监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:钓鱼
描述:AI 钓鱼邮件检测网关,通过集成多源威胁情报(如 VirusTotal、微步在线)、沙箱技术以及 AI 算法,实现对邮件来源 IP、域名、URL、附件及内容关键字的深度识别、告警与拦截,并支持通过本地知识库持续学习进化。
URL:https://github.com/HaoY-l/MyPhishing-Web
标签:#钓鱼
更新了:钓鱼
描述:AI 钓鱼邮件检测网关,通过集成多源威胁情报(如 VirusTotal、微步在线)、沙箱技术以及 AI 算法,实现对邮件来源 IP、域名、URL、附件及内容关键字的深度识别、告警与拦截,并支持通过本地知识库持续学习进化。
URL:https://github.com/HaoY-l/MyPhishing-Web
标签:#钓鱼
GitHub监控消息提醒!!!
更新了:攻防
描述:大模型原理和技术实验——大模型攻防
URL:https://github.com/motosportor/my-llm-project-aisafety
标签:#攻防
更新了:攻防
描述:大模型原理和技术实验——大模型攻防
URL:https://github.com/motosportor/my-llm-project-aisafety
标签:#攻防
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP
URL:https://github.com/theman001/CVE-2025-62215
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP
URL:https://github.com/theman001/CVE-2025-62215
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65964-POC
URL:https://github.com/Pinus97/CVE-2025-65964-POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65964-POC
URL:https://github.com/Pinus97/CVE-2025-65964-POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:通过GitHub Copilot 辅助分析CVE-2025-68613漏洞
URL:https://github.com/intbjw/CVE-2025-68613-poc-via-copilot
标签:#CVE-2025
更新了:CVE-2025
描述:通过GitHub Copilot 辅助分析CVE-2025-68613漏洞
URL:https://github.com/intbjw/CVE-2025-68613-poc-via-copilot
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Red Team
描述:Your Ultimate Pentest & Red Team Cheatsheets Hub - A comprehensive collection of curated resources, cheatsheets, and tools for security professionals, penetration testers, and red teamers.
URL:https://github.com/DivakarSure/ATSA---Advanced-Threat-Simulation-Assistant
标签:#Red Team
更新了:Red Team
描述:Your Ultimate Pentest & Red Team Cheatsheets Hub - A comprehensive collection of curated resources, cheatsheets, and tools for security professionals, penetration testers, and red teamers.
URL:https://github.com/DivakarSure/ATSA---Advanced-Threat-Simulation-Assistant
标签:#Red Team
GitHub监控消息提醒!!!
更新了:Red Team
描述:🛠️ Leverage advanced evasion techniques with Furtim, a Rust-based malware dropper for Red Teaming and educational security research.
URL:https://github.com/ShreenandNaik/Furtim-Advanced-Rust-Dropper
标签:#Red Team
更新了:Red Team
描述:🛠️ Leverage advanced evasion techniques with Furtim, a Rust-based malware dropper for Red Teaming and educational security research.
URL:https://github.com/ShreenandNaik/Furtim-Advanced-Rust-Dropper
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:a controlled environment to test CVE-2025-55182.
URL:https://github.com/ckex/test-vuln
标签:#CVE-2025
更新了:CVE-2025
描述:a controlled environment to test CVE-2025-55182.
URL:https://github.com/ckex/test-vuln
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:攻防
描述:一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
URL:https://github.com/CakeSystem/CMS
标签:#攻防
更新了:攻防
描述:一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
URL:https://github.com/CakeSystem/CMS
标签:#攻防
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public security advisory for CVE-2025-66209, CVE-2025-66210, CVE-2025-66211, CVE-2025-66212, and CVE-2025-66213
URL:https://github.com/0xrakan/coolify-cve-2025-66209-66213
标签:#CVE-2025
更新了:CVE-2025
描述:Public security advisory for CVE-2025-66209, CVE-2025-66210, CVE-2025-66211, CVE-2025-66212, and CVE-2025-66213
URL:https://github.com/0xrakan/coolify-cve-2025-66209-66213
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components 19.0.0-19.2.0. Exploits unsafe deserialization for unauthenticated remote code execution.
URL:https://github.com/S3cr3t-SDN/React4Shell
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit Code for React2Shell RCE vulnerability (CVE-2025-55182) affecting React Server Components 19.0.0-19.2.0. Exploits unsafe deserialization for unauthenticated remote code execution.
URL:https://github.com/S3cr3t-SDN/React4Shell
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-68613: n8n RCE vulnerability exploit and documentation
URL:https://github.com/wioui/n8n-CVE-2025-68613-exploit
标签:#RCE
更新了:RCE
描述:CVE-2025-68613: n8n RCE vulnerability exploit and documentation
URL:https://github.com/wioui/n8n-CVE-2025-68613-exploit
标签:#RCE
GitHub监控消息提醒!!!
更新了:钓鱼
描述:MailAssistant - 本地化轻量级 AI 邮件助理,实现邮件内容总结(50 字内)、钓鱼邮件概率评估、垃圾邮件识别,前后端分离设计
URL:https://github.com/AsdfAlex-learning/MailAssistant
标签:#钓鱼
更新了:钓鱼
描述:MailAssistant - 本地化轻量级 AI 邮件助理,实现邮件内容总结(50 字内)、钓鱼邮件概率评估、垃圾邮件识别,前后端分离设计
URL:https://github.com/AsdfAlex-learning/MailAssistant
标签:#钓鱼
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:🛠️ Automate Cobalt Strike operations with YAML-based workflows for streamlined beacon management and complex task execution.
URL:https://github.com/Zakarim73/csbot
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:🛠️ Automate Cobalt Strike operations with YAML-based workflows for streamlined beacon management and complex task execution.
URL:https://github.com/Zakarim73/csbot
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:RCE
描述:Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance.
URL:https://github.com/TheStingR/CVE-2025-68613
标签:#RCE
更新了:RCE
描述:Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance.
URL:https://github.com/TheStingR/CVE-2025-68613
标签:#RCE
GitHub监控消息提醒!!!
更新了:Red Team
描述:Stealthy Windows audio-capture tool with UDP exfiltration and randomized transmission intervals, designed for evasion-focused Red Team operations.
URL:https://github.com/Drew-Alleman/wiretap
标签:#Red Team
更新了:Red Team
描述:Stealthy Windows audio-capture tool with UDP exfiltration and randomized transmission intervals, designed for evasion-focused Red Team operations.
URL:https://github.com/Drew-Alleman/wiretap
标签:#Red Team
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/3886370410/HjowDVDhMr
标签:#应急响应
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/3886370410/HjowDVDhMr
标签:#应急响应
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance.
URL:https://github.com/TheStingR/CVE-2025-68613-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Includes detection tools, full exploit, and remediation guidance.
URL:https://github.com/TheStingR/CVE-2025-68613-POC
标签:#CVE-2025