🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: ScopeLine
👤 项目作者: dustinfant
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 17:51:49
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: ScopeLine
👤 项目作者: dustinfant
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 17:51:49
📝 项目描述:
ScopeLine is a modular, identity-aware pentesting framework for web apps and APIs. It discovers HTTP services, tests JWT and cookie auth, detects SSRF/IDOR, maps attack paths, and generates structured Markdown reports, ideal for security assessments and CI/CD integration.🔗 点击访问项目地址
GitHub
GitHub - dustinfant/ScopeLine: ScopeLine is a modular, identity-aware pentesting framework for web apps and APIs. It discovers…
ScopeLine is a modular, identity-aware pentesting framework for web apps and APIs. It discovers HTTP services, tests JWT and cookie auth, detects SSRF/IDOR, maps attack paths, and generates structu...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: SpringSecurityAuthJwt
👤 项目作者: chandrakant007
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 17:56:04
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: SpringSecurityAuthJwt
👤 项目作者: chandrakant007
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 17:56:04
📝 项目描述:
detailed example for authorization and authentication in spring boot framework. Whiach clearly give difference between AuthenticatorProvidor, AuthenticatorManager and UserServiceDetails. ALso it have UserDetailsDaoImpl in configuration. It hase JWT token usage and how we can stor CSRF token diable. 🔗 点击访问项目地址
GitHub
GitHub - chandrakant007/SpringSecurityAuthJwt: detailed example for authorization and authentication in spring boot framework.…
detailed example for authorization and authentication in spring boot framework. Whiach clearly give difference between AuthenticatorProvidor, AuthenticatorManager and UserServiceDetails. ALso it h...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Nuclei #Template
📦 项目名称: nuclei-templates
👤 项目作者: runZeroInc
🛠 开发语言: JavaScript
⭐ Star数量: 8 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 17:54:38
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Nuclei #Template
📦 项目名称: nuclei-templates
👤 项目作者: runZeroInc
🛠 开发语言: JavaScript
⭐ Star数量: 8 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 17:54:38
📝 项目描述:
This runZero fork of nuclei-templates includes small changes and metadata. Substantial changes from this repository are PRd back to the Project Discovery upstream. Issues and PRs are limited to runZero development; if you would like to file an issue or contribute, please use the Project Discovery repository instead.🔗 点击访问项目地址
GitHub
GitHub - runZeroInc/nuclei-templates: This runZero fork of nuclei-templates includes small changes and metadata. Substantial changes…
This runZero fork of nuclei-templates includes small changes and metadata. Substantial changes from this repository are PRd back to the Project Discovery upstream. Issues and PRs are limited to ru...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #渗透 #测试
📦 项目名称: Termux-X-wiki
👤 项目作者: xheishou-com
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 18:58:25
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #渗透 #测试
📦 项目名称: Termux-X-wiki
👤 项目作者: xheishou-com
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 18:58:25
📝 项目描述:
Termux-X 终端 - 移动端终极渗透测试平台使用知识库🔗 点击访问项目地址
GitHub
xheishou-com/Termux-X-wiki
Termux-X 终端 - 移动端终极渗透测试平台使用知识库. Contribute to xheishou-com/Termux-X-wiki development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: GhostVEH
👤 项目作者: Buvan7-glitch
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 19:00:29
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: GhostVEH
👤 项目作者: Buvan7-glitch
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 19:00:29
📝 项目描述:
👻 Manipulate ntdll's LdrpVectorHandlerList to register vectored exception handlers directly, bypassing traditional methods for enhanced control.🔗 点击访问项目地址
GitHub
GitHub - Buvan7-glitch/GhostVEH: 👻 Manipulate ntdll's LdrpVectorHandlerList to register vectored exception handlers directly, bypassing…
👻 Manipulate ntdll's LdrpVectorHandlerList to register vectored exception handlers directly, bypassing traditional methods for enhanced control. - Buvan7-glitch/GhostVEH
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: lab-threadhub
👤 项目作者: Mgsy
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 18:59:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: lab-threadhub
👤 项目作者: Mgsy
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 18:59:58
📝 项目描述:
A hands-on security lab demonstrating secondary-context path traversal and DNS rebinding leading to SSRF🔗 点击访问项目地址
GitHub
GitHub - Mgsy/lab-threadhub: A hands-on security lab demonstrating secondary-context path traversal and DNS rebinding leading to…
A hands-on security lab demonstrating secondary-context path traversal and DNS rebinding leading to SSRF - Mgsy/lab-threadhub
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Nuclei #Template
📦 项目名称: nestsecure
👤 项目作者: ramjavii
🛠 开发语言: JavaScript
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 19:01:59
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Nuclei #Template
📦 项目名称: nestsecure
👤 项目作者: ramjavii
🛠 开发语言: JavaScript
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 19:01:59
📝 项目描述:
Sistema de escaneo de vulnerabilidades on-premise con múltiples engines (Nmap, OpenVAS, ZAP, Nuclei)🔗 点击访问项目地址
GitHub
GitHub - ramjavii/nestsecure: Sistema de escaneo de vulnerabilidades on-premise con múltiples engines (Nmap, OpenVAS, ZAP, Nuclei)
Sistema de escaneo de vulnerabilidades on-premise con múltiples engines (Nmap, OpenVAS, ZAP, Nuclei) - ramjavii/nestsecure
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: telnet-CVE-2026-24061
👤 项目作者: lavabyte
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 19:57:01
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: telnet-CVE-2026-24061
👤 项目作者: lavabyte
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 19:57:01
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
lavabyte/telnet-CVE-2026-24061
Contribute to lavabyte/telnet-CVE-2026-24061 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #WAF
📦 项目名称: Excalibur
👤 项目作者: Teycir
🛠 开发语言: Python
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 20:01:06
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #WAF
📦 项目名称: Excalibur
👤 项目作者: Teycir
🛠 开发语言: Python
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 20:01:06
📝 项目描述:
Dual-component security testing tool for bypassing WAFs, CAPTCHAs, and anti-bot protections. Chrome extension records HTTP traffic during manual browser interaction. Burp Suite extension imports HAR files and extracted cookies for automated bug bounty and penetration testing workflows.🔗 点击访问项目地址
GitHub
GitHub - Teycir/Excalibur: Dual-component security testing tool for bypassing WAFs, CAPTCHAs, and anti-bot protections. Chrome…
Dual-component security testing tool for bypassing WAFs, CAPTCHAs, and anti-bot protections. Chrome extension records HTTP traffic during manual browser interaction. Burp Suite extension imports HA...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: inetutils-telnetd-cve-2026-24061
👤 项目作者: canpilayda
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 20:59:41
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: inetutils-telnetd-cve-2026-24061
👤 项目作者: canpilayda
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 20:59:41
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
canpilayda/inetutils-telnetd-cve-2026-24061
Contribute to canpilayda/inetutils-telnetd-cve-2026-24061 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RedTeam #Tools
📦 项目名称: MedusaC2
👤 项目作者: ikladontknowy
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:00:40
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RedTeam #Tools
📦 项目名称: MedusaC2
👤 项目作者: ikladontknowy
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:00:40
📝 项目描述:
🐍 Empower cybersecurity education with MedusaC2, a powerful command and control framework for authorized penetration testing.🔗 点击访问项目地址
GitHub
GitHub - ikladontknowy/MedusaC2: 🐍 Empower cybersecurity education with MedusaC2, a powerful command and control framework for…
🐍 Empower cybersecurity education with MedusaC2, a powerful command and control framework for authorized penetration testing. - ikladontknowy/MedusaC2
🚨 GitHub 监控消息提醒
🚨 发现关键词: #BlueTeam #Monitor #Response
📦 项目名称: KQL-Queries-Defender-Sentinel
👤 项目作者: Juanjo9471
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:00:07
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #BlueTeam #Monitor #Response
📦 项目名称: KQL-Queries-Defender-Sentinel
👤 项目作者: Juanjo9471
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:00:07
📝 项目描述:
🔍 Discover KQL queries designed for Microsoft Sentinel and Defender XDR to enhance your security monitoring and incident response capabilities.🔗 点击访问项目地址
GitHub
GitHub - Juanjo9471/KQL-Queries-Defender-Sentinel: 🔍 Discover KQL queries designed for Microsoft Sentinel and Defender XDR to enhance…
🔍 Discover KQL queries designed for Microsoft Sentinel and Defender XDR to enhance your security monitoring and incident response capabilities. - Juanjo9471/KQL-Queries-Defender-Sentinel
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: Esco-Crypter-Bypass-Defender-Native-Net-Fud-Memory-Loading
👤 项目作者: NYjacks
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:00:35
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: Esco-Crypter-Bypass-Defender-Native-Net-Fud-Memory-Loading
👤 项目作者: NYjacks
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:00:35
📝 项目描述:
Obfuscators and crypters protect payloads by making them undetectable. FUD-based tools ensure antivirus evasion, while RAT features provide remote access capabilities for Windows systems.🔗 点击访问项目地址
GitHub
GitHub - NYjacks/Esco-Crypter-Bypass-Defender-Native-Net-Fud-Memory-Loading: Obfuscators and crypters protect payloads by making…
Obfuscators and crypters protect payloads by making them undetectable. FUD-based tools ensure antivirus evasion, while RAT features provide remote access capabilities for Windows systems. - NYjacks...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: YetAnotherRequestBin
👤 项目作者: kolya5544
🛠 开发语言: C#
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 20:56:45
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: YetAnotherRequestBin
👤 项目作者: kolya5544
🛠 开发语言: C#
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 20:56:45
📝 项目描述:
Lightweight HTTP request capture & inspection service🔗 点击访问项目地址
GitHub
GitHub - kolya5544/YetAnotherRequestBin: Lightweight HTTP request capture & inspection service
Lightweight HTTP request capture & inspection service - kolya5544/YetAnotherRequestBin
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Extension
📦 项目名称: commentcrusader-burp
👤 项目作者: Feros0
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:03:20
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Extension
📦 项目名称: commentcrusader-burp
👤 项目作者: Feros0
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:03:20
📝 项目描述:
🛡️ Detect and catalog developer comments and potential secrets in HTTP responses with Comment Crusader for Burp Suite, enhancing your security assessments.🔗 点击访问项目地址
GitHub
GitHub - Feros0/commentcrusader-burp: 🛡️ Detect and catalog developer comments and potential secrets in HTTP responses with Comment…
🛡️ Detect and catalog developer comments and potential secrets in HTTP responses with Comment Crusader for Burp Suite, enhancing your security assessments. - Feros0/commentcrusader-burp
🚨 GitHub 监控消息提醒
🚨 发现关键词: #ATT #CK
📦 项目名称: AttendX
👤 项目作者: JyotirmoyDas05
🛠 开发语言: Kotlin
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:05:27
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #ATT #CK
📦 项目名称: AttendX
👤 项目作者: JyotirmoyDas05
🛠 开发语言: Kotlin
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:05:27
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - JyotirmoyDas05/AttendX
Contribute to JyotirmoyDas05/AttendX development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #BlueTeam #Monitor
📦 项目名称: Threat-Surface
👤 项目作者: MSSolanki
🛠 开发语言: None
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:00:37
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #BlueTeam #Monitor
📦 项目名称: Threat-Surface
👤 项目作者: MSSolanki
🛠 开发语言: None
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:00:37
📝 项目描述:
🛡️ Track exposed servers, open ports, and threat actor infrastructure to improve your security posture and stay one step ahead of potential threats.🔗 点击访问项目地址
GitHub
GitHub - MSSolanki/Threat-Surface: 🛡️ Track exposed servers, open ports, and threat actor infrastructure to improve your security…
🛡️ Track exposed servers, open ports, and threat actor infrastructure to improve your security posture and stay one step ahead of potential threats. - MSSolanki/Threat-Surface
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: Cloudflare-Bybass-CDP-Chromium
👤 项目作者: WillyMS21
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:00:45
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: Cloudflare-Bybass-CDP-Chromium
👤 项目作者: WillyMS21
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:00:45
📝 项目描述:
🌐 Bypass Cloudflare Turnstile and advanced fingerprinting with this custom Chromium solution and CDP-based automation script for seamless verification.🔗 点击访问项目地址
GitHub
GitHub - WillyMS21/Cloudflare-Bybass-CDP-Chromium: 🌐 Bypass Cloudflare Turnstile and advanced fingerprinting with this custom Chromium…
🌐 Bypass Cloudflare Turnstile and advanced fingerprinting with this custom Chromium solution and CDP-based automation script for seamless verification. - WillyMS21/Cloudflare-Bybass-CDP-Chromium
🚨 GitHub 监控消息提醒
🚨 发现关键词: #ATT #CK
📦 项目名称: rossler-attractor-project
👤 项目作者: yuva1231
🛠 开发语言: TeX
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:05:09
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #ATT #CK
📦 项目名称: rossler-attractor-project
👤 项目作者: yuva1231
🛠 开发语言: TeX
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:05:09
📝 项目描述:
Octave code that shows the building and visuals of a Rossler Attractor.🔗 点击访问项目地址
GitHub
GitHub - yuva1231/rossler-attractor-project: Octave code that shows the building and visuals of a Rossler Attractor.
Octave code that shows the building and visuals of a Rossler Attractor. - yuva1231/rossler-attractor-project
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-25546-godot-mcp-0.1.1-OS-Command-Injection
👤 项目作者: mbanyamer
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:49:30
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-25546-godot-mcp-0.1.1-OS-Command-Injection
👤 项目作者: mbanyamer
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:49:30
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - mbanyamer/CVE-2026-25546-godot-mcp-0.1.1-OS-Command-Injection
Contribute to mbanyamer/CVE-2026-25546-godot-mcp-0.1.1-OS-Command-Injection development by creating an account on GitHub.