🚨 GitHub 监控消息提醒
🚨 发现关键词: #钓鱼 #邮件
📦 项目名称: -
👤 项目作者: wcjc319
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 13:38:50
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #钓鱼 #邮件
📦 项目名称: -
👤 项目作者: wcjc319
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 13:38:50
📝 项目描述:
自研提示词模板,用户自选api,输入api-url以及api-key就能够生成钓鱼邮件🔗 点击访问项目地址
GitHub
GitHub - wcjc319/-: 自研提示词模板,用户自选api,输入api-url以及api-key就能够生成钓鱼邮件
自研提示词模板,用户自选api,输入api-url以及api-key就能够生成钓鱼邮件. Contribute to wcjc319/- development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-39808
👤 项目作者: samu-delucas
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 14:47:25
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-39808
👤 项目作者: samu-delucas
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 14:47:25
📝 项目描述:
PoC for Unauthenticated RCE in FortiSandbox via CVE-2026-39808🔗 点击访问项目地址
GitHub
GitHub - samu-delucas/CVE-2026-39808: PoC for Unauthenticated RCE in FortiSandbox via CVE-2026-39808
PoC for Unauthenticated RCE in FortiSandbox via CVE-2026-39808 - samu-delucas/CVE-2026-39808
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Extension
📦 项目名称: burp-extensions-montoya-api
👤 项目作者: PortSwigger
🛠 开发语言: Java
⭐ Star数量: 199 | 🍴 Fork数量: 12
📅 更新时间: 2026-04-15 15:01:12
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Extension
📦 项目名称: burp-extensions-montoya-api
👤 项目作者: PortSwigger
🛠 开发语言: Java
⭐ Star数量: 199 | 🍴 Fork数量: 12
📅 更新时间: 2026-04-15 15:01:12
📝 项目描述:
Burp Extensions Api🔗 点击访问项目地址
GitHub
GitHub - PortSwigger/burp-extensions-montoya-api: Burp Extensions Api
Burp Extensions Api. Contribute to PortSwigger/burp-extensions-montoya-api development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #NTLM Relay
📦 项目名称: ntlm_audit.py
👤 项目作者: 0xnear-13
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 14:19:41
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #NTLM Relay
📦 项目名称: ntlm_audit.py
👤 项目作者: 0xnear-13
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 14:19:41
📝 项目描述:
Analyze NTLM attack surface and identify relay, poisoning, and coercion vectors in AD.🔗 点击访问项目地址
GitHub
GitHub - 0xnear-13/ntlm_audit.py: Analyze NTLM attack surface and identify relay, poisoning, and coercion vectors in AD.
Analyze NTLM attack surface and identify relay, poisoning, and coercion vectors in AD. - 0xnear-13/ntlm_audit.py
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: cve_2026_34621_advanced
👤 项目作者: NULL200OK
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 15:47:27
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: cve_2026_34621_advanced
👤 项目作者: NULL200OK
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 15:47:27
📝 项目描述:
A sophisticated, cross-platform exploit generator for **CVE-2026-34621** – a critical prototype pollution vulnerability in Adobe Acrobat and Reader that leads to sandbox escape and arbitrary code execution on Windows and macOS.🔗 点击访问项目地址
GitHub
GitHub - NULL200OK/cve_2026_34621_advanced: A sophisticated, cross-platform exploit generator for **CVE-2026-34621** – a critical…
A sophisticated, cross-platform exploit generator for **CVE-2026-34621** – a critical prototype pollution vulnerability in Adobe Acrobat and Reader that leads to sandbox escape and arbitrary code e...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: cve-2026-20127
👤 项目作者: gigachadusers
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 16:40:53
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: cve-2026-20127
👤 项目作者: gigachadusers
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 16:40:53
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - gigachadusers/cve-2026-20127
Contribute to gigachadusers/cve-2026-20127 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV #Filter
📦 项目名称: Velocmd
👤 项目作者: YashvardhanG
🛠 开发语言: Rust
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 17:00:51
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV #Filter
📦 项目名称: Velocmd
👤 项目作者: YashvardhanG
🛠 开发语言: Rust
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 17:00:51
📝 项目描述:
Velocmd is a high-performance system launcher and file indexer designed to bring a unified, instant command palette to Windows. Powered by a Rust backend and a lightweight Tauri frontend, it bypasses the sluggish native Windows search by utilizing an optimized, in-memory indexing strategy.🔗 点击访问项目地址
GitHub
GitHub - YashvardhanG/Velocmd: Velocmd is a high-performance system launcher and file indexer designed to bring a unified, instant…
Velocmd is a high-performance system launcher and file indexer designed to bring a unified, instant command palette to Windows. Powered by a Rust backend and a lightweight Tauri frontend, it bypass...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #威胁情报
📦 项目名称: NetflowSight
👤 项目作者: Mal-Suen
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 17:04:11
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #威胁情报
📦 项目名称: NetflowSight
👤 项目作者: Mal-Suen
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 17:04:11
📝 项目描述:
High-performance PCAP analysis with zero false-positives, smart caching, and structured reporting.高性能 PCAP 分析平台,零误报威胁检测,智能情报缓存,结构化报告输出。🔗 点击访问项目地址
GitHub
GitHub - Mal-Suen/NetflowSight: High-performance PCAP analysis with zero false-positives, smart caching, and structured reporting.高性能…
High-performance PCAP analysis with zero false-positives, smart caching, and structured reporting.高性能 PCAP 分析平台,零误报威胁检测,智能情报缓存,结构化报告输出。 - Mal-Suen/NetflowSight
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Attack
📦 项目名称: markdown-it-external-anchor
👤 项目作者: binyamin
🛠 开发语言: JavaScript
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 18:00:34
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Attack
📦 项目名称: markdown-it-external-anchor
👤 项目作者: binyamin
🛠 开发语言: JavaScript
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 18:00:34
📝 项目描述:
Mark external, absolute links with necessary attributes🔗 点击访问项目地址
GitHub
GitHub - binyamin/markdown-it-external-anchor: Mark external, absolute links with necessary attributes
Mark external, absolute links with necessary attributes - binyamin/markdown-it-external-anchor
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Framework #Control
📦 项目名称: c2pa-sample-app
👤 项目作者: mpgopala
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 18:02:56
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Framework #Control
📦 项目名称: c2pa-sample-app
👤 项目作者: mpgopala
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 18:02:56
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - mpgopala/c2pa-sample-app
Contribute to mpgopala/c2pa-sample-app development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RCE #Remote
📦 项目名称: binsmasher
👤 项目作者: VABISMO
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 18:59:55
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RCE #Remote
📦 项目名称: binsmasher
👤 项目作者: VABISMO
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 18:59:55
📝 项目描述:
Binary auditing and automatic RCE generator🔗 点击访问项目地址
GitHub
GitHub - VABISMO/binsmasher: Binary auditing and automatic RCE generator
Binary auditing and automatic RCE generator. Contribute to VABISMO/binsmasher development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #WAF
📦 项目名称: BlackBounty
👤 项目作者: jakeloai
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 19:01:18
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #WAF
📦 项目名称: BlackBounty
👤 项目作者: jakeloai
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 19:01:18
📝 项目描述:
BlackBounty is a high-performance, automated reconnaissance and vulnerability scanning pipeline designed for large-scale bug hunting. It leverages a dynamic proxy-rotation system to bypass WAFs and IP-based rate limiting.🔗 点击访问项目地址
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: websentinel
👤 项目作者: vamanparmar
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 18:41:02
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: websentinel
👤 项目作者: vamanparmar
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 18:41:02
📝 项目描述:
🛡 Advanced Web Vulnerability Scanner for Bug Bounty & Penetration Testing. 23 modules: XSS, SQLi, SSRF, Command Injection, JWT, CORS, Subdomain Takeover, GraphQL & more. Single file, one dependency.🔗 点击访问项目地址
GitHub
GitHub - vamanparmar/websentinel: 🛡 Advanced Web Vulnerability Scanner for Bug Bounty & Penetration Testing. 23 modules: XSS, SQLi…
🛡 Advanced Web Vulnerability Scanner for Bug Bounty & Penetration Testing. 23 modules: XSS, SQLi, SSRF, Command Injection, JWT, CORS, Subdomain Takeover, GraphQL & more. Single file...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: csrf-demo
👤 项目作者: amit637186
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 19:02:30
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: csrf-demo
👤 项目作者: amit637186
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 19:02:30
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - amit637186/csrf-demo
Contribute to amit637186/csrf-demo development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Attack
📦 项目名称: Sentinel-AI
👤 项目作者: Harutt0
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 19:00:08
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Attack
📦 项目名称: Sentinel-AI
👤 项目作者: Harutt0
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 19:00:08
📝 项目描述:
A proactive security tool that uses the Isolation Forest algorithm to detect malicious web traffic. By analyzing HTTP logs for unusual URL lengths, status codes, and SQLi signatures, it isolates threats like XSS and Path Traversal from normal traffic with high-speed regex parsing and visualization.🔗 点击访问项目地址
GitHub
GitHub - Harutt0/Sentinel-AI: A proactive security tool that uses the Isolation Forest algorithm to detect malicious web traffic.…
A proactive security tool that uses the Isolation Forest algorithm to detect malicious web traffic. By analyzing HTTP logs for unusual URL lengths, status codes, and SQLi signatures, it isolates th...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: go-dbmigrate
👤 项目作者: moisei-dev
🛠 开发语言: Go
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 19:44:39
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: go-dbmigrate
👤 项目作者: moisei-dev
🛠 开发语言: Go
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 19:44:39
📝 项目描述:
Fork of jfrog/go-dbmigrate with pgx/v5 upgrade (CVE-2026-32286)🔗 点击访问项目地址
GitHub
GitHub - moisei-dev/go-dbmigrate: Fork of jfrog/go-dbmigrate with pgx/v5 upgrade (CVE-2026-32286)
Fork of jfrog/go-dbmigrate with pgx/v5 upgrade (CVE-2026-32286) - moisei-dev/go-dbmigrate
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: etsy-mcp
👤 项目作者: mofiaboss
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 19:56:30
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: etsy-mcp
👤 项目作者: mofiaboss
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 19:56:30
📝 项目描述:
Professional-grade Etsy MCP server — 104 pure-primitive tools across 13 categories wrapping Etsy's Open API v3. Capability layer, not reasoning layer. Python 3.13 + uv workspace, full OAuth 2.0 PKCE, F3 secret redaction, SSRF-safe HTTP, 428 unit tests.🔗 点击访问项目地址
GitHub
GitHub - mofiaboss/etsy-mcp: Professional-grade Etsy MCP server — 104 pure-primitive tools across 13 categories wrapping Etsy's…
Professional-grade Etsy MCP server — 104 pure-primitive tools across 13 categories wrapping Etsy's Open API v3. Capability layer, not reasoning layer. Python 3.13 + uv workspace, full OAuth...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Scanner
📦 项目名称: cyberscan
👤 项目作者: kushharsh05
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 20:01:23
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Scanner
📦 项目名称: cyberscan
👤 项目作者: kushharsh05
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 20:01:23
📝 项目描述:
A modular, multi-threaded web vulnerability scanner built with Python and Streamlit for detecting SQL Injection, XSS, and security misconfigurations.🔗 点击访问项目地址
GitHub
GitHub - kushharsh05/cyberscan: A modular, multi-threaded web vulnerability scanner built with Python and Streamlit for detecting…
A modular, multi-threaded web vulnerability scanner built with Python and Streamlit for detecting SQL Injection, XSS, and security misconfigurations. - kushharsh05/cyberscan
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server
📦 项目名称: Malware-Traffic-Analysis-Incident-Response
👤 项目作者: shraddhhaapokharell
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 20:01:55
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server
📦 项目名称: Malware-Traffic-Analysis-Incident-Response
👤 项目作者: shraddhhaapokharell
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 20:01:55
📝 项目描述:
Wireshark analysis of real malware PCAP identifying C2 server and encoded beaconing traffic🔗 点击访问项目地址
GitHub
GitHub - shraddhhaapokharell/Malware-Traffic-Analysis-Incident-Response: Wireshark analysis of real malware PCAP identifying C2…
Wireshark analysis of real malware PCAP identifying C2 server and encoded beaconing traffic - shraddhhaapokharell/Malware-Traffic-Analysis-Incident-Response
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-35031
👤 项目作者: keraattin
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 20:57:53
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-35031
👤 项目作者: keraattin
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 20:57:53
📝 项目描述:
Critical path traversal to RCE vulnerability in Jellyfin Media Server (CVSS 9.9). Includes proof-of-concept exploit, technical analysis, and detection tools.🔗 点击访问项目地址
GitHub
GitHub - keraattin/CVE-2026-35031: Critical path traversal to RCE vulnerability in Jellyfin Media Server (CVSS 9.9). Includes proof…
Critical path traversal to RCE vulnerability in Jellyfin Media Server (CVSS 9.9). Includes proof-of-concept exploit, technical analysis, and detection tools. - keraattin/CVE-2026-35031