🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server #Client
📦 项目名称: PacketSniffer-AI
👤 项目作者: ayinedjimi
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 10:03:08
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server #Client
📦 项目名称: PacketSniffer-AI
👤 项目作者: ayinedjimi
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 10:03:08
📝 项目描述:
AI-Powered Network Packet Analyzer with ML Anomaly Detection - Scapy/scikit-learn, detects port scans, DNS tunneling, DDoS, C2 beaconing, data exfiltration. For authorized security monitoring only.🔗 点击访问项目地址
GitHub
GitHub - ayinedjimi/PacketSniffer-AI: AI-Powered Network Packet Analyzer with ML Anomaly Detection - Scapy/scikit-learn, detects…
AI-Powered Network Packet Analyzer with ML Anomaly Detection - Scapy/scikit-learn, detects port scans, DNS tunneling, DDoS, C2 beaconing, data exfiltration. For authorized security monitoring only....
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV #Patch
📦 项目名称: brave-scraper-mcp
👤 项目作者: VishnuSuresh2000
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 11:00:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV #Patch
📦 项目名称: brave-scraper-mcp
👤 项目作者: VishnuSuresh2000
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 11:00:58
📝 项目描述:
Stealth web scraping MCP server with Patchright + Xvfb for Brave Search with CAPTCHA bypass🔗 点击访问项目地址
GitHub
GitHub - VishnuSuresh2000/brave-scraper-mcp: Stealth web scraping MCP server with Patchright + Xvfb for Brave Search with CAPTCHA…
Stealth web scraping MCP server with Patchright + Xvfb for Brave Search with CAPTCHA bypass - VishnuSuresh2000/brave-scraper-mcp
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-2441-PoC
👤 项目作者: huseyinstif
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 11:53:46
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-2441-PoC
👤 项目作者: huseyinstif
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 11:53:46
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - huseyinstif/CVE-2026-2441-PoC
Contribute to huseyinstif/CVE-2026-2441-PoC development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV #Filter
📦 项目名称: waterfall
👤 项目作者: 0xffabc
🛠 开发语言: Rust
⭐ Star数量: 4 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-18 12:00:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV #Filter
📦 项目名称: waterfall
👤 项目作者: 0xffabc
🛠 开发语言: Rust
⭐ Star数量: 4 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-18 12:00:58
📝 项目描述:
DPI Bypass tool🔗 点击访问项目地址
GitHub
GitHub - 0xffabc/waterfall: DPI Bypass tool
DPI Bypass tool. Contribute to 0xffabc/waterfall development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Loader #Bypass
📦 项目名称: EphemeralML
👤 项目作者: cyntrisec
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:02:54
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Loader #Bypass
📦 项目名称: EphemeralML
👤 项目作者: cyntrisec
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:02:54
📝 项目描述:
Confidential AI inference with cryptographic proof of ephemeral execution. Loads models inside TEEs, returns embeddings + signed Attested Execution Receipts.🔗 点击访问项目地址
GitHub
GitHub - cyntrisec/EphemeralML: Confidential AI inference with cryptographic proof of ephemeral execution. Loads models inside…
Confidential AI inference with cryptographic proof of ephemeral execution. Loads models inside TEEs, returns embeddings + signed Attested Execution Receipts. - cyntrisec/EphemeralML
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-20700-An-analysis-WIP
👤 项目作者: sundenovak
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:40:34
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-20700-An-analysis-WIP
👤 项目作者: sundenovak
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:40:34
📝 项目描述:
[WORK IN PROGRESS] My analysis of CVE-2026-20700🔗 点击访问项目地址
GitHub
GitHub - sundenovak/CVE-2026-20700-An-analysis-WIP: [WORK IN PROGRESS] My analysis of CVE-2026-20700
[WORK IN PROGRESS] My analysis of CVE-2026-20700. Contribute to sundenovak/CVE-2026-20700-An-analysis-WIP development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject #Execute
📦 项目名称: Code-Analysis-What-Really-Indicates-an-Attack-
👤 项目作者: zerodayhunter543
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:54:18
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject #Execute
📦 项目名称: Code-Analysis-What-Really-Indicates-an-Attack-
👤 项目作者: zerodayhunter543
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:54:18
📝 项目描述:
Beginner analysts often fall into the trap of looking for "suspicious" variable names. They see bStr, payload, shellcode in code and immediately think "attack!"🔗 点击访问项目地址
GitHub
GitHub - zerodayhunter543/Code-Analysis-What-Really-Indicates-an-Attack-: Beginner analysts often fall into the trap of looking…
Beginner analysts often fall into the trap of looking for "suspicious" variable names. They see bStr, payload, shellcode in code and immediately think "attack!" ...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server
📦 项目名称: C2_ServerV2
👤 项目作者: Peter211231231231232131
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 13:02:03
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server
📦 项目名称: C2_ServerV2
👤 项目作者: Peter211231231231232131
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 13:02:03
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - Peter211231231231232131/C2_ServerV2
Contribute to Peter211231231231232131/C2_ServerV2 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-20817
👤 项目作者: oxfemale
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 13:56:30
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-20817
👤 项目作者: oxfemale
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 13:56:30
📝 项目描述:
Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit demonstrating local privilege escalation via WER service. 🔗 点击访问项目地址
GitHub
GitHub - oxfemale/CVE-2026-20817: Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit…
Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit demonstrating local privilege escalation via WER service. - GitHub - oxfemale/CVE-2026-20817: Window...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: SetWindowDisplayAffinity-Bypass
👤 项目作者: Baragoda
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 2
📅 更新时间: 2026-02-18 15:01:24
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: SetWindowDisplayAffinity-Bypass
👤 项目作者: Baragoda
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 2
📅 更新时间: 2026-02-18 15:01:24
📝 项目描述:
📸 Bypass Window Capture Protection on Windows using a non-invasive method without DLL injection or API hooking for educational purposes.🔗 点击访问项目地址
GitHub
GitHub - Baragoda/SetWindowDisplayAffinity-Bypass: 📸 Bypass Window Capture Protection on Windows using a non-invasive method without…
📸 Bypass Window Capture Protection on Windows using a non-invasive method without DLL injection or API hooking for educational purposes. - Baragoda/SetWindowDisplayAffinity-Bypass
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: csrf-middleware
👤 项目作者: linkedcode
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 14:55:53
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: csrf-middleware
👤 项目作者: linkedcode
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 14:55:53
📝 项目描述:
CsrfMiddleware compatible con SessionMiddleware de Odan🔗 点击访问项目地址
GitHub
GitHub - linkedcode/csrf-middleware: CsrfMiddleware compatible con SessionMiddleware de Odan
CsrfMiddleware compatible con SessionMiddleware de Odan - linkedcode/csrf-middleware
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-0915-json-Patch.-V2.0
👤 项目作者: cyberwulfy200-dev
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 15:53:38
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-0915-json-Patch.-V2.0
👤 项目作者: cyberwulfy200-dev
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 15:53:38
📝 项目描述:
Patch the Bug - glibc 🔗 点击访问项目地址
GitHub
GitHub - cyberwulfy200-dev/CVE-2026-0915-json-Patch.-V2.0: Patch the Bug - glibc
Patch the Bug - glibc . Contribute to cyberwulfy200-dev/CVE-2026-0915-json-Patch.-V2.0 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Framework #Server #Command #Control
📦 项目名称: ShadowlLine
👤 项目作者: MrEx-Right
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 15:57:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Framework #Server #Command #Control
📦 项目名称: ShadowlLine
👤 项目作者: MrEx-Right
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 15:57:58
📝 项目描述:
ShadowLine: A lightweight post-exploitation tool and C2 infrastructure designed for stealth, persistence, and modern evasion techniques.🔗 点击访问项目地址
GitHub
GitHub - MrEx-Right/ShadowlLine: ShadowLine: A lightweight post-exploitation tool and C2 infrastructure designed for stealth, persistence…
ShadowLine: A lightweight post-exploitation tool and C2 infrastructure designed for stealth, persistence, and modern evasion techniques. - MrEx-Right/ShadowlLine
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Extension
📦 项目名称: OpenBurp
👤 项目作者: luispacheco22
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 15:52:17
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Extension
📦 项目名称: OpenBurp
👤 项目作者: luispacheco22
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 15:52:17
📝 项目描述:
A Simple integration of Claude code + Burpsuite Pro🔗 点击访问项目地址
GitHub
GitHub - luispacheco22/OpenBurp: A Simple integration of Claude code + Burpsuite Pro
A Simple integration of Claude code + Burpsuite Pro - luispacheco22/OpenBurp
🚨 GitHub 监控消息提醒
🚨 发现关键词: #EXP #Exploit
📦 项目名称: modern-exploit-development
👤 项目作者: SamHacker2
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 17:00:13
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #EXP #Exploit
📦 项目名称: modern-exploit-development
👤 项目作者: SamHacker2
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 17:00:13
📝 项目描述:
Structured binary exploitation & reverse engineering notes (GDB, Radare2, Ghidra, Cutter) covering BOF, ret2win, ROP & exploit development mindset — written in Hinglish.🔗 点击访问项目地址
GitHub
GitHub - SamHacker2/modern-exploit-development: Structured binary exploitation & reverse engineering notes (GDB, Radare2, Ghidra…
Structured binary exploitation & reverse engineering notes (GDB, Radare2, Ghidra, Cutter) covering BOF, ret2win, ROP & exploit development mindset — written in Hinglish. - SamHacker...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #注入 #SQL
📦 项目名称: sqlmap-gui
👤 项目作者: Gentle-bae
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 17:21:45
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #注入 #SQL
📦 项目名称: sqlmap-gui
👤 项目作者: Gentle-bae
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 17:21:45
📝 项目描述:
SQLMap GUI V1.0 - 图形化SQL注入扫描工具🔗 点击访问项目地址
GitHub
GitHub - Gentle-bae/sqlmap-gui: SQLMap GUI V1.0 - 图形化SQL注入扫描工具
SQLMap GUI V1.0 - 图形化SQL注入扫描工具. Contribute to Gentle-bae/sqlmap-gui development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CobaltStrike #Profile
📦 项目名称: teamserver-packer
👤 项目作者: cisagov
🛠 开发语言: HCL
⭐ Star数量: 12 | 🍴 Fork数量: 5
📅 更新时间: 2026-02-18 17:51:47
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CobaltStrike #Profile
📦 项目名称: teamserver-packer
👤 项目作者: cisagov
🛠 开发语言: HCL
⭐ Star数量: 12 | 🍴 Fork数量: 5
📅 更新时间: 2026-02-18 17:51:47
📝 项目描述:
Create an AMI with CobaltStrike and related tools.🔗 点击访问项目地址
GitHub
GitHub - cisagov/teamserver-packer: Create an AMI with CobaltStrike and related tools.
Create an AMI with CobaltStrike and related tools. - cisagov/teamserver-packer
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Extension
📦 项目名称: burp-js-linkfinder-enhanced
👤 项目作者: panchocosil
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 18:01:09
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Extension
📦 项目名称: burp-js-linkfinder-enhanced
👤 项目作者: panchocosil
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 18:01:09
📝 项目描述:
Enhanced Burp Suite extension for finding links and sensitive data in JavaScript files🔗 点击访问项目地址
GitHub
GitHub - panchocosil/burp-js-linkfinder-enhanced: Enhanced Burp Suite extension for finding links and sensitive data in JavaScript…
Enhanced Burp Suite extension for finding links and sensitive data in JavaScript files - panchocosil/burp-js-linkfinder-enhanced
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: Foxbot-AI-Aimbot
👤 项目作者: Foxtrott7
🛠 开发语言: Python
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 19:01:03
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: Foxbot-AI-Aimbot
👤 项目作者: Foxtrott7
🛠 开发语言: Python
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 19:01:03
📝 项目描述:
Experimental YOLOv5 AI Aimbot using an Arduino Leonardo as a hardware HID bridge. Demonstrates how to bypass software-based input restrictions for educational purposes.🔗 点击访问项目地址
GitHub
GitHub - Foxtrott7/Foxbot-AI-Aimbot: Experimental YOLOv5 AI Aimbot using an Arduino Leonardo as a hardware HID bridge. Demonstrates…
Experimental YOLOv5 AI Aimbot using an Arduino Leonardo as a hardware HID bridge. Demonstrates how to bypass software-based input restrictions for educational purposes. - Foxtrott7/Foxbot-AI-Aimbot
🚨 GitHub 监控消息提醒
🚨 发现关键词: #反序列化 #Python
📦 项目名称: Phi-Save-Codec
👤 项目作者: PhigrosLabs
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 18:44:43
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #反序列化 #Python
📦 项目名称: Phi-Save-Codec
👤 项目作者: PhigrosLabs
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 18:44:43
📝 项目描述:
Phigros 存档序列化/反序列化🔗 点击访问项目地址
GitHub
GitHub - PhigrosLabs/Phi-Save-Codec: Phigros 存档序列化/反序列化
Phigros 存档序列化/反序列化. Contribute to PhigrosLabs/Phi-Save-Codec development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Attack
📦 项目名称: Web-Security-Project-Demo
👤 项目作者: wolfibleah
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 18:49:33
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Attack
📦 项目名称: Web-Security-Project-Demo
👤 项目作者: wolfibleah
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 18:49:33
📝 项目描述:
Full-stack web application demonstrating authentication, web vulnerabilities (XSS, SQLi), attack simulations, logging analysis, SSO with OpenID Connect, and HTTPS configuration.🔗 点击访问项目地址
GitHub
GitHub - wolfibleah/Web-Security-Project-Demo: Full-stack web application demonstrating authentication, web vulnerabilities (XSS…
Full-stack web application demonstrating authentication, web vulnerabilities (XSS, SQLi), attack simulations, logging analysis, SSO with OpenID Connect, and HTTPS configuration. - wolfibleah/Web-Se...