监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:RCE
描述:A complete set of tools for RCE as part of penetration tests. С2 + Implant
URL:https://github.com/AnonRedT/C2-Implant-Kworker32M
标签:#RCE
更新了:RCE
描述:A complete set of tools for RCE as part of penetration tests. С2 + Implant
URL:https://github.com/AnonRedT/C2-Implant-Kworker32M
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE attack methodology, Real World Scenarios, Real LOLBin deployment etc.... FOR PROFFESSIONAL USE ONLY!
URL:https://github.com/azdabat/Offensive-Security-Methodology
标签:#RCE
更新了:RCE
描述:RCE attack methodology, Real World Scenarios, Real LOLBin deployment etc.... FOR PROFFESSIONAL USE ONLY!
URL:https://github.com/azdabat/Offensive-Security-Methodology
标签:#RCE
GitHub监控消息提醒!!!
更新了:免杀
描述:ZREBypass 是一款专业的免杀处理工具,支持二进制文件、Shellcode 和 Webshell 的免杀处理,集成了反调试、反虚拟机、反沙箱等多种对抗技术
URL:https://github.com/1276486/ZREBypass
标签:#免杀
更新了:免杀
描述:ZREBypass 是一款专业的免杀处理工具,支持二进制文件、Shellcode 和 Webshell 的免杀处理,集成了反调试、反虚拟机、反沙箱等多种对抗技术
URL:https://github.com/1276486/ZREBypass
标签:#免杀
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC for the BinaryFormatter vulnerability allowing unauthenticated RCE in Microsoft Windows Server Update Service (WSUS) - CVE-2023-35317
URL:https://github.com/M507/CVE-2023-35317-PoC
标签:#RCE
更新了:RCE
描述:PoC for the BinaryFormatter vulnerability allowing unauthenticated RCE in Microsoft Windows Server Update Service (WSUS) - CVE-2023-35317
URL:https://github.com/M507/CVE-2023-35317-PoC
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE-GPT-4 Empirical Validation Results: GPT-4 120B benchmark with comprehensive Llama comparison
URL:https://github.com/IsmaIkami/rce-gpt4-validation
标签:#RCE
更新了:RCE
描述:RCE-GPT-4 Empirical Validation Results: GPT-4 120B benchmark with comprehensive Llama comparison
URL:https://github.com/IsmaIkami/rce-gpt4-validation
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Tool that reproduces CVE-2025-55315 in ASP.NET Core.
URL:https://github.com/fevar54/CVE-2025-64446-PoC---FortiWeb-Path-Traversal
标签:#CVE-2025
更新了:CVE-2025
描述:Tool that reproduces CVE-2025-55315 in ASP.NET Core.
URL:https://github.com/fevar54/CVE-2025-64446-PoC---FortiWeb-Path-Traversal
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-XXXXX
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-XXXXX
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-XXXXX
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-XXXXX
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.
URL:https://github.com/uziii2208/CVE-2025-33073
标签:#CVE-2025
更新了:CVE-2025
描述:Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.
URL:https://github.com/uziii2208/CVE-2025-33073
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-12101 is a cross-site scripting (XSS) vulnerability impacting Citrix NetScaler ADC and Citrix NetScaler Gateway appliances when configured in certain roles (Gateway, AAA virtual server)
URL:https://github.com/7amzahard/CVE-2025-21202-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-12101 is a cross-site scripting (XSS) vulnerability impacting Citrix NetScaler ADC and Citrix NetScaler Gateway appliances when configured in certain roles (Gateway, AAA virtual server)
URL:https://github.com/7amzahard/CVE-2025-21202-exploit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/HanTul/Kotaemon-CVE-2025-56526-56527-disclosure
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/HanTul/Kotaemon-CVE-2025-56526-56527-disclosure
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/shinyseam/CVE-2025-64513
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/shinyseam/CVE-2025-64513
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59367
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59367
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-59367
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be actively exploited as a zero-day.
URL:https://github.com/dexterm300/CVE-2025-62215-exploit-poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be actively exploited as a zero-day.
URL:https://github.com/dexterm300/CVE-2025-62215-exploit-poc
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Maybe a proof-of-concept for CVE-2025-48593
URL:https://github.com/zhuowei/blueshrimp
标签:#CVE-2025
更新了:CVE-2025
描述:Maybe a proof-of-concept for CVE-2025-48593
URL:https://github.com/zhuowei/blueshrimp
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试收集阶段,爬取SPA型应用的所有js文件
URL:https://github.com/catcaine-lab/JSFinder
标签:#渗透测试
更新了:渗透测试
描述:渗透测试收集阶段,爬取SPA型应用的所有js文件
URL:https://github.com/catcaine-lab/JSFinder
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Disclosure for CVE-2025-63602, including a PoC for use of an insecure driver in Awesome Miner 11.2.4 leading to arbitrary kernel read/write to MSRs, resulting in kernel code execution.
URL:https://github.com/D7EAD/CVE-2025-63602
标签:#CVE-2025
更新了:CVE-2025
描述:Disclosure for CVE-2025-63602, including a PoC for use of an insecure driver in Awesome Miner 11.2.4 leading to arbitrary kernel read/write to MSRs, resulting in kernel code execution.
URL:https://github.com/D7EAD/CVE-2025-63602
标签:#CVE-2025