🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: RunShellcodeRust
👤 项目作者: RobertLarsen
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 12:01:40
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: RunShellcodeRust
👤 项目作者: RobertLarsen
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 12:01:40
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - RobertLarsen/RunShellcodeRust
Contribute to RobertLarsen/RunShellcodeRust development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #0day
📦 项目名称: elite-0day-researcher
👤 项目作者: eppser
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 12:50:42
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #0day
📦 项目名称: elite-0day-researcher
👤 项目作者: eppser
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 12:50:42
📝 项目描述:
Claude Code skill: Elite 0-day & exploit researcher. Systematic methodology for discovering genuine, novel vulnerabilities. Distilled from 88,636 real-world cases.🔗 点击访问项目地址
GitHub
GitHub - eppser/elite-0day-researcher: Claude Code skill: Elite 0-day & exploit researcher. Systematic methodology for discovering…
Claude Code skill: Elite 0-day & exploit researcher. Systematic methodology for discovering genuine, novel vulnerabilities. Distilled from 88,636 real-world cases. - eppser/elite-0day-researcher
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: External_Rust_Cheat_AI
👤 项目作者: aminrwnx
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 12:58:00
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: External_Rust_Cheat_AI
👤 项目作者: aminrwnx
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 12:58:00
📝 项目描述:
🛡️ Develop an external Rust cheat using AI-driven stealth kernel techniques to bypass EAC detection with advanced memory and execution hooks.🔗 点击访问项目地址
GitHub
GitHub - aminrwnx/External_Rust_Cheat_AI: 🛡️ Develop an external Rust cheat using AI-driven stealth kernel techniques to bypass…
🛡️ Develop an external Rust cheat using AI-driven stealth kernel techniques to bypass EAC detection with advanced memory and execution hooks. - aminrwnx/External_Rust_Cheat_AI
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: CSRF-attack
👤 项目作者: AlexandrOvcharenko
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 12:52:08
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: CSRF-attack
👤 项目作者: AlexandrOvcharenko
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 12:52:08
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - AlexandrOvcharenko/CSRF-attack
Contribute to AlexandrOvcharenko/CSRF-attack development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Framework #Server #Client #Control
📦 项目名称: German-school
👤 项目作者: loisegakii
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 13:02:02
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Framework #Server #Client #Control
📦 项目名称: German-school
👤 项目作者: loisegakii
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 13:02:02
📝 项目描述:
A modern web-based Learning Management System (LMS) for teaching German, built with React, Vite, and Tailwind CSS. This platform supports full A1–C2 levels, with video lessons, quizzes, exams, and interactive exercises designed for adults and professionals relocating to Germany.🔗 点击访问项目地址
GitHub
GitHub - loisegakii/German-school: A modern web-based Learning Management System (LMS) for teaching German, built with React, Vite…
A modern web-based Learning Management System (LMS) for teaching German, built with React, Vite, and Tailwind CSS. This platform supports full A1–C2 levels, with video lessons, quizzes, exams, and ...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #威胁情报
📦 项目名称: darkweb-monitor
👤 项目作者: fuguier001
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 12:54:42
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #威胁情报
📦 项目名称: darkweb-monitor
👤 项目作者: fuguier001
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 12:54:42
📝 项目描述:
暗网监控 MCP Server - 集成到 Claude Code 的威胁情报工具🔗 点击访问项目地址
GitHub
GitHub - fuguier001/darkweb-monitor: 暗网监控 MCP Server - 集成到 Claude Code 的威胁情报工具
暗网监控 MCP Server - 集成到 Claude Code 的威胁情报工具. Contribute to fuguier001/darkweb-monitor development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-1581-Analysis-Lab
👤 项目作者: rootdirective-sec
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 13:59:11
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-1581-Analysis-Lab
👤 项目作者: rootdirective-sec
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 13:59:11
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - rootdirective-sec/CVE-2026-1581-Analysis-Lab
Contribute to rootdirective-sec/CVE-2026-1581-Analysis-Lab development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #EXP #利用
📦 项目名称: explain_easily
👤 项目作者: Kriemseeley
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 13:59:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #EXP #利用
📦 项目名称: explain_easily
👤 项目作者: Kriemseeley
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 13:59:58
📝 项目描述:
explain the command you don't understand🔗 点击访问项目地址
GitHub
GitHub - Kriemseeley/explain_easily: explain the command you don't understand
explain the command you don't understand. Contribute to Kriemseeley/explain_easily development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader #Inject #Execute
📦 项目名称: ThreadlessOps
👤 项目作者: sanackermann
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 14:02:27
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader #Inject #Execute
📦 项目名称: ThreadlessOps
👤 项目作者: sanackermann
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 14:02:27
📝 项目描述:
Enhanced Shellcoding for Threadless Injections🔗 点击访问项目地址
GitHub
GitHub - sanackermann/ThreadlessOps: Enhanced Shellcoding for Threadless Injections
Enhanced Shellcoding for Threadless Injections. Contribute to sanackermann/ThreadlessOps development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: pdfDocumentGeneration
👤 项目作者: vendisra
🛠 开发语言: Apex
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 14:58:50
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: pdfDocumentGeneration
👤 项目作者: vendisra
🛠 开发语言: Apex
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 14:58:50
📝 项目描述:
📄 Generate secure, scalable PDF documents from Google Docs templates with JWT authentication and direct Salesforce upload to bypass limits.🔗 点击访问项目地址
GitHub
GitHub - vendisra/pdfDocumentGeneration: 📄 Generate secure, scalable PDF documents from Google Docs templates with JWT authentication…
📄 Generate secure, scalable PDF documents from Google Docs templates with JWT authentication and direct Salesforce upload to bypass limits. - vendisra/pdfDocumentGeneration
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-2472-Vertex-AI-SDK-Google-Cloud
👤 项目作者: JoshuaProvoste
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 15:56:06
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-2472-Vertex-AI-SDK-Google-Cloud
👤 项目作者: JoshuaProvoste
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 15:56:06
📝 项目描述:
Technical PoC for CVE-2026-2472 (GCP-2026-011): Unauthenticated and Stored Cross-Site Scripting (XSS) in google-cloud-aiplatform _genai/_evals_visualization (Vertex AI Python SDK) affecting Jupyter/Colab.🔗 点击访问项目地址
GitHub
GitHub - JoshuaProvoste/CVE-2026-2472-Vertex-AI-SDK-Google-Cloud: Technical PoC for CVE-2026-2472 (GCP-2026-011): Unauthenticated…
Technical PoC for CVE-2026-2472 (GCP-2026-011): Unauthenticated and Stored Cross-Site Scripting (XSS) in google-cloud-aiplatform _genai/_evals_visualization (Vertex AI Python SDK) affecting Jupyter...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: SSRF-Exploit-Lab
👤 项目作者: abhinandanpandey-in
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 15:16:56
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: SSRF-Exploit-Lab
👤 项目作者: abhinandanpandey-in
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 15:16:56
📝 项目描述:
Cloud security research lab demonstrating Server-Side Request Forgery (SSRF / CWE-918). Features a vulnerable Flask webhook that leaks simulated AWS metadata, alongside an enterprise remediation using DNS resolution and strict cryptographic IP blocklisting to prevent internal network traversal.🔗 点击访问项目地址
GitHub
GitHub - abhinandanpandey-in/SSRF-Exploit-Lab: Cloud security research lab demonstrating Server-Side Request Forgery (SSRF / CWE…
Cloud security research lab demonstrating Server-Side Request Forgery (SSRF / CWE-918). Features a vulnerable Flask webhook that leaks simulated AWS metadata, alongside an enterprise remediation us...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Plugin #Extension
📦 项目名称: Blackwire
👤 项目作者: Glitchboi-sudo
🛠 开发语言: JavaScript
⭐ Star数量: 1 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-27 17:00:49
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Plugin #Extension
📦 项目名称: Blackwire
👤 项目作者: Glitchboi-sudo
🛠 开发语言: JavaScript
⭐ Star数量: 1 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-27 17:00:49
📝 项目描述:
proxy interceptor HTTP/HTTPS de código abierto diseñado para pruebas de seguridad, análisis de tráfico web y debugging de aplicaciones. Ofrece una alternativa ligera, portable y extensible a herramientas como Burp Suite o OWASP ZAP🔗 点击访问项目地址
GitHub
GitHub - Glitchboi-sudo/Blackwire: proxy interceptor HTTP/HTTPS de código abierto diseñado para pruebas de seguridad, análisis…
proxy interceptor HTTP/HTTPS de código abierto diseñado para pruebas de seguridad, análisis de tráfico web y debugging de aplicaciones. Ofrece una alternativa ligera, portable y extensible a herram...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Credential Dumping
📦 项目名称: ShadowHunt
👤 项目作者: elonmasai7
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 16:10:21
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Credential Dumping
📦 项目名称: ShadowHunt
👤 项目作者: elonmasai7
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 16:10:21
📝 项目描述:
ShadowHunt is a lightweight, containerized framework for ethical red-team training. It simulates MITRE ATT&CK techniques like credential dumping and lateral movement in isolated Docker labs, detects them with Suricata, OSSEC, and ML anomalies, and visualizes results on a real-time Streamlit dashboard. 🔗 点击访问项目地址
GitHub
elonmasai7/ShadowHunt
ShadowHunt is a lightweight, containerized framework for ethical red-team training. It simulates MITRE ATT&CK techniques like credential dumping and lateral movement in isolated Docker labs...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: TaHa-Direct-Reverse-Tunnel-Runner
👤 项目作者: duck254
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 18:01:05
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: TaHa-Direct-Reverse-Tunnel-Runner
👤 项目作者: duck254
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 18:01:05
📝 项目描述:
🔧 Manage direct and reverse tunnels with multi-protocol support for bypassing restrictions and improving connection stability and security.🔗 点击访问项目地址
GitHub
GitHub - duck254/TaHa-Direct-Reverse-Tunnel-Runner: 🔧 Manage direct and reverse tunnels with multi-protocol support for bypassing…
🔧 Manage direct and reverse tunnels with multi-protocol support for bypassing restrictions and improving connection stability and security. - duck254/TaHa-Direct-Reverse-Tunnel-Runner
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: ElevateLabs_9
👤 项目作者: BusyDetective
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 17:49:26
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: ElevateLabs_9
👤 项目作者: BusyDetective
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 17:49:26
📝 项目描述:
A simple web-based vulnerability scanner built with Flask to detect SQLi, XSS, and CSRF in web apps.🔗 点击访问项目地址
GitHub
GitHub - BusyDetective/ElevateLabs_9: A simple web-based vulnerability scanner built with Flask to detect SQLi, XSS, and CSRF in…
A simple web-based vulnerability scanner built with Flask to detect SQLi, XSS, and CSRF in web apps. - BusyDetective/ElevateLabs_9
🚨 GitHub 监控消息提醒
🚨 发现关键词: #POC #CVE
📦 项目名称: CVE-2022-42475-POC
👤 项目作者: ArthurHendrich
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 19:00:03
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #POC #CVE
📦 项目名称: CVE-2022-42475-POC
👤 项目作者: ArthurHendrich
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 19:00:03
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
ArthurHendrich/CVE-2022-42475-POC
Contribute to ArthurHendrich/CVE-2022-42475-POC development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-28372-GNU-inetutils-telnetd-Privilege-Escalation
👤 项目作者: mbanyamer
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 19:57:08
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-28372-GNU-inetutils-telnetd-Privilege-Escalation
👤 项目作者: mbanyamer
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 19:57:08
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - mbanyamer/CVE-2026-28372-GNU-inetutils-telnetd-Privilege-Escalation
Contribute to mbanyamer/CVE-2026-28372-GNU-inetutils-telnetd-Privilege-Escalation development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: nullsec-luashield
👤 项目作者: bad-antics
🛠 开发语言: Lua
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 20:13:59
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: nullsec-luashield
👤 项目作者: bad-antics
🛠 开发语言: Lua
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 20:13:59
📝 项目描述:
WAF rules engine with metatable-based OOP for SQL/XSS/LFI/SSRF detection🔗 点击访问项目地址
GitHub
GitHub - bad-antics/nullsec-luashield: WAF rules engine with metatable-based OOP for SQL/XSS/LFI/SSRF detection
WAF rules engine with metatable-based OOP for SQL/XSS/LFI/SSRF detection - bad-antics/nullsec-luashield
🚨 GitHub 监控消息提醒
🚨 发现关键词: #0day
📦 项目名称: btrpa-scan
👤 项目作者: YoungAyub
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 22:27:59
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #0day
📦 项目名称: btrpa-scan
👤 项目作者: YoungAyub
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-27 22:27:59
📝 项目描述:
📡 Scan and resolve Bluetooth Low Energy devices using advanced RPA resolution and IRK support for precise tracking and identification.🔗 点击访问项目地址
GitHub
GitHub - YoungAyub/btrpa-scan: 📡 Scan and resolve Bluetooth Low Energy devices using advanced RPA resolution and IRK support for…
📡 Scan and resolve Bluetooth Low Energy devices using advanced RPA resolution and IRK support for precise tracking and identification. - YoungAyub/btrpa-scan