GitHub监控消息提醒!!!
更新了:钓鱼
描述:MailAssistant - 本地化轻量级 AI 邮件助理,实现邮件内容总结(50 字内)、钓鱼邮件概率评估、垃圾邮件识别,前后端分离设计
URL:https://github.com/AsdfAlex-learning/MailAssistant
标签:#钓鱼
更新了:钓鱼
描述:MailAssistant - 本地化轻量级 AI 邮件助理,实现邮件内容总结(50 字内)、钓鱼邮件概率评估、垃圾邮件识别,前后端分离设计
URL:https://github.com/AsdfAlex-learning/MailAssistant
标签:#钓鱼
GitHub
GitHub - AsdfAlex-learning/MailAssistant: MailAssistant - 本地化轻量级 AI 邮件助理,实现邮件内容总结(50 字内)、钓鱼邮件概率评估、垃圾邮件识别,前后端分离设计
MailAssistant - 本地化轻量级 AI 邮件助理,实现邮件内容总结(50 字内)、钓鱼邮件概率评估、垃圾邮件识别,前后端分离设计 - AsdfAlex-learning/MailAssistant
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-68613: n8n RCE vulnerability exploit and documentation
URL:https://github.com/wioui/n8n-CVE-2025-68613-exploit
标签:#RCE
更新了:RCE
描述:CVE-2025-68613: n8n RCE vulnerability exploit and documentation
URL:https://github.com/wioui/n8n-CVE-2025-68613-exploit
标签:#RCE
GitHub
GitHub - wioui/n8n-CVE-2025-68613-exploit: CVE-2025-68613: n8n RCE vulnerability exploit and documentation
CVE-2025-68613: n8n RCE vulnerability exploit and documentation - wioui/n8n-CVE-2025-68613-exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components 19.0.0-19.2.0. Exploits unsafe deserialization for unauthenticated remote code execution.
URL:https://github.com/S3cr3t-SDN/React4Shell
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components 19.0.0-19.2.0. Exploits unsafe deserialization for unauthenticated remote code execution.
URL:https://github.com/S3cr3t-SDN/React4Shell
标签:#CVE-2025
GitHub
GitHub - S3cr3t-SDN/React4Shell: Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components…
Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components 19.0.0-19.2.0. Exploits unsafe deserialization for unauthenticated remote code execution. - S3cr3t-...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public security advisory for CVE-2025-66209, CVE-2025-66210, CVE-2025-66211, CVE-2025-66212, and CVE-2025-66213
URL:https://github.com/0xrakan/coolify-cve-2025-66209-66213
标签:#CVE-2025
更新了:CVE-2025
描述:Public security advisory for CVE-2025-66209, CVE-2025-66210, CVE-2025-66211, CVE-2025-66212, and CVE-2025-66213
URL:https://github.com/0xrakan/coolify-cve-2025-66209-66213
标签:#CVE-2025
GitHub
GitHub - 0xrakan/coolify-cve-2025-66209-66213: Public security advisory for CVE-2025-66209, CVE-2025-66210, CVE-2025-66211, CVE…
Public security advisory for CVE-2025-66209, CVE-2025-66210, CVE-2025-66211, CVE-2025-66212, and CVE-2025-66213 - 0xrakan/coolify-cve-2025-66209-66213
GitHub监控消息提醒!!!
更新了:攻防
描述:一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
URL:https://github.com/CakeSystem/CMS
标签:#攻防
更新了:攻防
描述:一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
URL:https://github.com/CakeSystem/CMS
标签:#攻防
GitHub
GitHub - CakeSystem/CMS: CakeMiner-CMS本地隧道、数据压缩、加密、公网连接数压缩的强大本地客户端,极限降低延迟,防止中间人攻击, 最大限度提升安全性及矿场利润。 Powerful local client for local…
CakeMiner-CMS本地隧道、数据压缩、加密、公网连接数压缩的强大本地客户端,极限降低延迟,防止中间人攻击, 最大限度提升安全性及矿场利润。 Powerful local client for local tunnel, data compression, encryption, and public network connection number compression can ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:a controlled environment to test CVE-2025-55182.
URL:https://github.com/ckex/test-vuln
标签:#CVE-2025
更新了:CVE-2025
描述:a controlled environment to test CVE-2025-55182.
URL:https://github.com/ckex/test-vuln
标签:#CVE-2025
GitHub
GitHub - ckex/test-vuln: a controlled environment to test CVE-2025-55182.
a controlled environment to test CVE-2025-55182. Contribute to ckex/test-vuln development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:🛠️ Leverage advanced evasion techniques with Furtim, a Rust-based malware dropper for Red Teaming and educational security research.
URL:https://github.com/ShreenandNaik/Furtim-Advanced-Rust-Dropper
标签:#Red Team
更新了:Red Team
描述:🛠️ Leverage advanced evasion techniques with Furtim, a Rust-based malware dropper for Red Teaming and educational security research.
URL:https://github.com/ShreenandNaik/Furtim-Advanced-Rust-Dropper
标签:#Red Team
GitHub
GitHub - ShreenandNaik/Furtim-Advanced-Rust-Dropper: 🛠️ Leverage advanced evasion techniques with Furtim, a Rust-based malware…
🛠️ Leverage advanced evasion techniques with Furtim, a Rust-based malware dropper for Red Teaming and educational security research. - ShreenandNaik/Furtim-Advanced-Rust-Dropper
GitHub监控消息提醒!!!
更新了:Red Team
描述:Your Ultimate Pentest & Red Team Cheatsheets Hub - A comprehensive collection of curated resources, cheatsheets, and tools for security professionals, penetration testers, and red teamers.
URL:https://github.com/DivakarSure/ATSA---Advanced-Threat-Simulation-Assistant
标签:#Red Team
更新了:Red Team
描述:Your Ultimate Pentest & Red Team Cheatsheets Hub - A comprehensive collection of curated resources, cheatsheets, and tools for security professionals, penetration testers, and red teamers.
URL:https://github.com/DivakarSure/ATSA---Advanced-Threat-Simulation-Assistant
标签:#Red Team
GitHub
GitHub - DivakarSure/ATSA---Advanced-Threat-Simulation-Assistant: An advanced threat simulation and red teaming assistant that…
An advanced threat simulation and red teaming assistant that models realistic, multi-phase cyberattacks using kill-chain logic and machine learning to evaluate and stress-test defensive security sy...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:通过GitHub Copilot 辅助分析CVE-2025-68613漏洞
URL:https://github.com/intbjw/CVE-2025-68613-poc-via-copilot
标签:#CVE-2025
更新了:CVE-2025
描述:通过GitHub Copilot 辅助分析CVE-2025-68613漏洞
URL:https://github.com/intbjw/CVE-2025-68613-poc-via-copilot
标签:#CVE-2025
GitHub
GitHub - intbjw/CVE-2025-68613-poc-via-copilot: 通过GitHub Copilot 辅助分析CVE-2025-68613漏洞
通过GitHub Copilot 辅助分析CVE-2025-68613漏洞. Contribute to intbjw/CVE-2025-68613-poc-via-copilot development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65964-POC
URL:https://github.com/Pinus97/CVE-2025-65964-POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65964-POC
URL:https://github.com/Pinus97/CVE-2025-65964-POC
标签:#CVE-2025
GitHub
GitHub - Pinus97/CVE-2025-65964-POC: CVE-2025-65964-POC
CVE-2025-65964-POC. Contribute to Pinus97/CVE-2025-65964-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP
URL:https://github.com/theman001/CVE-2025-62215
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP
URL:https://github.com/theman001/CVE-2025-62215
标签:#CVE-2025
GitHub
GitHub - theman001/CVE-2025-62215: CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP
CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP - theman001/CVE-2025-62215
GitHub监控消息提醒!!!
更新了:钓鱼
描述:AI 钓鱼邮件检测网关,通过集成多源威胁情报(如 VirusTotal、微步在线)、沙箱技术以及 AI 算法,实现对邮件来源 IP、域名、URL、附件及内容关键字的深度识别、告警与拦截,并支持通过本地知识库持续学习进化。
URL:https://github.com/HaoY-l/MyPhishing-Web
标签:#钓鱼
更新了:钓鱼
描述:AI 钓鱼邮件检测网关,通过集成多源威胁情报(如 VirusTotal、微步在线)、沙箱技术以及 AI 算法,实现对邮件来源 IP、域名、URL、附件及内容关键字的深度识别、告警与拦截,并支持通过本地知识库持续学习进化。
URL:https://github.com/HaoY-l/MyPhishing-Web
标签:#钓鱼
GitHub
GitHub - HaoY-l/MyPhishing-Web: AI 钓鱼邮件检测网关,通过集成多源威胁情报(如 VirusTotal、微步在线)、沙箱技术以及 AI 算法,实现对邮件来源 IP、域名、URL、附件及内容关键字的深度识别、告警与拦截,并…
AI 钓鱼邮件检测网关,通过集成多源威胁情报(如 VirusTotal、微步在线)、沙箱技术以及 AI 算法,实现对邮件来源 IP、域名、URL、附件及内容关键字的深度识别、告警与拦截,并支持通过本地知识库持续学习进化。 - HaoY-l/MyPhishing-Web
GitHub监控消息提醒!!!
更新了:渗透测试
描述:自动化渗透测试助手 - 基于 LangGraph 的自主渗透测试系统
URL:https://github.com/desirepathh/AutoPentest-Agent
标签:#渗透测试
更新了:渗透测试
描述:自动化渗透测试助手 - 基于 LangGraph 的自主渗透测试系统
URL:https://github.com/desirepathh/AutoPentest-Agent
标签:#渗透测试
GitHub
GitHub - desirepathh/AutoPentest-Agent: 自动化渗透测试助手 - 基于 LangGraph 的自主渗透测试系统
自动化渗透测试助手 - 基于 LangGraph 的自主渗透测试系统. Contribute to desirepathh/AutoPentest-Agent development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.
URL:https://github.com/NtDallas/BOF_ExecuteAssembly
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.
URL:https://github.com/NtDallas/BOF_ExecuteAssembly
标签:#Cobalt Strike
GitHub
GitHub - NtDallas/BOF_ExecuteAssembly: Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion…
Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques. - NtDallas/BOF_ExecuteAssembly
GitHub监控消息提醒!!!
更新了:命令注入
描述:CVE-2024-31317 Android Zygote命令注入漏洞研究与部署工具 | Android 9-13 漏洞利用框架
URL:https://github.com/ANLINSTUDIO/AsPettor
标签:#命令注入
更新了:命令注入
描述:CVE-2024-31317 Android Zygote命令注入漏洞研究与部署工具 | Android 9-13 漏洞利用框架
URL:https://github.com/ANLINSTUDIO/AsPettor
标签:#命令注入
GitHub
GitHub - ANLINSTUDIO/AsPettor: AsPettor(俟吾者)是一款功能性窗口式集成工具,在它的加持下,你可以实现:直接打开复制的网络链接、磁盘地址、注册表地址,直接运行复制的Powershell指令,一次性运行下载的安装包等…
AsPettor(俟吾者)是一款功能性窗口式集成工具,在它的加持下,你可以实现:直接打开复制的网络链接、磁盘地址、注册表地址,直接运行复制的Powershell指令,一次性运行下载的安装包等;其次,可以通过快捷键(Menu菜单键或者Copilot键)执行各种内置或者从社区下载的命令,如像素检测关机、系统深色模式切换、调色板;当然,内置的如逾期文件夹等功能同样十分实用。预计之后加入AOI傲语智...
GitHub监控消息提醒!!!
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/iamhash/microservice-manufacturing-platform
标签:#绕过
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/iamhash/microservice-manufacturing-platform
标签:#绕过
GitHub
GitHub - iamhash/microservice-manufacturing-platform: 本项目是一个基于 Spring Cloud 生态构建的微服务管理平台示例,围绕订单处理、生产调度、资源管理与系统可观测性等核心场景,设计并实现了…
本项目是一个基于 Spring Cloud 生态构建的微服务管理平台示例,围绕订单处理、生产调度、资源管理与系统可观测性等核心场景,设计并实现了一套完整的分布式系统架构。项目采用微服务拆分模式,各服务独立部署、独立数据源,并通过服务注册发现、API 网关、熔断限流与链路追踪等机制,保障系统的高可用性与可扩展性。 系统重点关注微服务之间的协作关系与工程实践能力,包括服务治理、动态路由、容错降...
GitHub监控消息提醒!!!
更新了:burp
描述:alternative to postman,insomnia,burp,yaak
URL:https://github.com/suryasarisa99/api-craft
标签:#burp
更新了:burp
描述:alternative to postman,insomnia,burp,yaak
URL:https://github.com/suryasarisa99/api-craft
标签:#burp
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-14558
URL:https://github.com/Ashwesker/Blackash-CVE-2025-14558
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-14558
URL:https://github.com/Ashwesker/Blackash-CVE-2025-14558
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:免杀
描述:采用分离加载文件的方式实现免杀
URL:https://github.com/gerdonamendez-Crypter/av-false-positive-tester
标签:#免杀
更新了:免杀
描述:采用分离加载文件的方式实现免杀
URL:https://github.com/gerdonamendez-Crypter/av-false-positive-tester
标签:#免杀
GitHub
GitHub - gerdonamendez-Crypter/av-false-positive-tester: Legitimate software vendors (ISVs) who aim to detect and log false positives…
Legitimate software vendors (ISVs) who aim to detect and log false positives generated by public antivirus engines and Fully Undetectable (FUD) crypters—without triggering abuse alerts or appearing...