🚨 GitHub 监控消息提醒
🚨 发现关键词: #Nuclei #Template
📦 项目名称: nuclei-templates
👤 项目作者: runZeroInc
🛠 开发语言: JavaScript
⭐ Star数量: 8 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 17:54:38
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Nuclei #Template
📦 项目名称: nuclei-templates
👤 项目作者: runZeroInc
🛠 开发语言: JavaScript
⭐ Star数量: 8 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 17:54:38
📝 项目描述:
This runZero fork of nuclei-templates includes small changes and metadata. Substantial changes from this repository are PRd back to the Project Discovery upstream. Issues and PRs are limited to runZero development; if you would like to file an issue or contribute, please use the Project Discovery repository instead.🔗 点击访问项目地址
GitHub
GitHub - runZeroInc/nuclei-templates: This runZero fork of nuclei-templates includes small changes and metadata. Substantial changes…
This runZero fork of nuclei-templates includes small changes and metadata. Substantial changes from this repository are PRd back to the Project Discovery upstream. Issues and PRs are limited to ru...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #渗透 #测试
📦 项目名称: Termux-X-wiki
👤 项目作者: xheishou-com
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 18:58:25
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #渗透 #测试
📦 项目名称: Termux-X-wiki
👤 项目作者: xheishou-com
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 18:58:25
📝 项目描述:
Termux-X 终端 - 移动端终极渗透测试平台使用知识库🔗 点击访问项目地址
GitHub
xheishou-com/Termux-X-wiki
Termux-X 终端 - 移动端终极渗透测试平台使用知识库. Contribute to xheishou-com/Termux-X-wiki development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: GhostVEH
👤 项目作者: Buvan7-glitch
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 19:00:29
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: GhostVEH
👤 项目作者: Buvan7-glitch
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 19:00:29
📝 项目描述:
👻 Manipulate ntdll's LdrpVectorHandlerList to register vectored exception handlers directly, bypassing traditional methods for enhanced control.🔗 点击访问项目地址
GitHub
GitHub - Buvan7-glitch/GhostVEH: 👻 Manipulate ntdll's LdrpVectorHandlerList to register vectored exception handlers directly, bypassing…
👻 Manipulate ntdll's LdrpVectorHandlerList to register vectored exception handlers directly, bypassing traditional methods for enhanced control. - Buvan7-glitch/GhostVEH
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: lab-threadhub
👤 项目作者: Mgsy
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 18:59:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: lab-threadhub
👤 项目作者: Mgsy
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 18:59:58
📝 项目描述:
A hands-on security lab demonstrating secondary-context path traversal and DNS rebinding leading to SSRF🔗 点击访问项目地址
GitHub
GitHub - Mgsy/lab-threadhub: A hands-on security lab demonstrating secondary-context path traversal and DNS rebinding leading to…
A hands-on security lab demonstrating secondary-context path traversal and DNS rebinding leading to SSRF - Mgsy/lab-threadhub
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Nuclei #Template
📦 项目名称: nestsecure
👤 项目作者: ramjavii
🛠 开发语言: JavaScript
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 19:01:59
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Nuclei #Template
📦 项目名称: nestsecure
👤 项目作者: ramjavii
🛠 开发语言: JavaScript
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 19:01:59
📝 项目描述:
Sistema de escaneo de vulnerabilidades on-premise con múltiples engines (Nmap, OpenVAS, ZAP, Nuclei)🔗 点击访问项目地址
GitHub
GitHub - ramjavii/nestsecure: Sistema de escaneo de vulnerabilidades on-premise con múltiples engines (Nmap, OpenVAS, ZAP, Nuclei)
Sistema de escaneo de vulnerabilidades on-premise con múltiples engines (Nmap, OpenVAS, ZAP, Nuclei) - ramjavii/nestsecure
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: telnet-CVE-2026-24061
👤 项目作者: lavabyte
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 19:57:01
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: telnet-CVE-2026-24061
👤 项目作者: lavabyte
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 19:57:01
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
lavabyte/telnet-CVE-2026-24061
Contribute to lavabyte/telnet-CVE-2026-24061 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #WAF
📦 项目名称: Excalibur
👤 项目作者: Teycir
🛠 开发语言: Python
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 20:01:06
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #WAF
📦 项目名称: Excalibur
👤 项目作者: Teycir
🛠 开发语言: Python
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 20:01:06
📝 项目描述:
Dual-component security testing tool for bypassing WAFs, CAPTCHAs, and anti-bot protections. Chrome extension records HTTP traffic during manual browser interaction. Burp Suite extension imports HAR files and extracted cookies for automated bug bounty and penetration testing workflows.🔗 点击访问项目地址
GitHub
GitHub - Teycir/Excalibur: Dual-component security testing tool for bypassing WAFs, CAPTCHAs, and anti-bot protections. Chrome…
Dual-component security testing tool for bypassing WAFs, CAPTCHAs, and anti-bot protections. Chrome extension records HTTP traffic during manual browser interaction. Burp Suite extension imports HA...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: inetutils-telnetd-cve-2026-24061
👤 项目作者: canpilayda
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 20:59:41
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: inetutils-telnetd-cve-2026-24061
👤 项目作者: canpilayda
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 20:59:41
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
canpilayda/inetutils-telnetd-cve-2026-24061
Contribute to canpilayda/inetutils-telnetd-cve-2026-24061 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RedTeam #Tools
📦 项目名称: MedusaC2
👤 项目作者: ikladontknowy
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:00:40
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RedTeam #Tools
📦 项目名称: MedusaC2
👤 项目作者: ikladontknowy
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:00:40
📝 项目描述:
🐍 Empower cybersecurity education with MedusaC2, a powerful command and control framework for authorized penetration testing.🔗 点击访问项目地址
GitHub
GitHub - ikladontknowy/MedusaC2: 🐍 Empower cybersecurity education with MedusaC2, a powerful command and control framework for…
🐍 Empower cybersecurity education with MedusaC2, a powerful command and control framework for authorized penetration testing. - ikladontknowy/MedusaC2
🚨 GitHub 监控消息提醒
🚨 发现关键词: #BlueTeam #Monitor #Response
📦 项目名称: KQL-Queries-Defender-Sentinel
👤 项目作者: Juanjo9471
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:00:07
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #BlueTeam #Monitor #Response
📦 项目名称: KQL-Queries-Defender-Sentinel
👤 项目作者: Juanjo9471
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:00:07
📝 项目描述:
🔍 Discover KQL queries designed for Microsoft Sentinel and Defender XDR to enhance your security monitoring and incident response capabilities.🔗 点击访问项目地址
GitHub
GitHub - Juanjo9471/KQL-Queries-Defender-Sentinel: 🔍 Discover KQL queries designed for Microsoft Sentinel and Defender XDR to enhance…
🔍 Discover KQL queries designed for Microsoft Sentinel and Defender XDR to enhance your security monitoring and incident response capabilities. - Juanjo9471/KQL-Queries-Defender-Sentinel
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: Esco-Crypter-Bypass-Defender-Native-Net-Fud-Memory-Loading
👤 项目作者: NYjacks
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:00:35
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: Esco-Crypter-Bypass-Defender-Native-Net-Fud-Memory-Loading
👤 项目作者: NYjacks
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:00:35
📝 项目描述:
Obfuscators and crypters protect payloads by making them undetectable. FUD-based tools ensure antivirus evasion, while RAT features provide remote access capabilities for Windows systems.🔗 点击访问项目地址
GitHub
GitHub - NYjacks/Esco-Crypter-Bypass-Defender-Native-Net-Fud-Memory-Loading: Obfuscators and crypters protect payloads by making…
Obfuscators and crypters protect payloads by making them undetectable. FUD-based tools ensure antivirus evasion, while RAT features provide remote access capabilities for Windows systems. - NYjacks...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: YetAnotherRequestBin
👤 项目作者: kolya5544
🛠 开发语言: C#
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 20:56:45
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: YetAnotherRequestBin
👤 项目作者: kolya5544
🛠 开发语言: C#
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 20:56:45
📝 项目描述:
Lightweight HTTP request capture & inspection service🔗 点击访问项目地址
GitHub
GitHub - kolya5544/YetAnotherRequestBin: Lightweight HTTP request capture & inspection service
Lightweight HTTP request capture & inspection service - kolya5544/YetAnotherRequestBin
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Extension
📦 项目名称: commentcrusader-burp
👤 项目作者: Feros0
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:03:20
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Extension
📦 项目名称: commentcrusader-burp
👤 项目作者: Feros0
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:03:20
📝 项目描述:
🛡️ Detect and catalog developer comments and potential secrets in HTTP responses with Comment Crusader for Burp Suite, enhancing your security assessments.🔗 点击访问项目地址
GitHub
GitHub - Feros0/commentcrusader-burp: 🛡️ Detect and catalog developer comments and potential secrets in HTTP responses with Comment…
🛡️ Detect and catalog developer comments and potential secrets in HTTP responses with Comment Crusader for Burp Suite, enhancing your security assessments. - Feros0/commentcrusader-burp
🚨 GitHub 监控消息提醒
🚨 发现关键词: #ATT #CK
📦 项目名称: AttendX
👤 项目作者: JyotirmoyDas05
🛠 开发语言: Kotlin
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:05:27
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #ATT #CK
📦 项目名称: AttendX
👤 项目作者: JyotirmoyDas05
🛠 开发语言: Kotlin
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 21:05:27
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - JyotirmoyDas05/AttendX
Contribute to JyotirmoyDas05/AttendX development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #BlueTeam #Monitor
📦 项目名称: Threat-Surface
👤 项目作者: MSSolanki
🛠 开发语言: None
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:00:37
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #BlueTeam #Monitor
📦 项目名称: Threat-Surface
👤 项目作者: MSSolanki
🛠 开发语言: None
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:00:37
📝 项目描述:
🛡️ Track exposed servers, open ports, and threat actor infrastructure to improve your security posture and stay one step ahead of potential threats.🔗 点击访问项目地址
GitHub
GitHub - MSSolanki/Threat-Surface: 🛡️ Track exposed servers, open ports, and threat actor infrastructure to improve your security…
🛡️ Track exposed servers, open ports, and threat actor infrastructure to improve your security posture and stay one step ahead of potential threats. - MSSolanki/Threat-Surface
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: Cloudflare-Bybass-CDP-Chromium
👤 项目作者: WillyMS21
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:00:45
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: Cloudflare-Bybass-CDP-Chromium
👤 项目作者: WillyMS21
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:00:45
📝 项目描述:
🌐 Bypass Cloudflare Turnstile and advanced fingerprinting with this custom Chromium solution and CDP-based automation script for seamless verification.🔗 点击访问项目地址
GitHub
GitHub - WillyMS21/Cloudflare-Bybass-CDP-Chromium: 🌐 Bypass Cloudflare Turnstile and advanced fingerprinting with this custom Chromium…
🌐 Bypass Cloudflare Turnstile and advanced fingerprinting with this custom Chromium solution and CDP-based automation script for seamless verification. - WillyMS21/Cloudflare-Bybass-CDP-Chromium
🚨 GitHub 监控消息提醒
🚨 发现关键词: #ATT #CK
📦 项目名称: rossler-attractor-project
👤 项目作者: yuva1231
🛠 开发语言: TeX
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:05:09
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #ATT #CK
📦 项目名称: rossler-attractor-project
👤 项目作者: yuva1231
🛠 开发语言: TeX
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:05:09
📝 项目描述:
Octave code that shows the building and visuals of a Rossler Attractor.🔗 点击访问项目地址
GitHub
GitHub - yuva1231/rossler-attractor-project: Octave code that shows the building and visuals of a Rossler Attractor.
Octave code that shows the building and visuals of a Rossler Attractor. - yuva1231/rossler-attractor-project
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-25546-godot-mcp-0.1.1-OS-Command-Injection
👤 项目作者: mbanyamer
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:49:30
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-25546-godot-mcp-0.1.1-OS-Command-Injection
👤 项目作者: mbanyamer
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 22:49:30
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - mbanyamer/CVE-2026-25546-godot-mcp-0.1.1-OS-Command-Injection
Contribute to mbanyamer/CVE-2026-25546-godot-mcp-0.1.1-OS-Command-Injection development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #POC #CVE
📦 项目名称: CVE-2026-25512-PoC-Group-Office-Authenticated-RCE
👤 项目作者: mbanyamer
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 23:00:09
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #POC #CVE
📦 项目名称: CVE-2026-25512-PoC-Group-Office-Authenticated-RCE
👤 项目作者: mbanyamer
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 23:00:09
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - mbanyamer/CVE-2026-25512-PoC-Group-Office-Authenticated-RCE
Contribute to mbanyamer/CVE-2026-25512-PoC-Group-Office-Authenticated-RCE development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RedTeam #Tools
📦 项目名称: awesome-hacker-engines
👤 项目作者: ptthanhloi
🛠 开发语言: Python
⭐ Star数量: 13 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 23:00:59
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RedTeam #Tools
📦 项目名称: awesome-hacker-engines
👤 项目作者: ptthanhloi
🛠 开发语言: Python
⭐ Star数量: 13 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 23:00:59
📝 项目描述:
🔍 Explore top hacker and OSINT search engines with this modern GUI toolkit designed for efficient information gathering and analysis.🔗 点击访问项目地址
GitHub
GitHub - ptthanhloi/awesome-hacker-engines: 🔍 Explore top hacker and OSINT search engines with this modern GUI toolkit designed…
🔍 Explore top hacker and OSINT search engines with this modern GUI toolkit designed for efficient information gathering and analysis. - ptthanhloi/awesome-hacker-engines