监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:渗透测试
描述:ARL 资产侦察灯塔系统(可运行,添加指纹,提高并发,升级工具及系统,无限制修改版) | ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
URL:https://github.com/kur4ge/ARL-lite
标签:#渗透测试
更新了:渗透测试
描述:ARL 资产侦察灯塔系统(可运行,添加指纹,提高并发,升级工具及系统,无限制修改版) | ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
URL:https://github.com/kur4ge/ARL-lite
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Minimal Redis honeypot detecting RediShell (CVE-2025-49844) exploits.
URL:https://github.com/srozb/reditrap
标签:#CVE-2025
更新了:CVE-2025
描述:Minimal Redis honeypot detecting RediShell (CVE-2025-49844) exploits.
URL:https://github.com/srozb/reditrap
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Reproduction and fix of the CVE-2025-29927 vulnerability.
URL:https://github.com/Bongni/CVE-2025-29927
标签:#CVE-2025
更新了:CVE-2025
描述:Reproduction and fix of the CVE-2025-29927 vulnerability.
URL:https://github.com/Bongni/CVE-2025-29927
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE PAYLOAD FOR CTF INTIGRITI
URL:https://github.com/iamsavi0r/rcectf
标签:#RCE
更新了:RCE
描述:RCE PAYLOAD FOR CTF INTIGRITI
URL:https://github.com/iamsavi0r/rcectf
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-61882
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-61882
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-61882
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-61882
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32462 & CVE-2025-32463
URL:https://github.com/harsh1verma/CVE-Analysis
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32462 & CVE-2025-32463
URL:https://github.com/harsh1verma/CVE-Analysis
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:信息收集
描述:集成多种攻防技术与检测手段,帮助安全测试人员高效执行信息收集、漏洞挖掘、利用验证, 提升渗透测试的自动化与体系化水平,为安全团队快速发现潜在风险与攻击面提供有力支持。
URL:https://github.com/hack007x/MoonVeil
标签:#信息收集
更新了:信息收集
描述:集成多种攻防技术与检测手段,帮助安全测试人员高效执行信息收集、漏洞挖掘、利用验证, 提升渗透测试的自动化与体系化水平,为安全团队快速发现潜在风险与攻击面提供有力支持。
URL:https://github.com/hack007x/MoonVeil
标签:#信息收集
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-46817 – Redis Lua unpack Integer Overflow (Potential RCE)
URL:https://github.com/dwisiswant0/CVE-2025-46817
标签:#RCE
更新了:RCE
描述:CVE-2025-46817 – Redis Lua unpack Integer Overflow (Potential RCE)
URL:https://github.com/dwisiswant0/CVE-2025-46817
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-49844 – Redis Lua Parser Use-After-Free
URL:https://github.com/dwisiswant0/CVE-2025-49844
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-49844 – Redis Lua Parser Use-After-Free
URL:https://github.com/dwisiswant0/CVE-2025-49844
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17)
URL:https://github.com/r3dBust3r/CVE-2025-32463
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17)
URL:https://github.com/r3dBust3r/CVE-2025-32463
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit for CVE-2025-61882 (do not use without any written permission).
URL:https://github.com/Sachinart/CVE-2025-61882
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit for CVE-2025-61882 (do not use without any written permission).
URL:https://github.com/Sachinart/CVE-2025-61882
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:渗透测试
描述:An Obsidian plugin that quickly generates HTB penetration testing note templates,一款能够快速生成HTB渗透测试笔记模版的Obsidian 插件,有助于对您的知识库进行管理查询
URL:https://github.com/Ryanu9/Obsidian-Machine-Tracker
标签:#渗透测试
更新了:渗透测试
描述:An Obsidian plugin that quickly generates HTB penetration testing note templates,一款能够快速生成HTB渗透测试笔记模版的Obsidian 插件,有助于对您的知识库进行管理查询
URL:https://github.com/Ryanu9/Obsidian-Machine-Tracker
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:钓鱼
描述:Russian Fishing 4 Auto Script 俄罗斯钓鱼4自动化脚本
URL:https://github.com/fyodorrss/RussianFishing4-Script
标签:#钓鱼
更新了:钓鱼
描述:Russian Fishing 4 Auto Script 俄罗斯钓鱼4自动化脚本
URL:https://github.com/fyodorrss/RussianFishing4-Script
标签:#钓鱼
GitHub监控消息提醒!!!
更新了:Red Team
描述:A C++ command-line tool for pentesters and Red Teamers to quickly scaffold and manage directory structures for engagements, labs, and tools.
URL:https://github.com/dcollaoa/rt_manager
标签:#Red Team
更新了:Red Team
描述:A C++ command-line tool for pentesters and Red Teamers to quickly scaffold and manage directory structures for engagements, labs, and tools.
URL:https://github.com/dcollaoa/rt_manager
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-9074 - Unauthenticated Docker API exposure allowing arbitrary container creation and host filesystem access.
URL:https://github.com/OilSeller2001/PoC-for-CVE-2025-9074
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept exploit for CVE-2025-9074 - Unauthenticated Docker API exposure allowing arbitrary container creation and host filesystem access.
URL:https://github.com/OilSeller2001/PoC-for-CVE-2025-9074
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.
URL:https://github.com/GithubKillsMyOpsec/CVE-2025-59489-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.
URL:https://github.com/GithubKillsMyOpsec/CVE-2025-59489-POC
标签:#CVE-2025