监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:RCE
描述:Repo containing pyarrow 14.0.0, vulnerable to RCE - CVE-2023-47248
URL:https://github.com/Prodigysec/pyarrow-CVE-2023-47248
标签:#RCE
更新了:RCE
描述:Repo containing pyarrow 14.0.0, vulnerable to RCE - CVE-2023-47248
URL:https://github.com/Prodigysec/pyarrow-CVE-2023-47248
标签:#RCE
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/linlinya520/termux-zh
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/linlinya520/termux-zh
标签:#护网
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2023-5360 PoC: Unauthenticated arbitrary file upload leading to RCE in Royal Elementor Addons (≤ 1.3.78), written in pure Python.
URL:https://github.com/LaviruDilshan/CVE-2023-5360-exploit-with-native-libraries
标签:#RCE
更新了:RCE
描述:CVE-2023-5360 PoC: Unauthenticated arbitrary file upload leading to RCE in Royal Elementor Addons (≤ 1.3.78), written in pure Python.
URL:https://github.com/LaviruDilshan/CVE-2023-5360-exploit-with-native-libraries
标签:#RCE
GitHub监控消息提醒!!!
更新了:内存马
描述:哥斯拉Godzilla定制化插件,接收恶意类Base64编码与恶意类类名进行实例化,达到注入任意类型内存马的目的。
URL:https://github.com/KaGty1/CustomMemShellInjector
标签:#内存马
更新了:内存马
描述:哥斯拉Godzilla定制化插件,接收恶意类Base64编码与恶意类类名进行实例化,达到注入任意类型内存马的目的。
URL:https://github.com/KaGty1/CustomMemShellInjector
标签:#内存马
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Detect and exploit CVE-2025-55182 vulnerabilities in Next.js applications with this easy-to-use command-line scanner.
URL:https://github.com/haftomgu/CVE-2025-55182-advanced-scanner-
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Detect and exploit CVE-2025-55182 vulnerabilities in Next.js applications with this easy-to-use command-line scanner.
URL:https://github.com/haftomgu/CVE-2025-55182-advanced-scanner-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Fix vulnerable versions in Next.js and React RSC apps with one command to secure against CVE-2025-66478. Improve your app's safety effortlessly.
URL:https://github.com/Saied25/fix-react2shell-next
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Fix vulnerable versions in Next.js and React RSC apps with one command to secure against CVE-2025-66478. Improve your app's safety effortlessly.
URL:https://github.com/Saied25/fix-react2shell-next
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:护网
描述:本系统是一款基于Python的Web漏洞挖掘平台,采用Django框架和MySQL数据库构建。主要用途是对网站进行自动化漏洞扫描,核心功能包括SQL注入等漏洞扫描,以及漏洞报告生成,旨在帮助用户快速发现并解决网站安全漏洞,提升网络安全防护能力。
URL:https://github.com/kevinyang11102/crCwkVBzWa
标签:#护网
更新了:护网
描述:本系统是一款基于Python的Web漏洞挖掘平台,采用Django框架和MySQL数据库构建。主要用途是对网站进行自动化漏洞扫描,核心功能包括SQL注入等漏洞扫描,以及漏洞报告生成,旨在帮助用户快速发现并解决网站安全漏洞,提升网络安全防护能力。
URL:https://github.com/kevinyang11102/crCwkVBzWa
标签:#护网
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Herimnx/Exe-To-Base64-ShellCode-Convert
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Herimnx/Exe-To-Base64-ShellCode-Convert
标签:#bypass AntiVirus
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Detect and demonstrate RCE vulnerabilities in React Server Components and Next.js with this comprehensive security research toolkit.
URL:https://github.com/ahmedtouzani/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Detect and demonstrate RCE vulnerabilities in React Server Components and Next.js with this comprehensive security research toolkit.
URL:https://github.com/ahmedtouzani/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC para determinar si Fortinet es vulnerable a CVE-2025-59718 / CVE-2025-59719
URL:https://github.com/moften/CVE-2025-59718-Fortinet-Poc
标签:#CVE-2025
更新了:CVE-2025
描述:PoC para determinar si Fortinet es vulnerable a CVE-2025-59718 / CVE-2025-59719
URL:https://github.com/moften/CVE-2025-59718-Fortinet-Poc
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
URL:https://github.com/xgbtxy/Negentropy-Collective
标签:#渗透测试
更新了:渗透测试
描述:Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
URL:https://github.com/xgbtxy/Negentropy-Collective
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
URL:https://github.com/xgbtxy/Entropy
标签:#渗透测试
更新了:渗透测试
描述:Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
URL:https://github.com/xgbtxy/Entropy
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:RCE
描述:🚨 Exploit CVE-2025-55182, a critical RCE vulnerability in React Server Components for Next.js apps; enables testing for prototype pollution risks.
URL:https://github.com/iksanwkk/CVE-2025-55182-exp
标签:#RCE
更新了:RCE
描述:🚨 Exploit CVE-2025-55182, a critical RCE vulnerability in React Server Components for Next.js apps; enables testing for prototype pollution risks.
URL:https://github.com/iksanwkk/CVE-2025-55182-exp
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:⚠️ Explore a vulnerable environment to test security scanners against the CVE-2025-55182 RCE flaw in React Server Components and Next.js applications.
URL:https://github.com/ahmed-dev-op/CVE-2025-55182
标签:#RCE
更新了:RCE
描述:⚠️ Explore a vulnerable environment to test security scanners against the CVE-2025-55182 RCE flaw in React Server Components and Next.js applications.
URL:https://github.com/ahmed-dev-op/CVE-2025-55182
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This laboratory provides a controlled environment to analyze and reproduce CVE-2025-68613 in a vulnerable n8n instance.
URL:https://github.com/LingerANR/n8n-CVE-2025-68613
标签:#CVE-2025
更新了:CVE-2025
描述:This laboratory provides a controlled environment to analyze and reproduce CVE-2025-68613 in a vulnerable n8n instance.
URL:https://github.com/LingerANR/n8n-CVE-2025-68613
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:⚡ Discover and exploit CVE-2025-55182 with this PoC, offering reliable remote code execution tests for React Server Components in Next.js.
URL:https://github.com/9988700/CVE-2025-55182-POC-NEXTJS
标签:#CVE-2025
更新了:CVE-2025
描述:⚡ Discover and exploit CVE-2025-55182 with this PoC, offering reliable remote code execution tests for React Server Components in Next.js.
URL:https://github.com/9988700/CVE-2025-55182-POC-NEXTJS
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-54322 - XSpeeder SXZOS Pre-Auth RCE 0day Finder Quick
URL:https://github.com/Sachinart/CVE-2025-54322
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-54322 - XSpeeder SXZOS Pre-Auth RCE 0day Finder Quick
URL:https://github.com/Sachinart/CVE-2025-54322
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-68613 (n8n) Critical RCE analysis + defensive recommendations (patch validation, detection ideas, and hardening tips)
URL:https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-68613 (n8n) Critical RCE analysis + defensive recommendations (patch validation, detection ideas, and hardening tips)
URL:https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploitation script for CVE-2025-55182. This is modified only for my personal use. If you are facing any problem fix it yourself.
URL:https://github.com/0xROI/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Exploitation script for CVE-2025-55182. This is modified only for my personal use. If you are facing any problem fix it yourself.
URL:https://github.com/0xROI/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Scoop bucket for Penetration Testing and Cybersecurity related tools. 用于渗透测试和网络安全相关工具下载、安装和自动更新的Scoop软件仓库。
URL:https://github.com/tldro/scoop-security
标签:#渗透测试
更新了:渗透测试
描述:Scoop bucket for Penetration Testing and Cybersecurity related tools. 用于渗透测试和网络安全相关工具下载、安装和自动更新的Scoop软件仓库。
URL:https://github.com/tldro/scoop-security
标签:#渗透测试