🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Stored
📦 项目名称: XSS-Disclosure-Glamour-Salon
👤 项目作者: Kiezroy
🛠 开发语言: Unknown
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 15:20:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Stored
📦 项目名称: XSS-Disclosure-Glamour-Salon
👤 项目作者: Kiezroy
🛠 开发语言: Unknown
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 15:20:58
📝 项目描述:
Stored Cross-Site Scripting (XSS) in Glamour Salon Management System🔗 点击访问项目地址
GitHub
GitHub - Kiezroy/XSS-Disclosure-Glamour-Salon: Stored Cross-Site Scripting (XSS) in Glamour Salon Management System
Stored Cross-Site Scripting (XSS) in Glamour Salon Management System - Kiezroy/XSS-Disclosure-Glamour-Salon
🚨 GitHub 监控消息提醒
🚨 发现关键词: #漏洞 #Nuclei
📦 项目名称: FlowScan
👤 项目作者: paokuwansui
🛠 开发语言: Python
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 15:38:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #漏洞 #Nuclei
📦 项目名称: FlowScan
👤 项目作者: paokuwansui
🛠 开发语言: Python
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 15:38:58
📝 项目描述:
FlowScan 是一个基于事件驱动架构的自动化安全扫描编排引擎,通过 YAML 配置模块实现灵活的漏洞扫描、资产发现和服务识别。支持多目标并发处理、智能事件路由和自动化工作流编排。🔗 点击访问项目地址
GitHub
GitHub - paokuwansui/FlowScan: FlowScan 是一个基于事件驱动架构的自动化安全扫描编排引擎,通过 YAML 配置模块实现灵活的漏洞扫描、资产发现和服务识别。支持多目标并发处理、智能事件路由和自动化工作流编排。
FlowScan 是一个基于事件驱动架构的自动化安全扫描编排引擎,通过 YAML 配置模块实现灵活的漏洞扫描、资产发现和服务识别。支持多目标并发处理、智能事件路由和自动化工作流编排。 - paokuwansui/FlowScan
🚨 GitHub 监控消息提醒
🚨 发现关键词: #BlueTeam #Monitor
📦 项目名称: The-Witcher-3-DLC-Unlocker-Manual-Scripts-Config-Editors-No-Launcher-
👤 项目作者: Pastelike-corn361
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 15:14:13
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #BlueTeam #Monitor
📦 项目名称: The-Witcher-3-DLC-Unlocker-Manual-Scripts-Config-Editors-No-Launcher-
👤 项目作者: Pastelike-corn361
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 15:14:13
📝 项目描述:
Manage DLC flags, console commands, and game configuration files for The Witcher 3 without needing a launcher.🔗 点击访问项目地址
GitHub
GitHub - Pastelike-corn361/The-Witcher-3-DLC-Unlocker-Manual-Scripts-Config-Editors-No-Launcher-: Manage DLC flags, console commands…
Manage DLC flags, console commands, and game configuration files for The Witcher 3 without needing a launcher. - Pastelike-corn361/The-Witcher-3-DLC-Unlocker-Manual-Scripts-Config-Editors-No-Launcher-
🚨 GitHub 监控消息提醒
🚨 发现关键词: #POC #CVE
📦 项目名称: cve-threat-lookup
👤 项目作者: leocybersecapps
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 15:58:38
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #POC #CVE
📦 项目名称: cve-threat-lookup
👤 项目作者: leocybersecapps
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 15:58:38
📝 项目描述:
Privacy-respecting CVE lookup: PoC presence and active-exploitation evidence🔗 点击访问项目地址
GitHub
GitHub - leocybersecapps/cve-threat-lookup: Privacy-respecting CVE lookup: PoC presence and active-exploitation evidence
Privacy-respecting CVE lookup: PoC presence and active-exploitation evidence - leocybersecapps/cve-threat-lookup
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Sliver #C2 #Implant
📦 项目名称: sliver-c2
👤 项目作者: pantha704
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 16:03:30
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Sliver #C2 #Implant
📦 项目名称: sliver-c2
👤 项目作者: pantha704
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 16:03:30
📝 项目描述:
Production-grade Sliver C2 infrastructure: one-click FUD implant, always-on Cloudflare Worker redirector, Defender evasion, cross-device failover🔗 点击访问项目地址
GitHub
GitHub - pantha704/sliver-c2: Production-grade Sliver C2 infrastructure: one-click FUD implant, always-on Cloudflare Worker redirector…
Production-grade Sliver C2 infrastructure: one-click FUD implant, always-on Cloudflare Worker redirector, Defender evasion, cross-device failover - pantha704/sliver-c2
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Plugin #Extension
📦 项目名称: analyze-target-burp-plugin
👤 项目作者: lubiku35
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 15:31:36
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Plugin #Extension
📦 项目名称: analyze-target-burp-plugin
👤 项目作者: lubiku35
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 15:31:36
📝 项目描述:
Burp Suite extension for one-click reconnaissance and reporting🔗 点击访问项目地址
GitHub
GitHub - lubiku35/analyze-target-burp-plugin: Burp Suite extension for one-click reconnaissance and reporting
Burp Suite extension for one-click reconnaissance and reporting - lubiku35/analyze-target-burp-plugin
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Framework
📦 项目名称: BeaconatorC2
👤 项目作者: CroodSolutions
🛠 开发语言: Python
⭐ Star数量: 93 | 🍴 Fork数量: 15
📅 更新时间: 2026-05-22 15:57:44
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Framework
📦 项目名称: BeaconatorC2
👤 项目作者: CroodSolutions
🛠 开发语言: Python
⭐ Star数量: 93 | 🍴 Fork数量: 15
📅 更新时间: 2026-05-22 15:57:44
📝 项目描述:
BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catalog of beacons and a clear schema to add more beacons over time. 🔗 点击访问项目地址
GitHub
GitHub - CroodSolutions/BeaconatorC2: BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured…
BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catalog of beacons and a clear schema to add more beacons over ti...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSTI #POC
📦 项目名称: xpl_cp3
👤 项目作者: sergio-echigo
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 16:52:33
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSTI #POC
📦 项目名称: xpl_cp3
👤 项目作者: sergio-echigo
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 16:52:33
📝 项目描述:
CP 3 :: Web XPL :: SSTI🔗 点击访问项目地址
GitHub
GitHub - sergio-echigo/xpl_cp3: CP 3 :: Web XPL :: SSTI
CP 3 :: Web XPL :: SSTI. Contribute to sergio-echigo/xpl_cp3 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #CVE
📦 项目名称: Wordpress-Crop-RCE
👤 项目作者: SpeatX
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 16:37:50
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #CVE
📦 项目名称: Wordpress-Crop-RCE
👤 项目作者: SpeatX
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 16:37:50
📝 项目描述:
Python exploit toolkit for WordPress Crop Image RCE — CVE-2019-8942 & CVE-2019-8943🔗 点击访问项目地址
GitHub
GitHub - SpeatX/Wordpress-Crop-RCE: Python exploit toolkit for WordPress Crop Image RCE — CVE-2019-8942 & CVE-2019-8943
Python exploit toolkit for WordPress Crop Image RCE — CVE-2019-8942 & CVE-2019-8943 - SpeatX/Wordpress-Crop-RCE
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Exploit #POC
📦 项目名称: sc-reentrancy-attack
👤 项目作者: lizxyyyc
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 17:00:20
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Exploit #POC
📦 项目名称: sc-reentrancy-attack
👤 项目作者: lizxyyyc
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 17:00:20
📝 项目描述:
🔍 Analyze and exploit cross-function reentrancy vulnerabilities in smart contracts to enhance security and prevent critical risks.🔗 点击访问项目地址
GitHub
GitHub - lizxyyyc/sc-reentrancy-attack: 🔍 Analyze and exploit cross-function reentrancy vulnerabilities in smart contracts to enhance…
🔍 Analyze and exploit cross-function reentrancy vulnerabilities in smart contracts to enhance security and prevent critical risks. - lizxyyyc/sc-reentrancy-attack
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Framework
📦 项目名称: androspectra-RAT-research
👤 项目作者: 46894-RAFFEY
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 17:57:55
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Framework
📦 项目名称: androspectra-RAT-research
👤 项目作者: 46894-RAFFEY
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 17:57:55
📝 项目描述:
Android security research — C2 architecture, threat modelling, and defensive analysis. Final Year Project. Documentation only.🔗 点击访问项目地址
GitHub
GitHub - 46894-RAFFEY/androspectra-RAT-research: Android security research — C2 architecture, threat modelling, and defensive analysis.…
Android security research — C2 architecture, threat modelling, and defensive analysis. Final Year Project. Documentation only. - 46894-RAFFEY/androspectra-RAT-research
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Beacon
📦 项目名称: command-server-watch
👤 项目作者: doodad-labs
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 17:52:19
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Beacon
📦 项目名称: command-server-watch
👤 项目作者: doodad-labs
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 17:52:19
📝 项目描述:
Known C2 infrastructure, mapped and watched — open data for defenders.🔗 点击访问项目地址
GitHub
GitHub - doodad-labs/command-server-watch: Known C2 infrastructure, mapped and watched — open data for defenders.
Known C2 infrastructure, mapped and watched — open data for defenders. - doodad-labs/command-server-watch
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #CVE #Remote Code Execution
📦 项目名称: roundcube-rce
👤 项目作者: roundcube-utils
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 17:57:04
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #CVE #Remote Code Execution
📦 项目名称: roundcube-rce
👤 项目作者: roundcube-utils
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 17:57:04
📝 项目描述:
Roundcube Webmail RCE🔗 点击访问项目地址
GitHub
GitHub - roundcube-utils/roundcube-rce: Roundcube RCE
Roundcube RCE. Contribute to roundcube-utils/roundcube-rce development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Nuclei #templates #CVE
📦 项目名称: cent-nuclei-templates
👤 项目作者: srkgupta
🛠 开发语言: Unknown
⭐ Star数量: 13 | 🍴 Fork数量: 2
📅 更新时间: 2026-05-22 17:36:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Nuclei #templates #CVE
📦 项目名称: cent-nuclei-templates
👤 项目作者: srkgupta
🛠 开发语言: Unknown
⭐ Star数量: 13 | 🍴 Fork数量: 2
📅 更新时间: 2026-05-22 17:36:58
📝 项目描述:
Cent Nuclei Templates generated through the cent tool. Maintained by HackerWhite. 🔗 点击访问项目地址
GitHub
GitHub - srkgupta/cent-nuclei-templates: Cent Nuclei Templates generated through the cent tool. Maintained by HackerWhite.
Cent Nuclei Templates generated through the cent tool. Maintained by HackerWhite. - srkgupta/cent-nuclei-templates
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF #CVE
📦 项目名称: vulnerability-research
👤 项目作者: b-hermes
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 17:53:47
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF #CVE
📦 项目名称: vulnerability-research
👤 项目作者: b-hermes
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 17:53:47
📝 项目描述:
Selected public vulnerability research, CVE writeups, SSRF/parser bypasses, and AppSec findings.🔗 点击访问项目地址
GitHub
GitHub - b-hermes/vulnerability-research: Selected public vulnerability research, CVE writeups, SSRF/parser bypasses, and AppSec…
Selected public vulnerability research, CVE writeups, SSRF/parser bypasses, and AppSec findings. - b-hermes/vulnerability-research
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026 #POC
📦 项目名称: copy-fail-python
👤 项目作者: wh1sky02
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 18:58:31
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026 #POC
📦 项目名称: copy-fail-python
👤 项目作者: wh1sky02
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 18:58:31
📝 项目描述:
Portable Python PoC for CVE-2026-31431 (Copy Fail)🔗 点击访问项目地址
GitHub
wh1sky02/copy-fail-python
Portable Python PoC for CVE-2026-31431 (Copy Fail) - wh1sky02/copy-fail-python
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026 #POC #Exploit #RCE
📦 项目名称: CVE-2026-42945-nginx-rift-poc
👤 项目作者: F2u0a0d3
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 18:23:35
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026 #POC #Exploit #RCE
📦 项目名称: CVE-2026-42945-nginx-rift-poc
👤 项目作者: F2u0a0d3
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 18:23:35
📝 项目描述:
PoC for CVE-2026-42945 (nginx Rift) — heap buffer overflow in ngx_http_rewrite_module. Includes detect/probe/exploit modes, dual-fixture Docker lab, empirical address discovery, OOB-verified offset sweep. Original disclosure by depthfirst.🔗 点击访问项目地址
GitHub
GitHub - F2u0a0d3/CVE-2026-42945-nginx-rift-poc: PoC for CVE-2026-42945 (nginx Rift) — heap buffer overflow in ngx_http_rewrite_module.…
PoC for CVE-2026-42945 (nginx Rift) — heap buffer overflow in ngx_http_rewrite_module. Includes detect/probe/exploit modes, dual-fixture Docker lab, empirical address discovery, OOB-verified offset...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #C&C
📦 项目名称: Botnet-C2-Sosyal-Ag-Analizi
👤 项目作者: NurSenaa
🛠 开发语言: Jupyter Notebook
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 19:02:54
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #C&C
📦 项目名称: Botnet-C2-Sosyal-Ag-Analizi
👤 项目作者: NurSenaa
🛠 开发语言: Jupyter Notebook
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 19:02:54
📝 项目描述:
Botnet Komuta-Kontrol (C&C) Altyapısının Sosyal Ağ Analizi Yöntemleriyle Tespiti - CTU-13 Senaryo 6 (DonBot)🔗 点击访问项目地址
GitHub
GitHub - NurSenaa/Botnet-C2-Sosyal-Ag-Analizi: Botnet Komuta-Kontrol (C&C) Altyapısının Sosyal Ağ Analizi Yöntemleriyle Tespiti…
Botnet Komuta-Kontrol (C&C) Altyapısının Sosyal Ağ Analizi Yöntemleriyle Tespiti - CTU-13 Senaryo 6 (DonBot) - NurSenaa/Botnet-C2-Sosyal-Ag-Analizi
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Shellcode-Loader
👤 项目作者: GRakshita
🛠 开发语言: PowerShell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 18:34:01
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Shellcode-Loader
👤 项目作者: GRakshita
🛠 开发语言: PowerShell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 18:34:01
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - GRakshita/Shellcode-Loader
Contribute to GRakshita/Shellcode-Loader development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Command and Control
📦 项目名称: C2PE
👤 项目作者: sneakerhax
🛠 开发语言: Go
⭐ Star数量: 36 | 🍴 Fork数量: 8
📅 更新时间: 2026-05-22 19:46:55
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Command and Control
📦 项目名称: C2PE
👤 项目作者: sneakerhax
🛠 开发语言: Go
⭐ Star数量: 36 | 🍴 Fork数量: 8
📅 更新时间: 2026-05-22 19:46:55
📝 项目描述:
Red Team C2 and Post Exploitation code🔗 点击访问项目地址
GitHub
GitHub - sneakerhax/C2PE: Red Team C2 and Post Exploitation code
Red Team C2 and Post Exploitation code. Contribute to sneakerhax/C2PE development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #BlueTeam #Response
📦 项目名称: nexusintel
👤 项目作者: xdrew87
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 20:02:14
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #BlueTeam #Response
📦 项目名称: nexusintel
👤 项目作者: xdrew87
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-22 20:02:14
📝 项目描述:
NexusIntel is a modular cyber investigation and intelligence platform designed for OSINT analysts, SOC teams, red teams, and infrastructure investigators. It correlates domains, IPs, ASNs, certificates, and threat intelligence into interactive relationship graphs, investigation timelines, and evidence-driven workflows through a modern analyst-focus🔗 点击访问项目地址
GitHub
GitHub - xdrew87/nexusintel: NexusIntel is a modular cyber investigation and intelligence platform designed for OSINT analysts…
NexusIntel is a modular cyber investigation and intelligence platform designed for OSINT analysts, SOC teams, red teams, and infrastructure investigators. It correlates domains, IPs, ASNs, certific...