🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #Patch
📦 项目名称: Bypassing-SSL-Pinning-in-Flutter-Applications
👤 项目作者: sara81a
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 18:00:56
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #Patch
📦 项目名称: Bypassing-SSL-Pinning-in-Flutter-Applications
👤 项目作者: sara81a
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 18:00:56
📝 项目描述:
Bypassing SSL Pinning🔗 点击访问项目地址
GitHub
GitHub - sara81a/Bypassing-SSL-Pinning-in-Flutter-Applications
Contribute to sara81a/Bypassing-SSL-Pinning-in-Flutter-Applications development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: soushen-hunter
👤 项目作者: abhinav-bharti-max
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 2
📅 更新时间: 2026-03-23 18:02:08
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: soushen-hunter
👤 项目作者: abhinav-bharti-max
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 2
📅 更新时间: 2026-03-23 18:02:08
📝 项目描述:
Enable high-performance Bing and Google searches with deep webpage data extraction and no API fees using an async, anti-detection OpenClaw skill.🔗 点击访问项目地址
GitHub
GitHub - abhinav-bharti-max/soushen-hunter: Enable high-performance Bing and Google searches with deep webpage data extraction…
Enable high-performance Bing and Google searches with deep webpage data extraction and no API fees using an async, anti-detection OpenClaw skill. - abhinav-bharti-max/soushen-hunter
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-23744
👤 项目作者: FrenzisRed
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 18:45:20
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-23744
👤 项目作者: FrenzisRed
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 18:45:20
📝 项目描述:
CVE-2026-23744 - MCPJam inspector Remote-Code-Execution: Proof Of Concept (POC🔗 点击访问项目地址
GitHub
GitHub - FrenzisRed/CVE-2026-23744: CVE-2026-23744 - MCPJam inspector Remote-Code-Execution: Proof Of Concept (POC
CVE-2026-23744 - MCPJam inspector Remote-Code-Execution: Proof Of Concept (POC - FrenzisRed/CVE-2026-23744
🚨 GitHub 监控消息提醒
🚨 发现关键词: #渗透 #测试
📦 项目名称: opensec
👤 项目作者: 2365203723
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 18:38:11
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #渗透 #测试
📦 项目名称: opensec
👤 项目作者: 2365203723
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 18:38:11
📝 项目描述:
AI驱动渗透测试平台🔗 点击访问项目地址
GitHub
2365203723/opensec
AI驱动渗透测试平台. Contribute to 2365203723/opensec development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #注入 #内存
📦 项目名称: jellyfin-inject-danmu
👤 项目作者: ehehela
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 18:19:08
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #注入 #内存
📦 项目名称: jellyfin-inject-danmu
👤 项目作者: ehehela
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 18:19:08
📝 项目描述:
Jellyfin 弹幕注入脚本 | Danmaku injector for Jellyfin HTML5 player🔗 点击访问项目地址
GitHub
GitHub - ehehela/jellyfin-inject-danmu: Jellyfin 弹幕注入脚本 | Danmaku injector for Jellyfin HTML5 player
Jellyfin 弹幕注入脚本 | Danmaku injector for Jellyfin HTML5 player - ehehela/jellyfin-inject-danmu
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: SSRFTV
👤 项目作者: Geevar12
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 19:01:57
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: SSRFTV
👤 项目作者: Geevar12
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 19:01:57
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - Geevar12/SSRFTV
Contribute to Geevar12/SSRFTV development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Credential Dumping
📦 项目名称: Splunk-Threat-Hunting-Finding-Evil-at-Scale
👤 项目作者: jeremyt12345
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 18:24:17
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Credential Dumping
📦 项目名称: Splunk-Threat-Hunting-Finding-Evil-at-Scale
👤 项目作者: jeremyt12345
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 18:24:17
📝 项目描述:
Hunted through 500,000+ events in Splunk across a compromised network. Traced a notepad-to-PowerShell attack chain, confirmed a DCSync attack, detected lsass credential dumping, and built alerts filtering UNKNOWN memory regions to identify shellcode while eliminating false positives.🔗 点击访问项目地址
GitHub
GitHub - jeremyt12345/Splunk-Threat-Hunting-Finding-Evil-at-Scale: Hunted through 500,000+ events in Splunk across a compromised…
Hunted through 500,000+ events in Splunk across a compromised network. Traced a notepad-to-PowerShell attack chain, confirmed a DCSync attack, detected lsass credential dumping, and built alerts fi...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Scanner
📦 项目名称: Xsscan
👤 项目作者: Auto-runs
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 20:01:14
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Scanner
📦 项目名称: Xsscan
👤 项目作者: Auto-runs
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 20:01:14
📝 项目描述:
next version of xscanner 🔗 点击访问项目地址
GitHub
GitHub - Auto-runs/Xsscan: next version of xscanner
next version of xscanner . Contribute to Auto-runs/Xsscan development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RedTeam #Ops
📦 项目名称: RedTeamC2
👤 项目作者: ctomassetti56
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 20:58:45
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RedTeam #Ops
📦 项目名称: RedTeamC2
👤 项目作者: ctomassetti56
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 20:58:45
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - ctomassetti56/RedTeamC2
Contribute to ctomassetti56/RedTeamC2 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Scanner
📦 项目名称: -SHIELD-X-Advanced-Ops-v4.0
👤 项目作者: uneebabbasi0
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 21:01:24
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Scanner
📦 项目名称: -SHIELD-X-Advanced-Ops-v4.0
👤 项目作者: uneebabbasi0
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 21:01:24
📝 项目描述:
SHIELD-X Advanced Ops v4.0 🛡️ Ultimate multi-threaded Python suite for Red Teaming. 🚀 🔹 Web Cloning: 1:1 mirroring with Ngrok for global access. 🔹 Live Sniffer: Real-time packet inspection (Scapy). 🔹 Auto-Scanner: SQLi/XSS vulnerability detection. 🔹 C&C Hub: Flask-based dashboard for live logs. Professional GUI. High Speed. Zero Lag. ⚡🔗 点击访问项目地址
GitHub
GitHub - uneebabbasi0/-SHIELD-X-Advanced-Ops-v4.0: SHIELD-X Advanced Ops v4.0 🛡️ Ultimate multi-threaded Python suite for Red Teaming.…
SHIELD-X Advanced Ops v4.0 🛡️ Ultimate multi-threaded Python suite for Red Teaming. 🚀 🔹 Web Cloning: 1:1 mirroring with Ngrok for global access. 🔹 Live Sniffer: Real-time packet inspection (Scapy)....
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Extension
📦 项目名称: JWTLens
👤 项目作者: Orbadiahright862
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 20:48:53
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Extension
📦 项目名称: JWTLens
👤 项目作者: Orbadiahright862
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 20:48:53
📝 项目描述:
Detect and test JSON Web Tokens for security flaws with automated checks in Burp Suite extensions, including token analysis and active exploitation.🔗 点击访问项目地址
GitHub
GitHub - Orbadiahright862/JWTLens: Detect and test JSON Web Tokens for security flaws with automated checks in Burp Suite extensions…
Detect and test JSON Web Tokens for security flaws with automated checks in Burp Suite extensions, including token analysis and active exploitation. - Orbadiahright862/JWTLens
🚨 GitHub 监控消息提醒
🚨 发现关键词: #钓鱼 #系统 #二维码
📦 项目名称: oxcPutiyha
👤 项目作者: laowang111101
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 20:23:14
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #钓鱼 #系统 #二维码
📦 项目名称: oxcPutiyha
👤 项目作者: laowang111101
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 20:23:14
📝 项目描述:
【Java计算机毕业设计分享】基于Java的钓鱼爱好者分享平台,MySQL Java开发 毕业设计 实战项目【附源码、文档报告、代码讲解】🔗 点击访问项目地址
GitHub
GitHub - laowang111101/oxcPutiyha: 【Java计算机毕业设计分享】基于Java的钓鱼爱好者分享平台,MySQL Java开发 毕业设计 实战项目【附源码、文档报告、代码讲解】
【Java计算机毕业设计分享】基于Java的钓鱼爱好者分享平台,MySQL Java开发 毕业设计 实战项目【附源码、文档报告、代码讲解】 - laowang111101/oxcPutiyha
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RedTeam #Tools
📦 项目名称: phantom-ethical-redteam
👤 项目作者: kmdn-ch
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 22:00:59
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RedTeam #Tools
📦 项目名称: phantom-ethical-redteam
👤 项目作者: kmdn-ch
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 22:00:59
📝 项目描述:
An autonomous agent that acts as a DEF CON-level Certified Ethical Hacker, using tools such as Nuclei, sqlmap, ffuf, Burp, ZAP, and the Social Engineering Toolkit (SET), (labs, CTFs, HackTheBox, TryHackMe, and bug bounties with a written scope).🔗 点击访问项目地址
GitHub
GitHub - kmdn-ch/phantom-ethical-redteam: An autonomous agent that acts as a DEF CON-level Certified Ethical Hacker, using tools…
An autonomous agent that acts as a DEF CON-level Certified Ethical Hacker, using tools such as Nuclei, sqlmap, ffuf, Burp, ZAP, and the Social Engineering Toolkit (SET), (labs, CTFs, HackTheBox, Tr...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV #Filter
📦 项目名称: GTM-Data-Engineering-Pipelines
👤 项目作者: Verdent06
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 22:01:10
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV #Filter
📦 项目名称: GTM-Data-Engineering-Pipelines
👤 项目作者: Verdent06
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 22:01:10
📝 项目描述:
A weekend sprint exploring how to bypass legacy data brokers (ZoomInfo/Apollo) by building custom API extraction pipelines for highly fragmented, analog industries.🔗 点击访问项目地址
GitHub
GitHub - Verdent06/GTM-Data-Engineering-Pipelines: A weekend sprint exploring how to bypass legacy data brokers (ZoomInfo/Apollo)…
A weekend sprint exploring how to bypass legacy data brokers (ZoomInfo/Apollo) by building custom API extraction pipelines for highly fragmented, analog industries. - Verdent06/GTM-Data-Engineering...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-3888
👤 项目作者: nomaisthere
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 22:23:43
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-3888
👤 项目作者: nomaisthere
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 22:23:43
📝 项目描述:
Linux LPE via snap-confine + systemd-tmpfiles, explained in depth🔗 点击访问项目地址
GitHub
GitHub - nomaisthere/CVE-2026-3888: Linux LPE via snap-confine + systemd-tmpfiles, explained in depth
Linux LPE via snap-confine + systemd-tmpfiles, explained in depth - nomaisthere/CVE-2026-3888
🚨 GitHub 监控消息提醒
🚨 发现关键词: #EXP #Exploit
📦 项目名称: technicolor-exploit
👤 项目作者: benwaterson
🛠 开发语言: Answer Set Programming
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 22:59:46
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #EXP #Exploit
📦 项目名称: technicolor-exploit
👤 项目作者: benwaterson
🛠 开发语言: Answer Set Programming
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 22:59:46
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - benwaterson/technicolor-exploit
Contribute to benwaterson/technicolor-exploit development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: CVE-2026-33693
👤 项目作者: SnailSploit
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 23:00:08
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: CVE-2026-33693
👤 项目作者: SnailSploit
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 23:00:08
📝 项目描述:
CVE-2026-33693: SSRF via 0.0.0.0 Bypass in activitypub-federation-rust v4_is_invalid() (CVSS 6.5 Moderate)🔗 点击访问项目地址
GitHub
GitHub - SnailSploit/CVE-2026-33693: CVE-2026-33693: SSRF via 0.0.0.0 Bypass in activitypub-federation-rust v4_is_invalid() (CVSS…
CVE-2026-33693: SSRF via 0.0.0.0 Bypass in activitypub-federation-rust v4_is_invalid() (CVSS 6.5 Moderate) - SnailSploit/CVE-2026-33693
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: quanta-analytica-mns
👤 项目作者: mnshakoor
🛠 开发语言: HTML
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 22:42:31
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: quanta-analytica-mns
👤 项目作者: mnshakoor
🛠 开发语言: HTML
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 22:42:31
📝 项目描述:
Quanta Analytica, by M Nuri Shakoor Consulting, applies the Conflict Systems Research Framework (CSRF) to deliver data-driven risk, security, and resilience analysis. Anchored in ISO 31000 and INSSA, it blends systems thinking, conflict diagnostics, and adaptive strategies to empower smarter decisions.🔗 点击访问项目地址
GitHub
GitHub - mnshakoor/quanta-analytica-mns: Quanta Analytica, by M Nuri Shakoor Consulting, applies the Conflict Systems Research…
Quanta Analytica, by M Nuri Shakoor Consulting, applies the Conflict Systems Research Framework (CSRF) to deliver data-driven risk, security, and resilience analysis. Anchored in ISO 31000 and INSS...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Client #Command
📦 项目名称: c2L
👤 项目作者: Ahiya1
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 23:01:50
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Client #Command
📦 项目名称: c2L
👤 项目作者: Ahiya1
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 23:01:50
📝 项目描述:
c2L — AI systems that carry responsibility. Commercial automation for document-heavy workflows.🔗 点击访问项目地址
GitHub
GitHub - Ahiya1/c2L: c2L — AI systems that carry responsibility. Commercial automation for document-heavy workflows.
c2L — AI systems that carry responsibility. Commercial automation for document-heavy workflows. - Ahiya1/c2L
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Extension
📦 项目名称: HeaderPwnBurpEXT
👤 项目作者: ceramicskate0
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 22:49:50
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Extension
📦 项目名称: HeaderPwnBurpEXT
👤 项目作者: ceramicskate0
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-03-23 22:49:50
📝 项目描述:
HeaderPwn ported into a burp extension🔗 点击访问项目地址
GitHub
GitHub - ceramicskate0/HeaderPwnBurpEXT: HeaderPwn ported into a burp extension
HeaderPwn ported into a burp extension. Contribute to ceramicskate0/HeaderPwnBurpEXT development by creating an account on GitHub.