GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-22794
URL:https://github.com/Ashwesker/Ashwesker-CVE-2026-22794
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-22794
URL:https://github.com/Ashwesker/Ashwesker-CVE-2026-22794
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Snow Monkey Forms <= 12.0.3 - Unauthenticated Arbitrary File Deletion via Path Traversal (CVE-2026-1056)
URL:https://github.com/ch4r0nn/CVE-2026-1056-POC
标签:#CVE-2026
更新了:CVE-2026
描述:Snow Monkey Forms <= 12.0.3 - Unauthenticated Arbitrary File Deletion via Path Traversal (CVE-2026-1056)
URL:https://github.com/ch4r0nn/CVE-2026-1056-POC
标签:#CVE-2026
GitHub
GitHub - ch4r0nn/CVE-2026-1056-POC: Snow Monkey Forms <= 12.0.3 - Unauthenticated Arbitrary File Deletion via Path Traversal (CVE…
Snow Monkey Forms <= 12.0.3 - Unauthenticated Arbitrary File Deletion via Path Traversal (CVE-2026-1056) - ch4r0nn/CVE-2026-1056-POC
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2026-24061 Telnet RCE Exploit For Linux MacOS Windows
URL:https://github.com/0x7556/CVE-2026-24061
标签:#RCE
更新了:RCE
描述:CVE-2026-24061 Telnet RCE Exploit For Linux MacOS Windows
URL:https://github.com/0x7556/CVE-2026-24061
标签:#RCE
GitHub
GitHub - 0x7556/CVE-2026-24061: CVE-2026-24061 Telnet RCE Exploit For Linux MacOS Windows
CVE-2026-24061 Telnet RCE Exploit For Linux MacOS Windows - 0x7556/CVE-2026-24061
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI-powered Cybersecurity Red Team Tool
URL:https://github.com/mUchiha26/Sharingan_101
标签:#Red Team
更新了:Red Team
描述:AI-powered Cybersecurity Red Team Tool
URL:https://github.com/mUchiha26/Sharingan_101
标签:#Red Team
GitHub
GitHub - mUchiha26/Sharingan_101: AI-powered Cybersecurity Red Team Tool
AI-powered Cybersecurity Red Team Tool. Contribute to mUchiha26/Sharingan_101 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-1470
URL:https://github.com/Ashwesker/Ashwesker-CVE-2026-1470
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-1470
URL:https://github.com/Ashwesker/Ashwesker-CVE-2026-1470
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:渗透测试
描述:在kimi code cli的基础上修改得来,用于进行渗透测试的cli变种。
URL:https://github.com/Wyl-cmd/KXNS-CLI
标签:#渗透测试
更新了:渗透测试
描述:在kimi code cli的基础上修改得来,用于进行渗透测试的cli变种。
URL:https://github.com/Wyl-cmd/KXNS-CLI
标签:#渗透测试
GitHub
Wyl-cmd/KXNS-CLI
在kimi code cli的基础上修改得来,用于进行渗透测试的cli变种。. Contribute to Wyl-cmd/KXNS-CLI development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Advanced heuristic anti-malware for FiveM. Detects and neutralizes Blum Panel, Cipher and undocumented RCE exploits. Enterprise grade infrastructure defense.
URL:https://github.com/gabjeksuper/Fivem-Anti-Backdoor
标签:#RCE
更新了:RCE
描述:Advanced heuristic anti-malware for FiveM. Detects and neutralizes Blum Panel, Cipher and undocumented RCE exploits. Enterprise grade infrastructure defense.
URL:https://github.com/gabjeksuper/Fivem-Anti-Backdoor
标签:#RCE
GitHub
GitHub - gabjeksuper/Fivem-Anti-Backdoor: Advanced heuristic anti backdoors for FiveM. Detects and neutralizes Blum Panel, Cipher…
Advanced heuristic anti backdoors for FiveM. Detects and neutralizes Blum Panel, Cipher and undocumented RCE exploits. Now featuring a surgical Auto-Cleaner, Auto-Manifest Fix, secure Discord Scann...
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24061 - GNU InetUtils Telnetd Remote Authentication Bypass
URL:https://github.com/IncursioHack/CVE-2026-21509-PoC
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24061 - GNU InetUtils Telnetd Remote Authentication Bypass
URL:https://github.com/IncursioHack/CVE-2026-21509-PoC
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Checks for CVE-2026-24061 Telnetd exploit
URL:https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester
标签:#CVE-2026
更新了:CVE-2026
描述:Checks for CVE-2026-24061 Telnetd exploit
URL:https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester
标签:#CVE-2026
GitHub
GitHub - dotelpenguin/telnetd_CVE-2026-24061_tester: Checks for CVE-2026-24061 Telnetd exploit
Checks for CVE-2026-24061 Telnetd exploit. Contribute to dotelpenguin/telnetd_CVE-2026-24061_tester development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:命令注入
描述:CVE-2025-55182(命令执行、反弹shell、注入CMD内存马)
URL:https://github.com/BBD-YZZ/CVE-2025-55182
标签:#命令注入
更新了:命令注入
描述:CVE-2025-55182(命令执行、反弹shell、注入CMD内存马)
URL:https://github.com/BBD-YZZ/CVE-2025-55182
标签:#命令注入
GitHub
GitHub - BBD-YZZ/CVE-2025-55182: CVE-2025-55182(命令执行、反弹shell、注入内存马)
CVE-2025-55182(命令执行、反弹shell、注入内存马). Contribute to BBD-YZZ/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:内网横向
描述:本项目集成了全网优秀的攻防武器工具项目,包含自动化利用,子域名、目录扫描、端口扫描等信息收集工具,各大中间件、cms、OA漏洞利用工具,爆破工具、内网横向、免杀、社工钓鱼以及应急响应、甲方安全资料等其他安全攻防资料。
URL:https://github.com/wangbin777/data-collection-service
标签:#内网横向
更新了:内网横向
描述:本项目集成了全网优秀的攻防武器工具项目,包含自动化利用,子域名、目录扫描、端口扫描等信息收集工具,各大中间件、cms、OA漏洞利用工具,爆破工具、内网横向、免杀、社工钓鱼以及应急响应、甲方安全资料等其他安全攻防资料。
URL:https://github.com/wangbin777/data-collection-service
标签:#内网横向
GitHub
GitHub - wangbin777/data-collection-service: 面向物联网与工业数据采集场景的高性能采集服务,支持 Modbus / OPC UA / IEC104 / MQTT 等协议...基于 Spring Boot 3.x…
面向物联网与工业数据采集场景的高性能采集服务,支持 Modbus / OPC UA / IEC104 / MQTT 等协议...基于 Spring Boot 3.x + Java 17 构建,内置 配置下发、采集调度、数据处理、缓存、纵向转横向聚合、事件/告警、云平台上报以及监控观测 的完整链路。 本项目可直接用于 工业现场私有化部署,也可作为 工业物联网采集网关底座 进行二次开发。 目前...
GitHub监控消息提醒!!!
更新了:绕过
描述:CthulhuJs 是一个强大的浏览器指纹混淆与伪装框架。它通过 Hook 浏览器底层 API,对各类硬件和软件指纹进行定制化修改或随机化处理,旨在保护用户隐私、绕过反爬虫检测或用于自动化测试环境。
URL:https://github.com/shawn-li-zh/CthulhuJs
标签:#绕过
更新了:绕过
描述:CthulhuJs 是一个强大的浏览器指纹混淆与伪装框架。它通过 Hook 浏览器底层 API,对各类硬件和软件指纹进行定制化修改或随机化处理,旨在保护用户隐私、绕过反爬虫检测或用于自动化测试环境。
URL:https://github.com/shawn-li-zh/CthulhuJs
标签:#绕过
GitHub
GitHub - shawn-li-zh/CthulhuJs: CthulhuJs 是一个强大的浏览器指纹混淆与伪装框架。它通过 Hook 浏览器底层 API,对各类硬件和软件指纹进行定制化修改或随机化处理,旨在保护用户隐私、绕过反爬虫检测或用于自动化测试环境。
CthulhuJs 是一个强大的浏览器指纹混淆与伪装框架。它通过 Hook 浏览器底层 API,对各类硬件和软件指纹进行定制化修改或随机化处理,旨在保护用户隐私、绕过反爬虫检测或用于自动化测试环境。 - shawn-li-zh/CthulhuJs
GitHub监控消息提醒!!!
更新了:RCE
描述:Python-based firewall simulation blocking a Tomcat WAR/JSP RCE attack (Telstra Cyber Virtual Experience – Forage)
URL:https://github.com/sec-a-ops/telstra-cyber-firewall-simulation
标签:#RCE
更新了:RCE
描述:Python-based firewall simulation blocking a Tomcat WAR/JSP RCE attack (Telstra Cyber Virtual Experience – Forage)
URL:https://github.com/sec-a-ops/telstra-cyber-firewall-simulation
标签:#RCE
GitHub
GitHub - sec-a-ops/telstra-cyber-firewall-simulation: Python-based firewall simulation blocking a Tomcat WAR/JSP RCE attack (Telstra…
Python-based firewall simulation blocking a Tomcat WAR/JSP RCE attack (Telstra Cyber Virtual Experience – Forage) - sec-a-ops/telstra-cyber-firewall-simulation
GitHub监控消息提醒!!!
更新了:免杀
描述:AI一键免杀WebShell,包含金刚狼、哥斯拉、冰蝎、菜刀等
URL:https://github.com/0x7556/webshell
标签:#免杀
更新了:免杀
描述:AI一键免杀WebShell,包含金刚狼、哥斯拉、冰蝎、菜刀等
URL:https://github.com/0x7556/webshell
标签:#免杀
GitHub
GitHub - 0x7556/webshell: AI一键免杀WebShell,包含金刚狼、哥斯拉、冰蝎、菜刀等
AI一键免杀WebShell,包含金刚狼、哥斯拉、冰蝎、菜刀等. Contribute to 0x7556/webshell development by creating an account on GitHub.