监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:免杀
描述:SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
URL:https://github.com/6yx1n/sharkBlind
标签:#免杀
更新了:免杀
描述:SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
URL:https://github.com/6yx1n/sharkBlind
标签:#免杀
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Elitamz/Cobalt-Strike-csload-plugin
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Elitamz/Cobalt-Strike-csload-plugin
标签:#bypass AntiVirus
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:lab_demo CVE-2025-55182
URL:https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:lab_demo CVE-2025-55182
URL:https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:基于 CVE-2025-55182 burpsuite 被动扫描插件
URL:https://github.com/Pizz33/CVE-2025-55182-burpscanner
标签:#CVE-2025
更新了:CVE-2025
描述:基于 CVE-2025-55182 burpsuite 被动扫描插件
URL:https://github.com/Pizz33/CVE-2025-55182-burpscanner
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/Ashwesker/Blackash-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/Ashwesker/Blackash-CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite
标签:#Red Team
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications
URL:https://github.com/Saturate/CVE-2025-55182-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications
URL:https://github.com/Saturate/CVE-2025-55182-Scanner
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:绕过
描述:LSPosed模块 - 关闭OKHttp3 SSL证书校验,用于绕过证书固定
URL:https://github.com/banchengkemeng/LSPosed_OKHttp3_SSLBypass
标签:#绕过
更新了:绕过
描述:LSPosed模块 - 关闭OKHttp3 SSL证书校验,用于绕过证书固定
URL:https://github.com/banchengkemeng/LSPosed_OKHttp3_SSLBypass
标签:#绕过
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool
URL:https://github.com/Spritualkb/CVE-2025-55182-exp
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool
URL:https://github.com/Spritualkb/CVE-2025-55182-exp
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182.
URL:https://github.com/mrknow001/RSC_Detector
标签:#CVE-2025
更新了:CVE-2025
描述:Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182.
URL:https://github.com/mrknow001/RSC_Detector
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Next.js React Server Components RCE exploit for CVE-2025-55182
URL:https://github.com/Chocapikk/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Next.js React Server Components RCE exploit for CVE-2025-55182
URL:https://github.com/Chocapikk/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Exploit for CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
标签:#RCE
更新了:RCE
描述:Exploit for CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Geoserver RCE
URL:https://github.com/mantanhacker/CVE-2024-36401-MASS
标签:#RCE
更新了:RCE
描述:Geoserver RCE
URL:https://github.com/mantanhacker/CVE-2024-36401-MASS
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for CVE-2025-55182
URL:https://github.com/emadshanab/POC-for-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:POC for CVE-2025-55182
URL:https://github.com/emadshanab/POC-for-CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a POC script for CVE-2025-55182 (React SSR RCE)
URL:https://github.com/Darker-Ink/react-ssr-vulnerability
标签:#RCE
更新了:RCE
描述:This is a POC script for CVE-2025-55182 (React SSR RCE)
URL:https://github.com/Darker-Ink/react-ssr-vulnerability
标签:#RCE
GitHub监控消息提醒!!!
更新了:攻防
描述:一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
URL:https://github.com/Huu1j/crawl_xz
标签:#攻防
更新了:攻防
描述:一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
URL:https://github.com/Huu1j/crawl_xz
标签:#攻防
GitHub监控消息提醒!!!
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/lza6/infip-2api-cfwork
标签:#绕过
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/lza6/infip-2api-cfwork
标签:#绕过
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A proof of concept exploit script for CVE-2025-55182
URL:https://github.com/Cillian-Collins/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:A proof of concept exploit script for CVE-2025-55182
URL:https://github.com/Cillian-Collins/CVE-2025-55182
标签:#CVE-2025