamer
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:00:00
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - mbanyamer/CVE-2026-24854-ChurchCRM-6.7.2-Authenticated-Numeric-SQL-Injection
Contribute to mbanyamer/CVE-2026-24854-ChurchCRM-6.7.2-Authenticated-Numeric-SQL-Injection development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #burp
📦 项目名称: attackframework-burp-exporter
👤 项目作者: pS3ud0RAnD0m
🛠 开发语言: Java
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:02:01
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #burp
📦 项目名称: attackframework-burp-exporter
👤 项目作者: pS3ud0RAnD0m
🛠 开发语言: Java
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:02:01
📝 项目描述:
Continuously export Burp Suite data to AI-ready vector and search databases.🔗 点击访问项目地址
GitHub
GitHub - pS3ud0RAnD0m/attackframework-burp-exporter: Continuously export Burp Suite data to AI-ready vector and search databases.
Continuously export Burp Suite data to AI-ready vector and search databases. - pS3ud0RAnD0m/attackframework-burp-exporter
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode
📦 项目名称: windows-x64-shellcode-pipeline
👤 项目作者: Chirag600
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:04:29
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode
📦 项目名称: windows-x64-shellcode-pipeline
👤 项目作者: Chirag600
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:04:29
📝 项目描述:
🔧 Build customized Windows x64 shellcode efficiently with this Dockerized pipeline, featuring automated payload preparation and a custom encoder stub.🔗 点击访问项目地址
GitHub
GitHub - Chirag600/windows-x64-shellcode-pipeline: 🔧 Build customized Windows x64 shellcode efficiently with this Dockerized pipeline…
🔧 Build customized Windows x64 shellcode efficiently with this Dockerized pipeline, featuring automated payload preparation and a custom encoder stub. - Chirag600/windows-x64-shellcode-pipeline
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-24061
👤 项目作者: obrunolima1910
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:30:51
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-24061
👤 项目作者: obrunolima1910
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:30:51
📝 项目描述:
🚨 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd, for instant root shell access without authentication.🔗 点击访问项目地址
GitHub
GitHub - obrunolima1910/CVE-2026-24061: 🚨 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd…
🚨 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd, for instant root shell access without authentication. - obrunolima1910/CVE-2026-24061