GitHub监控消息提醒!!!
更新了:Red Team
描述:Network Diff Scanner in Python for detecting port changes over time (Red Team & Blue Team fundamentals)
URL:https://github.com/Matizuni/Network-diff-scanner
标签:#Red Team
更新了:Red Team
描述:Network Diff Scanner in Python for detecting port changes over time (Red Team & Blue Team fundamentals)
URL:https://github.com/Matizuni/Network-diff-scanner
标签:#Red Team
GitHub
Matizuni/Network-diff-scanner
Network Diff Scanner in Python for detecting port changes over time (Red Team & Blue Team fundamentals) - Matizuni/Network-diff-scanner
GitHub监控消息提醒!!!
更新了:信息收集
描述:Hacker Agent 是一个专业的渗透测试 AI 助手,具备 OSCP、CEH 等专业认证知识体系。通过集成 MCP 服务器调用 Kali Linux 工具,实现从信息收集到权限提升的完整渗透测试流程。项目采用 ReAct (推理-行动) 方法论,让 AI 能够进行多步骤推理和决策,系统化地发现安全漏洞。
URL:https://github.com/jasontan1024/hacker-agent
标签:#信息收集
更新了:信息收集
描述:Hacker Agent 是一个专业的渗透测试 AI 助手,具备 OSCP、CEH 等专业认证知识体系。通过集成 MCP 服务器调用 Kali Linux 工具,实现从信息收集到权限提升的完整渗透测试流程。项目采用 ReAct (推理-行动) 方法论,让 AI 能够进行多步骤推理和决策,系统化地发现安全漏洞。
URL:https://github.com/jasontan1024/hacker-agent
标签:#信息收集
GitHub
GitHub - jasontan1024/hacker-agent: Hacker Agent 是一个专业的渗透测试 AI 助手,具备 OSCP、CEH 等专业认证知识体系。通过集成 MCP 服务器调用 Kali Linux 工具,实现从信息收集到权…
Hacker Agent 是一个专业的渗透测试 AI 助手,具备 OSCP、CEH 等专业认证知识体系。通过集成 MCP 服务器调用 Kali Linux 工具,实现从信息收集到权限提升的完整渗透测试流程。项目采用 ReAct (推理-行动) 方法论,让 AI 能够进行多步骤推理和决策,系统化地发现安全漏洞。 - jasontan1024/hacker-agent
GitHub监控消息提醒!!!
更新了:渗透测试
描述:MPET (Multi-Protocol Exploitation Toolkit) 是一款专业的多协议安全测试工具,基于 Wails 框架构建的现代化桌面应用。它提供了对 25+ 种主流服务协议的连接测试、未授权访问检测、弱口令检测和漏洞利用能力,是安全研究人员和渗透测试工程师的得力助手。
URL:https://github.com/onewinner/MPET
标签:#渗透测试
更新了:渗透测试
描述:MPET (Multi-Protocol Exploitation Toolkit) 是一款专业的多协议安全测试工具,基于 Wails 框架构建的现代化桌面应用。它提供了对 25+ 种主流服务协议的连接测试、未授权访问检测、弱口令检测和漏洞利用能力,是安全研究人员和渗透测试工程师的得力助手。
URL:https://github.com/onewinner/MPET
标签:#渗透测试
GitHub
GitHub - onewinner/MPET: MPET (Multi-Protocol Exploitation Toolkit) 是一款专业的多协议安全测试工具,基于 Wails 框架构建的现代化桌面应用。它提供了对 25+ 种主流服务协议的连接…
MPET (Multi-Protocol Exploitation Toolkit) 是一款专业的多协议安全测试工具,基于 Wails 框架构建的现代化桌面应用。它提供了对 25+ 种主流服务协议的连接测试、未授权访问检测、弱口令检测和漏洞利用能力,是安全研究人员和渗透测试工程师的得力助手。 - onewinner/MPET
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-22812
URL:https://github.com/Udyz/CVE-2026-22812-Exp
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-22812
URL:https://github.com/Udyz/CVE-2026-22812-Exp
标签:#CVE-2026
GitHub
GitHub - Udyz/CVE-2026-22812-Exp: CVE-2026-22812
CVE-2026-22812. Contribute to Udyz/CVE-2026-22812-Exp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/Su-m-up/xv6-public
标签:#绕过
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/Su-m-up/xv6-public
标签:#绕过
GitHub
GitHub - Su-m-up/xv6-public: 一、实践背景 本实践基于 MIT xv6(x86 版本),围绕操作系统从 bootloader 到内核 main 函数的完 整启动流程展开,配合视频学习 bootblock、bootasm.S…
一、实践背景 本实践基于 MIT xv6(x86 版本),围绕操作系统从 bootloader 到内核 main 函数的完 整启动流程展开,配合视频学习 bootblock、bootasm.S、bootmain.c、entry.S 以及内 核页表初始化过程。 二、实践目标 1. 理解 xv6 启动链路:bootblock → bootasm.S → bootmain.c → entry...
GitHub监控消息提醒!!!
更新了:RCE
描述:16x CRITICAL Memory Corruption Bugs | Production RCE Expert
URL:https://github.com/harshvardhan1gour/harshvardhan-gour-bugs
标签:#RCE
更新了:RCE
描述:16x CRITICAL Memory Corruption Bugs | Production RCE Expert
URL:https://github.com/harshvardhan1gour/harshvardhan-gour-bugs
标签:#RCE
GitHub
GitHub - harshvardhan1gour/harshvardhan-gour-bugs: 16x CRITICAL Memory Corruption Bugs | Production RCE Expert
16x CRITICAL Memory Corruption Bugs | Production RCE Expert - harshvardhan1gour/harshvardhan-gour-bugs
GitHub监控消息提醒!!!
更新了:RCE
描述:Execute commands across Windows systems using multiple RCE methods
URL:https://github.com/KhaelK138/authfinder
标签:#RCE
更新了:RCE
描述:Execute commands across Windows systems using multiple RCE methods
URL:https://github.com/KhaelK138/authfinder
标签:#RCE
GitHub
GitHub - KhaelK138/authfinder: Execute commands across Windows systems using multiple RCE methods
Execute commands across Windows systems using multiple RCE methods - KhaelK138/authfinder
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Proof of Concept exploit for CVE-2026-XXXXX in OpenWrt luci-app-https-dns-proxy
URL:https://github.com/iwallplace/CVE-2026-XXXXX-OpenWrt-Exploit
标签:#CVE-2026
更新了:CVE-2026
描述:Proof of Concept exploit for CVE-2026-XXXXX in OpenWrt luci-app-https-dns-proxy
URL:https://github.com/iwallplace/CVE-2026-XXXXX-OpenWrt-Exploit
标签:#CVE-2026
GitHub
GitHub - iwallplace/CVE-2026-XXXXX-OpenWrt-Exploit: Proof of Concept exploit for CVE-2026-XXXXX in OpenWrt luci-app-https-dns-proxy
Proof of Concept exploit for CVE-2026-XXXXX in OpenWrt luci-app-https-dns-proxy - iwallplace/CVE-2026-XXXXX-OpenWrt-Exploit
GitHub监控消息提醒!!!
更新了:RCE
描述:Tool for inserting make4ht-generated HTML into the CanvasRCE using a local server + bookmarklet.
URL:https://github.com/brichwin/canvas-rce-html-uploader
标签:#RCE
更新了:RCE
描述:Tool for inserting make4ht-generated HTML into the CanvasRCE using a local server + bookmarklet.
URL:https://github.com/brichwin/canvas-rce-html-uploader
标签:#RCE
GitHub
GitHub - brichwin/canvas-rce-html-uploader: Tool for inserting make4ht-generated HTML into the CanvasRCE using a local server +…
Tool for inserting make4ht-generated HTML into the CanvasRCE using a local server + bookmarklet. - brichwin/canvas-rce-html-uploader
GitHub监控消息提醒!!!
更新了:内网渗透
描述:FlyWheel is an intranet penetration aid developed based on Rust FlyWheel是一个基于Rust开发的内网渗透辅助工具
URL:https://github.com/BlkSword/IntraSweep
标签:#内网渗透
更新了:内网渗透
描述:FlyWheel is an intranet penetration aid developed based on Rust FlyWheel是一个基于Rust开发的内网渗透辅助工具
URL:https://github.com/BlkSword/IntraSweep
标签:#内网渗透
GitHub
GitHub - BlkSword/IntraSweep: IntraSweep is an intranet penetration aid developed based on Rust IntraSweep是一个基于Rust开发的内网渗透辅助工具
IntraSweep is an intranet penetration aid developed based on Rust IntraSweep是一个基于Rust开发的内网渗透辅助工具 - BlkSword/IntraSweep
GitHub监控消息提醒!!!
更新了:RCE
描述:Rynkowa Cena Energii (RCE) for HAos - API v2 ranking setup
URL:https://github.com/Tommyleesue/RCE-PSE-tommyleesue
标签:#RCE
更新了:RCE
描述:Rynkowa Cena Energii (RCE) for HAos - API v2 ranking setup
URL:https://github.com/Tommyleesue/RCE-PSE-tommyleesue
标签:#RCE
GitHub
GitHub - Tommyleesue/RCE-PSE-tommyleesue: Rynkowa Cena Energii (RCE) for HAos - API v2 ranking setup
Rynkowa Cena Energii (RCE) for HAos - API v2 ranking setup - Tommyleesue/RCE-PSE-tommyleesue
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit
URL:https://github.com/sastraadiwiguna-purpleeliteteaming/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit
标签:#CVE-2026
更新了:CVE-2026
描述:SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit
URL:https://github.com/sastraadiwiguna-purpleeliteteaming/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit
标签:#CVE-2026
GitHub
GitHub - sastraadiwiguna-purpleeliteteaming/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit: SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic…
SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit. Contribute to sastraadiwiguna-purpleeliteteaming/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Proof of Concept for CVE-2026-23745: Arbitrary File Overwrite vulnerability in node-tar (versions < 7.5.3).
URL:https://github.com/Jvr2022/CVE-2026-23745
标签:#CVE-2026
更新了:CVE-2026
描述:Proof of Concept for CVE-2026-23745: Arbitrary File Overwrite vulnerability in node-tar (versions < 7.5.3).
URL:https://github.com/Jvr2022/CVE-2026-23745
标签:#CVE-2026
GitHub
GitHub - Jvr2022/CVE-2026-23745: Proof of Concept for CVE-2026-23745: Arbitrary File Overwrite vulnerability in node-tar (versions…
Proof of Concept for CVE-2026-23745: Arbitrary File Overwrite vulnerability in node-tar (versions < 7.5.3). - Jvr2022/CVE-2026-23745
GitHub监控消息提醒!!!
更新了:护网
描述:CdnScan - 红队渗透专用工具:批量高速识别网站背后CDN类型,智能探测并突破真实源站IP。支持Cloudflare、Akamai、阿里云、腾讯云、Fastly等多种防护绕过,适用于红蓝对抗、资产侦察与攻防演练。
URL:https://github.com/Sirius0079/CdnScan
标签:#护网
更新了:护网
描述:CdnScan - 红队渗透专用工具:批量高速识别网站背后CDN类型,智能探测并突破真实源站IP。支持Cloudflare、Akamai、阿里云、腾讯云、Fastly等多种防护绕过,适用于红蓝对抗、资产侦察与攻防演练。
URL:https://github.com/Sirius0079/CdnScan
标签:#护网
GitHub
GitHub - Sirius0079/CdnScan: CdnScan - 红队渗透专用工具:批量高速识别网站背后CDN类型,智能探测并突破真实源站IP。支持Cloudflare、Akamai、阿里云、腾讯云、Fastly等多种防护绕过,适用于红蓝对抗、资产侦察与攻防演练。
CdnScan - 红队渗透专用工具:批量高速识别网站背后CDN类型,智能探测并突破真实源站IP。支持Cloudflare、Akamai、阿里云、腾讯云、Fastly等多种防护绕过,适用于红蓝对抗、资产侦察与攻防演练。 - Sirius0079/CdnScan
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/BGx-11/VectorFuzz
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/BGx-11/VectorFuzz
标签:#RCE
GitHub
GitHub - BGx-11/VectorFuzz: VectorFuzz is a modern, GUI-based web vulnerability scanner and fuzzer built with Python. It features…
VectorFuzz is a modern, GUI-based web vulnerability scanner and fuzzer built with Python. It features multi-vector detection (SQLi, XSS, LFI, RCE), WAF evasion, multi-threaded crawling, and automat...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-23550 - Modular DS WordPress Plugin **Unauthenticated Admin Access**
URL:https://github.com/TheTorjanCaptain/CVE-2026-23550-PoC
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-23550 - Modular DS WordPress Plugin **Unauthenticated Admin Access**
URL:https://github.com/TheTorjanCaptain/CVE-2026-23550-PoC
标签:#CVE-2026
GitHub
GitHub - TheTorjanCaptain/CVE-2026-23550-PoC: CVE-2026-23550 - Modular DS WordPress Plugin **Unauthenticated Admin Access**
CVE-2026-23550 - Modular DS WordPress Plugin **Unauthenticated Admin Access** - TheTorjanCaptain/CVE-2026-23550-PoC
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE engine for VBase code editor
URL:https://github.com/SillyCatto/vbase-rce
标签:#RCE
更新了:RCE
描述:RCE engine for VBase code editor
URL:https://github.com/SillyCatto/vbase-rce
标签:#RCE
GitHub
GitHub - SillyCatto/vbase-rce: RCE engine for VBase code editor
RCE engine for VBase code editor. Contribute to SillyCatto/vbase-rce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-0227 Advanced Scanner
URL:https://github.com/CkAbhijit/CVE-2026-0227-Advanced-Scanner
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-0227 Advanced Scanner
URL:https://github.com/CkAbhijit/CVE-2026-0227-Advanced-Scanner
标签:#CVE-2026
GitHub
GitHub - CkAbhijit/CVE-2026-0227-Advanced-Scanner: CVE-2026-0227 Advanced Scanner
CVE-2026-0227 Advanced Scanner. Contribute to CkAbhijit/CVE-2026-0227-Advanced-Scanner development by creating an account on GitHub.