🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #CVE #POC
📦 项目名称: React2Shell-CVE-2025-55182
👤 项目作者: SpeatX
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 00:41:18
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #CVE #POC
📦 项目名称: React2Shell-CVE-2025-55182
👤 项目作者: SpeatX
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 00:41:18
📝 项目描述:
CVE-2025-55182 — Unauthenticated RCE in React Server Components (React2Shell). CVSS 10.0 exploit tool for authorized penetration testing.🔗 点击访问项目地址
GitHub
GitHub - SpeatX/React2Shell-CVE-2025-55182: CVE-2025-55182 — Unauthenticated RCE in React Server Components (React2Shell). CVSS…
CVE-2025-55182 — Unauthenticated RCE in React Server Components (React2Shell). CVSS 10.0 exploit tool for authorized penetration testing. - SpeatX/React2Shell-CVE-2025-55182
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #CVE #Stored
📦 项目名称: evershop-stored-xss-cve
👤 项目作者: Venukamatchi
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 00:20:11
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #CVE #Stored
📦 项目名称: evershop-stored-xss-cve
👤 项目作者: Venukamatchi
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 00:20:11
📝 项目描述:
Stored XSS via unrestricted file upload in EverShop <= 2.1.2 allowing arbitrary JavaScript execution under application origin.🔗 点击访问项目地址
GitHub
GitHub - Venukamatchi/evershop-stored-xss-cve: Stored XSS via unrestricted file upload in EverShop <= 2.1.2 allowing arbitrary…
Stored XSS via unrestricted file upload in EverShop <= 2.1.2 allowing arbitrary JavaScript execution under application origin. - Venukamatchi/evershop-stored-xss-cve
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Kubernetes #RBAC
📦 项目名称: nebari-provenance-collector-pack
👤 项目作者: nebari-dev
🛠 开发语言: Go
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 01:04:14
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Kubernetes #RBAC
📦 项目名称: nebari-provenance-collector-pack
👤 项目作者: nebari-dev
🛠 开发语言: Go
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 01:04:14
📝 项目描述:
A Kubernetes-native CronJob that discovers running images and Helm releases, resolves digests, verifies signatures, detects SLSA/SBOM attestations, and emits timestamped provenance reports.🔗 点击访问项目地址
GitHub
GitHub - nebari-dev/nebari-provenance-collector-pack: A Kubernetes-native CronJob that discovers running images and Helm releases…
A Kubernetes-native CronJob that discovers running images and Helm releases, resolves digests, verifies signatures, detects SLSA/SBOM attestations, and emits timestamped provenance reports. - nebar...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Kubernetes #RBAC
📦 项目名称: RotatingSecrets
👤 项目作者: bhanafee
🛠 开发语言: C#
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 01:03:24
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Kubernetes #RBAC
📦 项目名称: RotatingSecrets
👤 项目作者: bhanafee
🛠 开发语言: C#
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 01:03:24
📝 项目描述:
Sample code for rotating secrets in a Java application that uses a Kubernetes Secrets replacement🔗 点击访问项目地址
GitHub
GitHub - bhanafee/RotatingSecrets: Sample code for rotating secrets in a Java application that uses a Kubernetes Secrets replacement
Sample code for rotating secrets in a Java application that uses a Kubernetes Secrets replacement - bhanafee/RotatingSecrets
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Nuclei #templates
📦 项目名称: nuclei-confuser
👤 项目作者: dwisiswant0
🛠 开发语言: Go
⭐ Star数量: 10 | 🍴 Fork数量: 3
📅 更新时间: 2026-05-24 00:31:02
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Nuclei #templates
📦 项目名称: nuclei-confuser
👤 项目作者: dwisiswant0
🛠 开发语言: Go
⭐ Star数量: 10 | 🍴 Fork数量: 3
📅 更新时间: 2026-05-24 00:31:02
📝 项目描述:
This repository gathers matchers from Nuclei templates designed to fool the Nuclei scanner.🔗 点击访问项目地址
GitHub
GitHub - dwisiswant0/nuclei-confuser: This repository gathers matchers from Nuclei templates designed to fool the Nuclei scanner.
This repository gathers matchers from Nuclei templates designed to fool the Nuclei scanner. - dwisiswant0/nuclei-confuser
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026 #POC
📦 项目名称: CVE-2026-41096-POC
👤 项目作者: satchfunky
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 01:48:41
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026 #POC
📦 项目名称: CVE-2026-41096-POC
👤 项目作者: satchfunky
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 01:48:41
📝 项目描述:
windows api bug🔗 点击访问项目地址
GitHub
GitHub - satchfunky/CVE-2026-41096-POC: windows api bug
windows api bug. Contribute to satchfunky/CVE-2026-41096-POC development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #YARA #rules #malware
📦 项目名称: prx-sd
👤 项目作者: openprx
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 03:59:02
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #YARA #rules #malware
📦 项目名称: prx-sd
👤 项目作者: openprx
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 03:59:02
📝 项目描述:
Open-source antivirus engine with hash matching, YARA rules, and heuristic analysis. Built with Rust.🔗 点击访问项目地址
GitHub
GitHub - openprx/prx-sd: Open-source antivirus engine with hash matching, YARA rules, and heuristic analysis. Built with Rust.
Open-source antivirus engine with hash matching, YARA rules, and heuristic analysis. Built with Rust. - openprx/prx-sd
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Sigma #rules
📦 项目名称: hayabusa-rules
👤 项目作者: Yamato-Security
🛠 开发语言: Python
⭐ Star数量: 218 | 🍴 Fork数量: 28
📅 更新时间: 2026-05-24 03:56:00
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Sigma #rules
📦 项目名称: hayabusa-rules
👤 项目作者: Yamato-Security
🛠 开发语言: Python
⭐ Star数量: 218 | 🍴 Fork数量: 28
📅 更新时间: 2026-05-24 03:56:00
📝 项目描述:
Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.🔗 点击访问项目地址
GitHub
GitHub - Yamato-Security/hayabusa-rules: Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.
Curated Windows event log Sigma rules used in Hayabusa and Velociraptor. - Yamato-Security/hayabusa-rules
🚨 GitHub 监控消息提醒
🚨 发现关键词: #钓鱼 #二维码
📦 项目名称: maker-vpotzrytri-Coding
👤 项目作者: x7yxpksk72-maker
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 02:56:31
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #钓鱼 #二维码
📦 项目名称: maker-vpotzrytri-Coding
👤 项目作者: x7yxpksk72-maker
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 02:56:31
📝 项目描述:
基于SpringBoot+Vue的同城钓鱼社交APP的设计与开发🔗 点击访问项目地址
GitHub
GitHub - x7yxpksk72-maker/maker-vpotzrytri-Coding: 基于SpringBoot+Vue的同城钓鱼社交APP的设计与开发
基于SpringBoot+Vue的同城钓鱼社交APP的设计与开发. Contribute to x7yxpksk72-maker/maker-vpotzrytri-Coding development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Extension
📦 项目名称: port-highlighter
👤 项目作者: dhakal-bibek
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 05:53:39
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Extension
📦 项目名称: port-highlighter
👤 项目作者: dhakal-bibek
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 05:53:39
📝 项目描述:
Burp Suite extension that color-codes proxy history entries based on listener port. Similar to PwnFox but port-based.🔗 点击访问项目地址
GitHub
GitHub - dhakal-bibek/port-highlighter: Burp Suite extension that color-codes proxy history entries based on listener port. Similar…
Burp Suite extension that color-codes proxy history entries based on listener port. Similar to PwnFox but port-based. - dhakal-bibek/port-highlighter
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Sigma #rules
📦 项目名称: LogSources_SigmaRules
👤 项目作者: EssexRich
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 05:58:48
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Sigma #rules
📦 项目名称: LogSources_SigmaRules
👤 项目作者: EssexRich
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 05:58:48
📝 项目描述:
Log source field names and sigma rules🔗 点击访问项目地址
GitHub
GitHub - EssexRich/LogSources_SigmaRules: Log source field names and sigma rules
Log source field names and sigma rules. Contribute to EssexRich/LogSources_SigmaRules development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Exploit #CVE
📦 项目名称: CVE-2025-55182-in-go
👤 项目作者: w3nch
🛠 开发语言: Go
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 06:58:31
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Exploit #CVE
📦 项目名称: CVE-2025-55182-in-go
👤 项目作者: w3nch
🛠 开发语言: Go
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 06:58:31
📝 项目描述:
Just a simple exploit script written in go for react2shell🔗 点击访问项目地址
GitHub
GitHub - w3nch/CVE-2025-55182-in-go
Contribute to w3nch/CVE-2025-55182-in-go development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Stored #Reflected #DOM
📦 项目名称: xss-labs
👤 项目作者: yogsec
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 07:04:07
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Stored #Reflected #DOM
📦 项目名称: xss-labs
👤 项目作者: yogsec
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 07:04:07
📝 项目描述:
XSS (Cross-Site Scripting) labs for learning web application security. Each lab demonstrates a different XSS vulnerability with interactive examples and solutions. Frontend-only, no server required. Live demo via GitHub Pages. Includes reflected XSS, stored XSS, DOM-based XSS, and event handler injections. Perfect for students.🔗 点击访问项目地址
GitHub
GitHub - yogsec/xss-labs: xss-labs for learning web application security. Each lab demonstrates a different XSS vulnerability with…
xss-labs for learning web application security. Each lab demonstrates a different XSS vulnerability with interactive examples and solutions. Frontend-only, no server required. Live demo via GitHub ...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Stored
📦 项目名称: logacademy
👤 项目作者: Ahmadd018
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 07:01:06
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Stored
📦 项目名称: logacademy
👤 项目作者: Ahmadd018
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 07:01:06
📝 项目描述:
Intentionally vulnerable PHP web app for red/blue team training (SQLi, XSS, IDOR, file upload RCE, open redirect, OTP bypass)🔗 点击访问项目地址
GitHub
GitHub - Ahmadd018/logacademy: Intentionally vulnerable PHP web app for red/blue team training (SQLi, XSS, IDOR, file upload RCE…
Intentionally vulnerable PHP web app for red/blue team training (SQLi, XSS, IDOR, file upload RCE, open redirect, OTP bypass) - Ahmadd018/logacademy
🚨 GitHub 监控消息提醒
🚨 发现关键词: #YARA #rules
📦 项目名称: pyc_rules
👤 项目作者: rakovskij-stanislav
🛠 开发语言: YARA
⭐ Star数量: 9 | 🍴 Fork数量: 2
📅 更新时间: 2026-05-24 07:27:45
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #YARA #rules
📦 项目名称: pyc_rules
👤 项目作者: rakovskij-stanislav
🛠 开发语言: YARA
⭐ Star数量: 9 | 🍴 Fork数量: 2
📅 更新时间: 2026-05-24 07:27:45
📝 项目描述:
Yara rules on PYC files to determine PYC version🔗 点击访问项目地址
GitHub
GitHub - rakovskij-stanislav/pyc_rules: Yara rules on PYC files to determine PYC version
Yara rules on PYC files to determine PYC version. Contribute to rakovskij-stanislav/pyc_rules development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #渗透测试 #红队
📦 项目名称: hackvideo
👤 项目作者: 0x7556
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 09:00:16
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #渗透测试 #红队
📦 项目名称: hackvideo
👤 项目作者: 0x7556
🛠 开发语言: Unknown
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 09:00:16
📝 项目描述:
Hack视频教程:红队渗透测试、金刚狼WolfShell、工具使用教程🔗 点击访问项目地址
GitHub
GitHub - 0x7556/hackvideo: Hack视频教程:红队渗透测试、金刚狼WolfShell、工具使用教程
Hack视频教程:红队渗透测试、金刚狼WolfShell、工具使用教程. Contribute to 0x7556/hackvideo development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #EXP #POC
📦 项目名称: exp_baddial
👤 项目作者: Starry2233
🛠 开发语言: Batchfile
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 09:01:27
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #EXP #POC
📦 项目名称: exp_baddial
👤 项目作者: Starry2233
🛠 开发语言: Batchfile
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 09:01:27
📝 项目描述:
PoC for XTC dial plugin RCE vulnerability - demonstrates arbitrary code execution in UID 1000 system context via unsigned .pl DEX loading from external storage🔗 点击访问项目地址
GitHub
GitHub - Starry2233/exp_baddial: PoC for XTC dial plugin RCE vulnerability - demonstrates arbitrary code execution in UID 1000…
PoC for XTC dial plugin RCE vulnerability - demonstrates arbitrary code execution in UID 1000 system context via unsigned .pl DEX loading from external storage - Starry2233/exp_baddial
🚨 GitHub 监控消息提醒
🚨 发现关键词: #YARA #rules #malware
📦 项目名称: yara-rules
👤 项目作者: k3rnelcallz
🛠 开发语言: YARA
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 09:52:06
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #YARA #rules #malware
📦 项目名称: yara-rules
👤 项目作者: k3rnelcallz
🛠 开发语言: YARA
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 09:52:06
📝 项目描述:
Malware detection rules (Code-level pattern matching definitions for identifying and matching malware families)🔗 点击访问项目地址
GitHub
GitHub - k3rnelcallz/yara-rules: Malware detection rules (Code-level pattern matching definitions for identifying and matching…
Malware detection rules (Code-level pattern matching definitions for identifying and matching malware families) - k3rnelcallz/yara-rules
🚨 GitHub 监控消息提醒
🚨 发现关键词: #漏洞 #RCE
📦 项目名称: JavaSecLab
👤 项目作者: whgojp
🛠 开发语言: JavaScript
⭐ Star数量: 840 | 🍴 Fork数量: 73
📅 更新时间: 2026-05-24 09:45:51
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #漏洞 #RCE
📦 项目名称: JavaSecLab
👤 项目作者: whgojp
🛠 开发语言: JavaScript
⭐ Star数量: 840 | 🍴 Fork数量: 73
📅 更新时间: 2026-05-24 09:45:51
📝 项目描述:
JavaSecLab is a comprehensive Java vulnerability platform| JavaSecLab是一款综合型Java漏洞平台,提供相关漏洞缺陷代码、修复代码、漏洞场景、审计SINK点、安全编码规范,覆盖多种漏洞场景,友好用户交互UI……🔗 点击访问项目地址
GitHub
GitHub - whgojp/JavaSecLab: JavaSecLab is a comprehensive Java vulnerability platform| JavaSecLab是一款综合型Java漏洞平台,提供相关漏洞缺陷代码、修复…
JavaSecLab is a comprehensive Java vulnerability platform| JavaSecLab是一款综合型Java漏洞平台,提供相关漏洞缺陷代码、修复代码、漏洞场景、审计SINK点、安全编码规范,覆盖多种漏洞场景,友好用户交互UI…… - whgojp/JavaSecLab
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Exploit #CVE
📦 项目名称: Discord-Image-Logger-Stealer
👤 项目作者: Frozoewn
🛠 开发语言: C#
⭐ Star数量: 1 | 🍴 Fork数量: 1
📅 更新时间: 2026-05-24 10:03:53
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Exploit #CVE
📦 项目名称: Discord-Image-Logger-Stealer
👤 项目作者: Frozoewn
🛠 开发语言: C#
⭐ Star数量: 1 | 🍴 Fork数量: 1
📅 更新时间: 2026-05-24 10:03:53
📝 项目描述:
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token🔗 点击访问项目地址
GitHub
GitHub - Frozoewn/Discord-Image-Logger-Stealer: Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital…
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token - Frozoewn/Discord-Image-Logger-Stealer
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Spring #EXP
📦 项目名称: Dhruvgupta130
👤 项目作者: DhruvGupta130
🛠 开发语言: TypeScript
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 10:05:15
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Spring #EXP
📦 项目名称: Dhruvgupta130
👤 项目作者: DhruvGupta130
🛠 开发语言: TypeScript
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-24 10:05:15
📝 项目描述:
🚀 Aspiring Full-Stack Java Developer | Proficient in Java, JavaScript, React.js, Spring Boot | Skilled in Node.js, SQL, and Python | Passionate Problem Solver & Collaborative Team Player🔗 点击访问项目地址
GitHub
GitHub - DhruvGupta130/Dhruvgupta130: 🚀 Aspiring Full-Stack Java Developer | Proficient in Java, JavaScript, React.js, Spring Boot…
🚀 Aspiring Full-Stack Java Developer | Proficient in Java, JavaScript, React.js, Spring Boot | Skilled in Node.js, SQL, and Python | Passionate Problem Solver & Collaborative Team Player - ...