🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: ids-labs
👤 项目作者: netracyber
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 15:53:05
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: ids-labs
👤 项目作者: netracyber
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 15:53:05
📝 项目描述:
IDS Cybersecurity Training Labs - XSS, LFI, File Handling, SSRF, SQLi, and more🔗 点击访问项目地址
GitHub
GitHub - netracyber/ids-labs: IDS Cybersecurity Training Labs - XSS, LFI, File Handling, SSRF, SQLi, and more
IDS Cybersecurity Training Labs - XSS, LFI, File Handling, SSRF, SQLi, and more - netracyber/ids-labs
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: cybersec-lab-trainer
👤 项目作者: QuadDarv1ne
🛠 开发语言: TypeScript
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 15:52:11
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: cybersec-lab-trainer
👤 项目作者: QuadDarv1ne
🛠 开发语言: TypeScript
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 15:52:11
📝 项目描述:
🛡️ Интерактивный тренажёр по информационной безопасности — учебный проект для направления 09.03.04 Программная инженерия. 7 модулей: OWASP Top 10, SQL-инъекции, XSS, CSRF, аутентификация, безопасное кодирование, крипто-инструменты. Система квизов, достижения, глоссарий. Next.js 16 + React 19 + TypeScript + Tailwind CSS🔗 点击访问项目地址
GitHub
GitHub - QuadDarv1ne/cybersec-lab-trainer: 🛡️ Интерактивный тренажёр по информационной безопасности — учебный проект для направления…
🛡️ Интерактивный тренажёр по информационной безопасности — учебный проект для направления 09.03.04 Программная инженерия. 7 модулей: OWASP Top 10, SQL-инъекции, XSS, CSRF, аутентификация, безопасно...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: cpanel-forensics
👤 项目作者: ngksiva
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 16:39:14
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: cpanel-forensics
👤 项目作者: ngksiva
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 16:39:14
📝 项目描述:
Форензика после CVE-2026-41940 (cPanel/WHM) — bash-скрипт и чек-лист🔗 点击访问项目地址
GitHub
GitHub - ngksiva/cpanel-forensics: Форензика после CVE-2026-41940 (cPanel/WHM) — bash-скрипт и чек-лист
Форензика после CVE-2026-41940 (cPanel/WHM) — bash-скрипт и чек-лист - ngksiva/cpanel-forensics
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #Patch
📦 项目名称: VMware-Workstation-Pro-2026
👤 项目作者: HokageAwning
🛠 开发语言: HCL
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 17:00:48
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #Patch
📦 项目名称: VMware-Workstation-Pro-2026
👤 项目作者: HokageAwning
🛠 开发语言: HCL
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 17:00:48
📝 项目描述:
⭐️ VMware Workstation Pro 2026 | Virtual Machine Software | Setup Installer v17 | Keygen License Serial | Activation Bypass Mod | Full Version Latest Build | Pre-Activated Pro Download | Windows 10/11 PC | Get Desktop Virtualization | Advanced Hypervisor Tool ⭐️🔗 点击访问项目地址
GitHub
GitHub - HokageAwning/VMware-Workstation-Pro-2026: ⭐️ VMware Workstation Pro 2026 | Virtual Machine Software | Setup Installer…
⭐️ VMware Workstation Pro 2026 | Virtual Machine Software | Setup Installer v17 | Keygen License Serial | Activation Bypass Mod | Full Version Latest Build | Pre-Activated Pro Download | Windows 10...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server #Client #Implant #Command #Control
📦 项目名称: Centipede
👤 项目作者: ekomsSavior
🛠 开发语言: Go
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 17:02:46
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server #Client #Implant #Command #Control
📦 项目名称: Centipede
👤 项目作者: ekomsSavior
🛠 开发语言: Go
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 17:02:46
📝 项目描述:
Self-replicating Linux worm with multi-layer C2 coms🔗 点击访问项目地址
GitHub
GitHub - ekomsSavior/Centipede: Self-replicating Linux worm with multi-layer C2 coms
Self-replicating Linux worm with multi-layer C2 coms - ekomsSavior/Centipede
🚨 GitHub 监控消息提醒
🚨 发现关键词: #溯源 #IP
📦 项目名称: ProcTrace
👤 项目作者: gitstq
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 16:45:31
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #溯源 #IP
📦 项目名称: ProcTrace
👤 项目作者: gitstq
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 16:45:31
📝 项目描述:
🔍 ProcTrace - Lightweight Process Lineage Tracing & Audit Engine | 轻量级进程溯源审计引擎 - Trace why any process is running, detect launch sources (systemd/docker/cron/ssh), visualize process trees, zero dependencies🔗 点击访问项目地址
GitHub
GitHub - gitstq/ProcTrace: 🔍 ProcTrace - Lightweight Process Lineage Tracing & Audit Engine | 轻量级进程溯源审计引擎 - Trace why any process…
🔍 ProcTrace - Lightweight Process Lineage Tracing & Audit Engine | 轻量级进程溯源审计引擎 - Trace why any process is running, detect launch sources (systemd/docker/cron/ssh), visualize process trees, ...
TG必备的搜索引擎,快搜kuai帮你发现有趣群组、频道、视频、音乐、电影、新闻 | Find cool stuff all in one bot!
机器人:@kuai @kuaia @kuaiaa
👉 https://t.me/kuai?start=a_3URZVD0
机器人:@kuai @kuaia @kuaiaa
👉 https://t.me/kuai?start=a_3URZVD0
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Extension
📦 项目名称: Burp-Ollama-Pentester
👤 项目作者: SecureByChaos
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 17:57:53
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Extension
📦 项目名称: Burp-Ollama-Pentester
👤 项目作者: SecureByChaos
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 17:57:53
📝 项目描述:
A Burp Suite extension bridging local HTTP traffic to Ollama's xploiter/pentester:v2 model for AI-powered vulnerability analysis.🔗 点击访问项目地址
GitHub
GitHub - SecureByChaos/Burp-Ollama-Pentester: A Burp Suite extension bridging local HTTP traffic to Ollama's xploiter/pentester:v2…
A Burp Suite extension bridging local HTTP traffic to Ollama's xploiter/pentester:v2 model for AI-powered vulnerability analysis. - SecureByChaos/Burp-Ollama-Pentester
🚨 GitHub 监控消息提醒
🚨 发现关键词: #NTLM Relay
📦 项目名称: pentest-cheatsheets
👤 项目作者: PentestPlaybook
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 17:56:27
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #NTLM Relay
📦 项目名称: pentest-cheatsheets
👤 项目作者: PentestPlaybook
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 17:56:27
📝 项目描述:
Practical cheatsheets for pivoting, tunneling, and lateral movement in Windows environments, covering SSH, Chisel, Ligolo, NTLM relay, and common execution methods.🔗 点击访问项目地址
GitHub
GitHub - PentestPlaybook/pentest-cheatsheets: Practical cheatsheets for pivoting, tunneling, and lateral movement in Windows environments…
Practical cheatsheets for pivoting, tunneling, and lateral movement in Windows environments, covering SSH, Chisel, Ligolo, NTLM relay, and common execution methods. - PentestPlaybook/pentest-cheats...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RedTeam #Tools
📦 项目名称: ai-redteam-artifacts
👤 项目作者: csb1105
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 18:59:02
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RedTeam #Tools
📦 项目名称: ai-redteam-artifacts
👤 项目作者: csb1105
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 18:59:02
📝 项目描述:
ai-redteam-artifacts is a structured, doctrine‑aligned repository for AI red‑team operations. It contains adversarial prompt suites, multi‑turn test sessions, failure‑mode reports, machine‑readable catalogs, and methodological doctrine for evaluating interpretive stability, alignment drift, and system‑level vulnerabilities in LLMs.🔗 点击访问项目地址
GitHub
GitHub - csb1105/ai-redteam-artifacts: ai-redteam-artifacts is a structured, doctrine‑aligned repository for AI red‑team operations.…
ai-redteam-artifacts is a structured, doctrine‑aligned repository for AI red‑team operations. It contains adversarial prompt suites, multi‑turn test sessions, failure‑mode reports, machine‑readable...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #溯源 #IP
📦 项目名称: kret-rag
👤 项目作者: yurow
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 18:21:07
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #溯源 #IP
📦 项目名称: kret-rag
👤 项目作者: yurow
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 18:21:07
📝 项目描述:
RAG-Scheduler 是一套开箱即用、生产级轻量化 RAG 知识库问答系统,基于 FastAPI 构建,完整实现「文档上传→解析清洗→表格 / 图片处理→智能分块→向量入库→混合检索→LLM 溯源问答」全链路,适配 PDF、DOCX、PPTX、Excel、TXT、MD 等常见办公文档格式,可直接私有化部署做企业内部知识库、文档智能问答助手。🔗 点击访问项目地址
GitHub
GitHub - yurow/kret-rag: RAG-Scheduler 是一套开箱即用、生产级轻量化 RAG 知识库问答系统,基于 FastAPI 构建,完整实现「文档上传→解析清洗→表格 / 图片处理→智能分块→向量入库→混合检索→LLM 溯源问答」全链路,适配…
RAG-Scheduler 是一套开箱即用、生产级轻量化 RAG 知识库问答系统,基于 FastAPI 构建,完整实现「文档上传→解析清洗→表格 / 图片处理→智能分块→向量入库→混合检索→LLM 溯源问答」全链路,适配 PDF、DOCX、PPTX、Excel、TXT、MD 等常见办公文档格式,可直接私有化部署做企业内部知识库、文档智能问答助手。 - yurow/kret-rag
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Payload
📦 项目名称: NeoWAF
👤 项目作者: ErmalHasani
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 20:02:43
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Payload
📦 项目名称: NeoWAF
👤 项目作者: ErmalHasani
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 20:02:43
📝 项目描述:
NeoWAF is a lightweight Go-based WAF with DDoS protection, SQLi/XSS filtering, real-time dashboard, multi-user RBAC, and system tray support.🔗 点击访问项目地址
GitHub
GitHub - ErmalHasani/NeoWAF: NeoWAF is a lightweight Go-based WAF with DDoS protection, SQLi/XSS filtering, real-time dashboard…
NeoWAF is a lightweight Go-based WAF with DDoS protection, SQLi/XSS filtering, real-time dashboard, multi-user RBAC, and system tray support. - ErmalHasani/NeoWAF
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server #Command #Control
📦 项目名称: Phishing-to-PowerShell-to-C2-Attack-Investigation
👤 项目作者: Bhoolu
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 20:03:05
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server #Command #Control
📦 项目名称: Phishing-to-PowerShell-to-C2-Attack-Investigation
👤 项目作者: Bhoolu
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 20:03:05
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - Bhoolu/Phishing-to-PowerShell-to-C2-Attack-Investigation
Contribute to Bhoolu/Phishing-to-PowerShell-to-C2-Attack-Investigation development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-36980-Kernel-BSOD-DoS-PoC
👤 项目作者: canomer
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 20:58:30
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-36980-Kernel-BSOD-DoS-PoC
👤 项目作者: canomer
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 20:58:30
📝 项目描述:
Project Date : Feb 2026 / Discovered a buffer overflow vulnerability in the IOCTL handler of the pwdrvio.sys kernel driver. The vulnerability allows an unprivileged local attacker to corrupt kernel pool memory, triggering an immediate system crash (BSOD) and Denial of Service.🔗 点击访问项目地址
GitHub
GitHub - canomer/CVE-2026-36980-Kernel-BSOD-DoS-PoC: Project Date : Feb 2026 / Discovered a buffer overflow vulnerability in the…
Project Date : Feb 2026 / Discovered a buffer overflow vulnerability in the IOCTL handler of the pwdrvio.sys kernel driver. The vulnerability allows an unprivileged local attacker to corrupt kernel...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #渗透 #测试 #Web
📦 项目名称: kxns-cli
👤 项目作者: Wyl-cmd
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 20:52:16
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #渗透 #测试 #Web
📦 项目名称: kxns-cli
👤 项目作者: Wyl-cmd
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 20:52:16
📝 项目描述:
一个定制的渗透专属AI代理CLI工具🔗 点击访问项目地址
GitHub
GitHub - Wyl-cmd/kxns-cli: 一个定制的渗透专属AI代理CLI工具
一个定制的渗透专属AI代理CLI工具. Contribute to Wyl-cmd/kxns-cli development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: request-catcher
👤 项目作者: seanmarpo
🛠 开发语言: HTML
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 21:00:20
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: request-catcher
👤 项目作者: seanmarpo
🛠 开发语言: HTML
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 21:00:20
📝 项目描述:
Capture HTTP requests with ease! Create a private bucket, capture requests, and analyze the results. Useful for security and E2E testing.🔗 点击访问项目地址
GitHub
GitHub - seanmarpo/request-catcher: Capture HTTP requests with ease! Create a private bucket, capture requests, and analyze the…
Capture HTTP requests with ease! Create a private bucket, capture requests, and analyze the results. Useful for security and E2E testing. - seanmarpo/request-catcher
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: Web_vulnerabilities_report_md
👤 项目作者: zdmobarek-lab
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 20:45:47
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: Web_vulnerabilities_report_md
👤 项目作者: zdmobarek-lab
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 20:45:47
📝 项目描述:
Hands-on report for web application security. Learn how SQL Injection bypasses login, CSRF hijacks user sessions, and Broken Authentication leads to account takeover. Includes exploit examples and secure coding practices.🔗 点击访问项目地址
GitHub
GitHub - zdmobarek-lab/Web_vulnerabilities_report_md: Hands-on report for web application security. Learn how SQL Injection bypasses…
Hands-on report for web application security. Learn how SQL Injection bypasses login, CSRF hijacks user sessions, and Broken Authentication leads to account takeover. Includes exploit examples and ...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Framework #Server #Command
📦 项目名称: c2-iocs
👤 项目作者: newtonpaul-hunting
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 21:03:12
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Framework #Server #Command
📦 项目名称: c2-iocs
👤 项目作者: newtonpaul-hunting
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 21:03:12
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - newtonpaul-hunting/c2-iocs
Contribute to newtonpaul-hunting/c2-iocs development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #POC #CVE
📦 项目名称: poc-devsecop
👤 项目作者: jasilva0606
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 21:59:49
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #POC #CVE
📦 项目名称: poc-devsecop
👤 项目作者: jasilva0606
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 21:59:49
📝 项目描述:
POC devsecop pipiline🔗 点击访问项目地址
GitHub
GitHub - jasilva0606/poc-devsecop: POC devsecop pipiline
POC devsecop pipiline. Contribute to jasilva0606/poc-devsecop development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: Grok-Enhancer
👤 项目作者: stealabra5019
🛠 开发语言: JavaScript
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 22:01:11
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: Grok-Enhancer
👤 项目作者: stealabra5019
🛠 开发语言: JavaScript
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-10 22:01:11
📝 项目描述:
Enhance Grok with a userscript that improves video length control, bypasses limits, and boosts overall user experience with easy installation.🔗 点击访问项目地址
GitHub
GitHub - stealabra5019/Grok-Enhancer: Enhance Grok with a userscript that improves video length control, bypasses limits, and boosts…
Enhance Grok with a userscript that improves video length control, bypasses limits, and boosts overall user experience with easy installation. - stealabra5019/Grok-Enhancer