🚨 GitHub 监控消息提醒
🚨 发现关键词: #Sigma #rules #SIEM
📦 项目名称: Active-Directory-Pentest-Detection-Pack
👤 项目作者: 404SecNotFound
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 16:47:15
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Sigma #rules #SIEM
📦 项目名称: Active-Directory-Pentest-Detection-Pack
👤 项目作者: 404SecNotFound
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 16:47:15
📝 项目描述:
106 team-reviewed Sigma rules detecting the full Active Directory attack chain: recon, coercion, credential access, lateral movement, persistence and trust abuse. Mapped to MITRE ATT&CK and validated against the SigmaHQ schema.🔗 点击访问项目地址
GitHub
GitHub - 404SecNotFound/Active-Directory-Pentest-Detection-Pack: 106 team-reviewed Sigma rules detecting the full Active Directory…
106 team-reviewed Sigma rules detecting the full Active Directory attack chain: recon, coercion, credential access, lateral movement, persistence and trust abuse. Mapped to MITRE ATT&CK and...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Sigma #rules
📦 项目名称: haul-rules-sigma
👤 项目作者: dragnet-dev
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 16:40:05
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Sigma #rules
📦 项目名称: haul-rules-sigma
👤 项目作者: dragnet-dev
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 16:40:05
📝 项目描述:
Dragnet detection rules — sigma format🔗 点击访问项目地址
GitHub
GitHub - dragnet-dev/haul-rules-sigma: Dragnet detection rules — sigma format
Dragnet detection rules — sigma format. Contribute to dragnet-dev/haul-rules-sigma development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #GitLab #RCE
📦 项目名称: ansible-security-scanner
👤 项目作者: cpeoples
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 16:57:44
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #GitLab #RCE
📦 项目名称: ansible-security-scanner
👤 项目作者: cpeoples
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 16:57:44
📝 项目描述:
🛡️ Static security scanner for Ansible playbooks. 1,090+ rules across 30+ categories covering malicious code, supply-chain risk, IaC misconfiguration, secrets, RCE, and lateral movement. Outputs SARIF, GitLab SAST, and SBOM. CI-native with autofix support.🔗 点击访问项目地址
GitHub
GitHub - cpeoples/ansible-security-scanner: 🛡️ Static security scanner for Ansible playbooks. 1,090+ rules across 30+ categories…
🛡️ Static security scanner for Ansible playbooks. 1,090+ rules across 30+ categories covering malicious code, supply-chain risk, IaC misconfiguration, secrets, RCE, and lateral movement. Outputs SA...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Exploit #POC
📦 项目名称: BlackSecurity
👤 项目作者: jakeloai
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 16:51:41
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Exploit #POC
📦 项目名称: BlackSecurity
👤 项目作者: jakeloai
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 16:51:41
📝 项目描述:
A modular suite for large-scale threat hunting, stealth recon, and exploit discovery.🔗 点击访问项目地址
GitHub
GitHub - jakeloai/BlackSecurity: A modular suite for large-scale threat hunting, stealth recon, and exploit discovery.
A modular suite for large-scale threat hunting, stealth recon, and exploit discovery. - jakeloai/BlackSecurity
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Exploit #CVE
📦 项目名称: CVE_Map_hehe
👤 项目作者: yadavnikhil17102004
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 16:49:11
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Exploit #CVE
📦 项目名称: CVE_Map_hehe
👤 项目作者: yadavnikhil17102004
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 16:49:11
📝 项目描述:
Native Go engine for automated aggregation, sanitization, and JSON-exporting of global CVE exploit Proof-of-Concepts. Continuously mirrored from the wild🔗 点击访问项目地址
GitHub
GitHub - yadavnikhil17102004/CVE_Map_hehe: Native Go engine for automated aggregation, sanitization, and JSON-exporting of global…
Native Go engine for automated aggregation, sanitization, and JSON-exporting of global CVE exploit Proof-of-Concepts. Continuously mirrored from the wild - yadavnikhil17102004/CVE_Map_hehe
🚨 GitHub 监控消息提醒
🚨 发现关键词: #YARA #rule
📦 项目名称: Automated-YARA-Rule-Generation-Tool
👤 项目作者: vanity1412
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 17:01:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #YARA #rule
📦 项目名称: Automated-YARA-Rule-Generation-Tool
👤 项目作者: vanity1412
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 17:01:58
📝 项目描述:
xây dựng công cụ tự động tạo chữ ký yara từ các đặc trừng chung 1 họ mã độc🔗 点击访问项目地址
GitHub
GitHub - vanity1412/Automated-YARA-Rule-Generation-Tool: xây dựng công cụ tự động tạo chữ ký yara từ các đặc trừng chung 1 họ mã…
xây dựng công cụ tự động tạo chữ ký yara từ các đặc trừng chung 1 họ mã độc - vanity1412/Automated-YARA-Rule-Generation-Tool
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Nuclei #POC
📦 项目名称: NucleiPocGather
👤 项目作者: lianqingsec
🛠 开发语言: Python
⭐ Star数量: 52 | 🍴 Fork数量: 12
📅 更新时间: 2026-05-20 16:47:12
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Nuclei #POC
📦 项目名称: NucleiPocGather
👤 项目作者: lianqingsec
🛠 开发语言: Python
⭐ Star数量: 52 | 🍴 Fork数量: 12
📅 更新时间: 2026-05-20 16:47:12
📝 项目描述:
每日自动收集全网可用 Nuclei POC 🔗 点击访问项目地址
GitHub
GitHub - lianqingsec/NucleiPocGather: 每日自动收集全网可用 Nuclei POC
每日自动收集全网可用 Nuclei POC . Contribute to lianqingsec/NucleiPocGather development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Nuclei #templates #CVE
📦 项目名称: cve-arsenal
👤 项目作者: PrettyFox0
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 16:40:56
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Nuclei #templates #CVE
📦 项目名称: cve-arsenal
👤 项目作者: PrettyFox0
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 16:40:56
📝 项目描述:
Automated CVE exploit scanners and Nuclei templates. Updated every 6h.🔗 点击访问项目地址
GitHub
GitHub - PrettyFox0/cve-arsenal: Automated CVE exploit scanners and Nuclei templates. Updated every 6h.
Automated CVE exploit scanners and Nuclei templates. Updated every 6h. - PrettyFox0/cve-arsenal
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #WAF
📦 项目名称: Stealth-Scraper
👤 项目作者: Rusheesonu
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 17:02:28
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #WAF
📦 项目名称: Stealth-Scraper
👤 项目作者: Rusheesonu
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 17:02:28
📝 项目描述:
Visual no-code web scraper for AI agents. Point, click, extract — or describe in plain English. Anti-bot bypass, clean JSON, REST + Python/TS SDKs + MCP.🔗 点击访问项目地址
GitHub
GitHub - Rusheesonu/Stealth-Scraper: Visual no-code web scraper for AI agents. Point, click, extract — or describe in plain English.…
Visual no-code web scraper for AI agents. Point, click, extract — or describe in plain English. Anti-bot bypass, clean JSON, REST + Python/TS SDKs + MCP. - Rusheesonu/Stealth-Scraper
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #CVE
📦 项目名称: CVE-2024-4367-PDF.js-xss
👤 项目作者: xiaoqiesec0x1
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 16:28:06
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #CVE
📦 项目名称: CVE-2024-4367-PDF.js-xss
👤 项目作者: xiaoqiesec0x1
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 16:28:06
📝 项目描述:
CVE-2024-4367–PDF.js-xss🔗 点击访问项目地址
GitHub
GitHub - xiaoqiesec0x1/CVE-2024-4367-PDF.js-xss: CVE-2024-4367–PDF.js-xss
CVE-2024-4367–PDF.js-xss. Contribute to xiaoqiesec0x1/CVE-2024-4367-PDF.js-xss development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Nuclei #CVE
📦 项目名称: attack-surface-ml
👤 项目作者: daniyal-hussain01
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 1
📅 更新时间: 2026-05-20 16:38:33
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Nuclei #CVE
📦 项目名称: attack-surface-ml
👤 项目作者: daniyal-hussain01
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 1
📅 更新时间: 2026-05-20 16:38:33
📝 项目描述:
ML-driven CVE risk prioritization with end-to-end MLSecOps pipeline 🔗 点击访问项目地址
GitHub
GitHub - daniyal-hussain01/attack-surface-ml: ML-driven CVE risk prioritization with end-to-end MLSecOps pipeline
ML-driven CVE risk prioritization with end-to-end MLSecOps pipeline - daniyal-hussain01/attack-surface-ml
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026 #POC
📦 项目名称: autogpt-CVE-2026-30950-poc
👤 项目作者: ZeroPathAI
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 18:55:59
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026 #POC
📦 项目名称: autogpt-CVE-2026-30950-poc
👤 项目作者: ZeroPathAI
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 18:55:59
📝 项目描述:
POC for CVE-2026-30950 which allows session hijacking in AutoGpt🔗 点击访问项目地址
GitHub
ZeroPathAI/autogpt-CVE-2026-30950-poc
POC for CVE-2026-30950 which allows session hijacking in AutoGpt - ZeroPathAI/autogpt-CVE-2026-30950-poc
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Extension
📦 项目名称: burp-api-scanner
👤 项目作者: liam-portswigger
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 18:29:15
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Extension
📦 项目名称: burp-api-scanner
👤 项目作者: liam-portswigger
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 18:29:15
📝 项目描述:
Burp Suite extension for advanced API security scanning (cleanup fork)🔗 点击访问项目地址
GitHub
GitHub - liam-portswigger/burp-api-scanner: Burp Suite extension for advanced API security scanning (cleanup fork)
Burp Suite extension for advanced API security scanning (cleanup fork) - liam-portswigger/burp-api-scanner
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Exploit #CVE #POC
📦 项目名称: PoC-in-GitHub
👤 项目作者: nomi-sec
🛠 开发语言: Unknown
⭐ Star数量: 7759 | 🍴 Fork数量: 1321
📅 更新时间: 2026-05-20 18:55:03
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Exploit #CVE #POC
📦 项目名称: PoC-in-GitHub
👤 项目作者: nomi-sec
🛠 开发语言: Unknown
⭐ Star数量: 7759 | 🍴 Fork数量: 1321
📅 更新时间: 2026-05-20 18:55:03
📝 项目描述:
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.🔗 点击访问项目地址
GitHub
GitHub - nomi-sec/PoC-in-GitHub: 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware. - nomi-sec/PoC-in-GitHub
🚨 GitHub 监控消息提醒
🚨 发现关键词: #供应链攻击 #投毒 #NPM
📦 项目名称: xdr-sop-skill
👤 项目作者: seccmd
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-05 14:21:26
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #供应链攻击 #投毒 #NPM
📦 项目名称: xdr-sop-skill
👤 项目作者: seccmd
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-05 14:21:26
📝 项目描述:
XDR-SOP-SKILL:供应链投毒攻击,首个AI标准化应急处置技能🔗 点击访问项目地址
GitHub
GitHub - seccmd/xdr-sop-skill: XDR-SOP-SKILL:供应链投毒攻击,首个AI标准化应急处置技能
XDR-SOP-SKILL:供应链投毒攻击,首个AI标准化应急处置技能. Contribute to seccmd/xdr-sop-skill development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #供应链攻击 #投毒 #NPM
📦 项目名称: apifox_security_check
👤 项目作者: daxiong888
🛠 开发语言: PowerShell
⭐ Star数量: 6 | 🍴 Fork数量: 1
📅 更新时间: 2026-03-28 16:27:21
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #供应链攻击 #投毒 #NPM
📦 项目名称: apifox_security_check
👤 项目作者: daxiong888
🛠 开发语言: PowerShell
⭐ Star数量: 6 | 🍴 Fork数量: 1
📅 更新时间: 2026-03-28 16:27:21
📝 项目描述:
Apifox 供应链攻击排查工具, 检测已知远程代码执行 / 数据回传风险🔗 点击访问项目地址
GitHub
GitHub - daxiong888/apifox_security_check: Apifox 供应链攻击排查工具, 检测已知远程代码执行 / 数据回传风险
Apifox 供应链攻击排查工具, 检测已知远程代码执行 / 数据回传风险. Contribute to daxiong888/apifox_security_check development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Stored #Reflected #DOM
📦 项目名称: XSS-Learning-Lab-BurpSuite
👤 项目作者: tariqahmad0046-cpu
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 18:40:34
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Stored #Reflected #DOM
📦 项目名称: XSS-Learning-Lab-BurpSuite
👤 项目作者: tariqahmad0046-cpu
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 18:40:34
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - tariqahmad0046-cpu/XSS-Learning-Lab-BurpSuite
Contribute to tariqahmad0046-cpu/XSS-Learning-Lab-BurpSuite development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Sigma #SIEM
📦 项目名称: rustinel
👤 项目作者: MrSpaghettiBK
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 19:01:40
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Sigma #SIEM
📦 项目名称: rustinel
👤 项目作者: MrSpaghettiBK
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 19:01:40
📝 项目描述:
🔍 Detect threats with Rustinel, a high-performance Windows EDR agent that leverages ETW to collect telemetry and outputs alerts for easy SIEM integration.🔗 点击访问项目地址
GitHub
GitHub - MrSpaghettiBK/rustinel: 🔍 Detect threats with Rustinel, a high-performance Windows EDR agent that leverages ETW to collect…
🔍 Detect threats with Rustinel, a high-performance Windows EDR agent that leverages ETW to collect telemetry and outputs alerts for easy SIEM integration. - MrSpaghettiBK/rustinel
🚨 GitHub 监控消息提醒
🚨 发现关键词: #YARA #malware
📦 项目名称: assemblyline-service-yara
👤 项目作者: CybercentreCanada
🛠 开发语言: Python
⭐ Star数量: 5 | 🍴 Fork数量: 6
📅 更新时间: 2026-05-20 18:53:21
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #YARA #malware
📦 项目名称: assemblyline-service-yara
👤 项目作者: CybercentreCanada
🛠 开发语言: Python
⭐ Star数量: 5 | 🍴 Fork数量: 6
📅 更新时间: 2026-05-20 18:53:21
📝 项目描述:
Assemblyline 4 Yara signature and Post tag processing services🔗 点击访问项目地址
GitHub
GitHub - CybercentreCanada/assemblyline-service-yara: Assemblyline 4 Yara signature and Post tag processing services
Assemblyline 4 Yara signature and Post tag processing services - CybercentreCanada/assemblyline-service-yara
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Kubernetes #RBAC
📦 项目名称: -Demo-Minecraft-Unlocker-2026-Full-Game-Access-Infinite-Time-Multiplayer-Enabled
👤 项目作者: Alessandroinvariant926
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 20:00:55
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Kubernetes #RBAC
📦 项目名称: -Demo-Minecraft-Unlocker-2026-Full-Game-Access-Infinite-Time-Multiplayer-Enabled
👤 项目作者: Alessandroinvariant926
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 20:00:55
📝 项目描述:
Remove demo restrictions and enable full access, multiplayer support, and unlimited playtime for Minecraft Java, Bedrock, and Education editions.🔗 点击访问项目地址
GitHub
GitHub - Alessandroinvariant926/-Demo-Minecraft-Unlocker-2026-Full-Game-Access-Infinite-Time-Multiplayer-Enabled: Remove demo restrictions…
Remove demo restrictions and enable full access, multiplayer support, and unlimited playtime for Minecraft Java, Bedrock, and Education editions. - Alessandroinvariant926/-Demo-Minecraft-Unlocker-2...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Implant
📦 项目名称: Ghost-in-the-Stack
👤 项目作者: Chrisstoute
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 20:00:41
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Implant
📦 项目名称: Ghost-in-the-Stack
👤 项目作者: Chrisstoute
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-20 20:00:41
📝 项目描述:
Advanced threat hunt investigating Linux implant execution, persistence, lateral movement, external SSH access, C2 activity, and containment planning using KQL Advanced Hunting telemetry.🔗 点击访问项目地址
GitHub
GitHub - Chrisstoute/Ghost-in-the-Stack: Advanced threat hunt investigating Linux implant execution, persistence, lateral movement…
Advanced threat hunt investigating Linux implant execution, persistence, lateral movement, external SSH access, C2 activity, and containment planning using KQL Advanced Hunting telemetry. - Chrisst...