🚨 GitHub 监控消息提醒
🚨 发现关键词: #burp
📦 项目名称: attackframework-burp-exporter
👤 项目作者: pS3ud0RAnD0m
🛠 开发语言: Java
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:02:01
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #burp
📦 项目名称: attackframework-burp-exporter
👤 项目作者: pS3ud0RAnD0m
🛠 开发语言: Java
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:02:01
📝 项目描述:
Continuously export Burp Suite data to AI-ready vector and search databases.🔗 点击访问项目地址
GitHub
GitHub - pS3ud0RAnD0m/attackframework-burp-exporter: Continuously export Burp Suite data to AI-ready vector and search databases.
Continuously export Burp Suite data to AI-ready vector and search databases. - pS3ud0RAnD0m/attackframework-burp-exporter
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode
📦 项目名称: windows-x64-shellcode-pipeline
👤 项目作者: Chirag600
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:04:29
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode
📦 项目名称: windows-x64-shellcode-pipeline
👤 项目作者: Chirag600
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:04:29
📝 项目描述:
🔧 Build customized Windows x64 shellcode efficiently with this Dockerized pipeline, featuring automated payload preparation and a custom encoder stub.🔗 点击访问项目地址
GitHub
GitHub - Chirag600/windows-x64-shellcode-pipeline: 🔧 Build customized Windows x64 shellcode efficiently with this Dockerized pipeline…
🔧 Build customized Windows x64 shellcode efficiently with this Dockerized pipeline, featuring automated payload preparation and a custom encoder stub. - Chirag600/windows-x64-shellcode-pipeline
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-24061
👤 项目作者: obrunolima1910
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:30:51
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-24061
👤 项目作者: obrunolima1910
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:30:51
📝 项目描述:
🚨 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd, for instant root shell access without authentication.🔗 点击访问项目地址
GitHub
GitHub - obrunolima1910/CVE-2026-24061: 🚨 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd…
🚨 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd, for instant root shell access without authentication. - obrunolima1910/CVE-2026-24061
🚨 GitHub 监控消息提醒
🚨 发现关键词: #bypass
📦 项目名称: PUBG-Mobile-Bypass-Antiban-BRAVE-Bypass-fixed
👤 项目作者: Kawomada
🛠 开发语言: C#
⭐ Star数量: 1 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-04 00:00:57
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #bypass
📦 项目名称: PUBG-Mobile-Bypass-Antiban-BRAVE-Bypass-fixed
👤 项目作者: Kawomada
🛠 开发语言: C#
⭐ Star数量: 1 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-04 00:00:57
📝 项目描述:
Brave Bypass is an open-source tool designed to bypass PUBG Mobiles security measures, allowing players to matchmake with phone players.🔗 点击访问项目地址
GitHub
GitHub - Kawomada/PUBG-Mobile-Bypass-Antiban-BRAVE-Bypass-fixed: Brave Bypass is an open-source tool designed to bypass PUBG Mobiles…
Brave Bypass is an open-source tool designed to bypass PUBG Mobiles security measures, allowing players to matchmake with phone players. - Kawomada/PUBG-Mobile-Bypass-Antiban-BRAVE-Bypass-fixed
🚨 GitHub 监控消息提醒
🚨 发现关键词: #漏洞检测
📦 项目名称: 13J6EY9rUA
👤 项目作者: kevin5771323
🛠 开发语言: None
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:09:22
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #漏洞检测
📦 项目名称: 13J6EY9rUA
👤 项目作者: kevin5771323
🛠 开发语言: None
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:09:22
📝 项目描述:
本系统旨在提供一种基于机器学习的Web漏洞检测解决方案。系统包括漏洞检测模块,能够自动识别和报告常见的Web安全问题。通过深度学习算法,系统具备自学习与优化能力,提高检测效率和准确性。功能覆盖静态分析与动态检测,支持多种漏洞类型的识别。🔗 点击访问项目地址
GitHub
GitHub - kevin5771323/13J6EY9rUA: 本系统旨在提供一种基于机器学习的Web漏洞检测解决方案。系统包括漏洞检测模块,能够自动识别和报告常见的Web安全问题。通过深度学习算法,系统具备自学习与优化能力,提高检测效率和准确性。…
本系统旨在提供一种基于机器学习的Web漏洞检测解决方案。系统包括漏洞检测模块,能够自动识别和报告常见的Web安全问题。通过深度学习算法,系统具备自学习与优化能力,提高检测效率和准确性。功能覆盖静态分析与动态检测,支持多种漏洞类型的识别。 - kevin5771323/13J6EY9rUA
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: ParamX
👤 项目作者: viaC5real
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:10:17
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: ParamX
👤 项目作者: viaC5real
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:10:17
📝 项目描述:
🔍 Extract and construct missing parameters from JavaScript files for effective unauthorized testing, enhancing your API engagement strategy.🔗 点击访问项目地址
GitHub
GitHub - viaC5real/ParamX: 🔍 Extract and construct missing parameters from JavaScript files for effective unauthorized testing…
🔍 Extract and construct missing parameters from JavaScript files for effective unauthorized testing, enhancing your API engagement strategy. - viaC5real/ParamX
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: AuthLab
👤 项目作者: noangel988
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:16:10
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: AuthLab
👤 项目作者: noangel988
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:16:10
📝 项目描述:
🛡️ Build secure and efficient user authentication systems with AuthLab, featuring JWT, session management, and advanced security measures.🔗 点击访问项目地址
GitHub
GitHub - noangel988/AuthLab: 🛡️ Build secure and efficient user authentication systems with AuthLab, featuring JWT, session management…
🛡️ Build secure and efficient user authentication systems with AuthLab, featuring JWT, session management, and advanced security measures. - noangel988/AuthLab
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS
📦 项目名称: Bug-Bounty-Roadmap
👤 项目作者: MiguelArmando
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:26:54
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS
📦 项目名称: Bug-Bounty-Roadmap
👤 项目作者: MiguelArmando
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-03 23:26:54
📝 项目描述:
🐞 Discover a structured roadmap to learn Bug Bounty Hunting and Web Security, guiding you from beginner to advanced with quality resources and hands-on practice.🔗 点击访问项目地址
GitHub
GitHub - MiguelArmando/Bug-Bounty-Roadmap: 🐞 Discover a structured roadmap to learn Bug Bounty Hunting and Web Security, guiding…
🐞 Discover a structured roadmap to learn Bug Bounty Hunting and Web Security, guiding you from beginner to advanced with quality resources and hands-on practice. - MiguelArmando/Bug-Bounty-Roadmap
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode
📦 项目名称: WindowsShell-Injector-Shellcode-Loader
👤 项目作者: Kawramk
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 00:01:14
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode
📦 项目名称: WindowsShell-Injector-Shellcode-Loader
👤 项目作者: Kawramk
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 00:01:14
📝 项目描述:
An advanced Windows shell code loader and generator toolset featuring XOR encryption, debug protection, and GUI capabilities for penetration testing.🔗 点击访问项目地址
GitHub
GitHub - Kawramk/WindowsShell-Injector-Shellcode-Loader: An advanced Windows shell code loader and generator toolset featuring…
An advanced Windows shell code loader and generator toolset featuring XOR encryption, debug protection, and GUI capabilities for penetration testing. - Kawramk/WindowsShell-Injector-Shellcode-Loader
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE
📦 项目名称: lab-cve-2016-15042
👤 项目作者: Aditya43621
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 00:59:23
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE
📦 项目名称: lab-cve-2016-15042
👤 项目作者: Aditya43621
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 00:59:23
📝 项目描述:
🛠️ Validate and demonstrate CVE-2016-15042 with a Dockerized lab for unauthenticated file uploads in WordPress file managers.🔗 点击访问项目地址
GitHub
GitHub - Aditya43621/lab-cve-2016-15042: 🛠️ Validate and demonstrate CVE-2016-15042 with a Dockerized lab for unauthenticated file…
🛠️ Validate and demonstrate CVE-2016-15042 with a Dockerized lab for unauthenticated file uploads in WordPress file managers. - Aditya43621/lab-cve-2016-15042
🚨 GitHub 监控消息提醒
🚨 发现关键词: #bypass
📦 项目名称: hidetik
👤 项目作者: Mastermaie
🛠 开发语言: JavaScript
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 01:00:01
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #bypass
📦 项目名称: hidetik
👤 项目作者: Mastermaie
🛠 开发语言: JavaScript
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 01:00:01
📝 项目描述:
🎭 Disguise TikTok as any app, even in screen time, to enhance privacy and manage usage effectively.🔗 点击访问项目地址
GitHub
GitHub - Mastermaie/hidetik: 🎭 Disguise TikTok as any app, even in screen time, to enhance privacy and manage usage effectively.
🎭 Disguise TikTok as any app, even in screen time, to enhance privacy and manage usage effectively. - Mastermaie/hidetik
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp
📦 项目名称: broken-access-automate-burp-extension
👤 项目作者: hubymeme22
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 00:43:53
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp
📦 项目名称: broken-access-automate-burp-extension
👤 项目作者: hubymeme22
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 00:43:53
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - hubymeme22/broken-access-automate-burp-extension
Contribute to hubymeme22/broken-access-automate-burp-extension development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #漏洞利用
📦 项目名称: FnOS-GUI-Exploit-Tool
👤 项目作者: nyzx0322
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 00:51:17
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #漏洞利用
📦 项目名称: FnOS-GUI-Exploit-Tool
👤 项目作者: nyzx0322
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 00:51:17
📝 项目描述:
FnOS 可视化漏洞利用工具:路径泄露、文件读取、远程执行。🔗 点击访问项目地址
GitHub
GitHub - nyzx0322/FnOS-GUI-Exploit-Tool: FnOS 可视化漏洞利用工具:路径泄露、文件读取、远程执行。
FnOS 可视化漏洞利用工具:路径泄露、文件读取、远程执行。. Contribute to nyzx0322/FnOS-GUI-Exploit-Tool development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Red Team
📦 项目名称: BreakerZero_PasswordCracker_v1.0
👤 项目作者: Ramborat1013
🛠 开发语言: Python
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 01:01:21
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Red Team
📦 项目名称: BreakerZero_PasswordCracker_v1.0
👤 项目作者: Ramborat1013
🛠 开发语言: Python
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 01:01:21
📝 项目描述:
🔓 Crack passwords and hashes with BreakerZero, the efficient toolkit for ethical hacking and security research, designed for red team operations.🔗 点击访问项目地址
GitHub
GitHub - Ramborat1013/BreakerZero_PasswordCracker_v1.0: 🔓 Crack passwords and hashes with BreakerZero, the efficient toolkit for…
🔓 Crack passwords and hashes with BreakerZero, the efficient toolkit for ethical hacking and security research, designed for red team operations. - Ramborat1013/BreakerZero_PasswordCracker_v1.0
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS
📦 项目名称: skillLab
👤 项目作者: Ruivoexe
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 01:05:36
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS
📦 项目名称: skillLab
👤 项目作者: Ruivoexe
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 01:05:36
📝 项目描述:
Plataforma de treinamento em cibersegurança com: Páginas vulneráveis Scripts de ataque (SQLi, XSS, Brute Force, IDOR, Path Traversal) Sistema de detecção Geração de relatórios (.log) 🔗 点击访问项目地址
GitHub
GitHub - Ruivoexe/skillLab: Plataforma de treinamento em cibersegurança com: Páginas vulneráveis Scripts de ataque (SQLi, XSS…
Plataforma de treinamento em cibersegurança com: Páginas vulneráveis Scripts de ataque (SQLi, XSS, Brute Force, IDOR, Path Traversal) Sistema de detecção Geração de relatórios (.log) - Git...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: 0xKern3lCrush-Foreverday-BYOVD-CVE-2026-0828
👤 项目作者: DeathShotXD
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 01:47:37
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: 0xKern3lCrush-Foreverday-BYOVD-CVE-2026-0828
👤 项目作者: DeathShotXD
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 01:47:37
📝 项目描述:
Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Driver) TTPs for Ring 0 process termination and physical memory R/W. Researching EDR-Killer patterns, PPL bypasses, and kernel-mode primitives used by MedusaLocker and other threat actors.🔗 点击访问项目地址
GitHub
DeathShotXD/0xKern3lCrush-Foreverday-BYOVD-CVE-2026-0828
Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Driver) TTPs for Ring 0 process termination and physical ...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE
📦 项目名称: react2shellexploitvisualized
👤 项目作者: imm17
🛠 开发语言: Svelte
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 01:59:50
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE
📦 项目名称: react2shellexploitvisualized
👤 项目作者: imm17
🛠 开发语言: Svelte
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 01:59:50
📝 项目描述:
🔍 Visualize and understand the React2Shell vulnerability with a narrated walkthrough, detailing its impact and secure solutions for React Server Components.🔗 点击访问项目地址
GitHub
GitHub - imm17/react2shellexploitvisualized: 🔍 Visualize and understand the React2Shell vulnerability with a narrated walkthrough…
🔍 Visualize and understand the React2Shell vulnerability with a narrated walkthrough, detailing its impact and secure solutions for React Server Components. - imm17/react2shellexploitvisualized
🚨 GitHub 监控消息提醒
🚨 发现关键词: #bypass
📦 项目名称: http-threat-blocklist
👤 项目作者: ddrimus
🛠 开发语言: None
⭐ Star数量: 5 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:00:52
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #bypass
📦 项目名称: http-threat-blocklist
👤 项目作者: ddrimus
🛠 开发语言: None
⭐ Star数量: 5 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:00:52
📝 项目描述:
A daily-updated blocklist of IP addresses involved in malicious HTTP attacks that bypassed multiple security layers. Ideal for protecting web servers against probing, exploits, and bot traffic.🔗 点击访问项目地址
GitHub
GitHub - ddrimus/http-threat-blocklist: A daily-updated blocklist of IP addresses involved in malicious HTTP attacks that bypassed…
A daily-updated blocklist of IP addresses involved in malicious HTTP attacks that bypassed multiple security layers. Ideal for protecting web servers against probing, exploits, and bot traffic. - d...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #webshell
📦 项目名称: OrionPrime
👤 项目作者: mt801
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:01:30
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #webshell
📦 项目名称: OrionPrime
👤 项目作者: mt801
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:01:30
📝 项目描述:
⚙️ Streamline edge-computation and predictive analytics in containerized microservices with OrionPrime for a highly available, self-healing solution.🔗 点击访问项目地址
GitHub
GitHub - mt801/OrionPrime: ⚙️ Streamline edge-computation and predictive analytics in containerized microservices with OrionPrime…
⚙️ Streamline edge-computation and predictive analytics in containerized microservices with OrionPrime for a highly available, self-healing solution. - mt801/OrionPrime
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Red Team
📦 项目名称: cyber-os-flutter
👤 项目作者: Nightking002
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:02:57
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Red Team
📦 项目名称: cyber-os-flutter
👤 项目作者: Nightking002
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:02:57
📝 项目描述:
🛡️ Enhance mobile cyber security with CYBER_OS, a toolkit for penetration testers and researchers featuring advanced reconnaissance and Red Team utilities.🔗 点击访问项目地址
GitHub
GitHub - Nightking002/cyber-os-flutter: 🛡️ Enhance mobile cyber security with CYBER_OS, a toolkit for penetration testers and researchers…
🛡️ Enhance mobile cyber security with CYBER_OS, a toolkit for penetration testers and researchers featuring advanced reconnaissance and Red Team utilities. - Nightking002/cyber-os-flutter
🚨 GitHub 监控消息提醒
🚨 发现关键词: #burp
📦 项目名称: HTB-Writeups
👤 项目作者: savitskiyes-stack
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:04:46
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #burp
📦 项目名称: HTB-Writeups
👤 项目作者: savitskiyes-stack
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:04:46
📝 项目描述:
Мои отчёты по penetration testing на Hack The Box. Навыки: Nmap, Burp Suite, etc.🔗 点击访问项目地址
GitHub
GitHub - savitskiyes-stack/HTB-Writeups: Мои отчёты по penetration testing на Hack The Box. Навыки: Nmap, Burp Suite, etc.
Мои отчёты по penetration testing на Hack The Box. Навыки: Nmap, Burp Suite, etc. - savitskiyes-stack/HTB-Writeups