监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/Jvr2022/CVE-2026-25126
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/Jvr2022/CVE-2026-25126
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`).
URL:https://github.com/SimoesCTT/CTT-NFS-Vortex-RCE
标签:#CVE-2026
更新了:CVE-2026
描述:New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`).
URL:https://github.com/SimoesCTT/CTT-NFS-Vortex-RCE
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
URL:https://github.com/otakuliu/CVE-2026-24841_Range
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
URL:https://github.com/otakuliu/CVE-2026-24841_Range
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Scanner for CVE-2026-24061
URL:https://github.com/buzz075/CVE-2026-24061
标签:#CVE-2026
更新了:CVE-2026
描述:Scanner for CVE-2026-24061
URL:https://github.com/buzz075/CVE-2026-24061
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:POC in python for CVE-2026-2461
URL:https://github.com/destiny-creates/CVE-2026-2461-poc
标签:#CVE-2026
更新了:CVE-2026
描述:POC in python for CVE-2026-2461
URL:https://github.com/destiny-creates/CVE-2026-2461-poc
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:应急响应
描述:深度学习目标检测算法YOLOV8如何训练无人机搜救人员数据集 如何应用与灾害应急响应、AI智能搜救、无人机自主识别人员检测 无人机航拍行人检测数据集
URL:https://github.com/QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas
标签:#应急响应
更新了:应急响应
描述:深度学习目标检测算法YOLOV8如何训练无人机搜救人员数据集 如何应用与灾害应急响应、AI智能搜救、无人机自主识别人员检测 无人机航拍行人检测数据集
URL:https://github.com/QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas
标签:#应急响应
GitHub监控消息提醒!!!
更新了:RCE
描述:Laravel < 8.4.2 RCE exploit
URL:https://github.com/crypt0lith/laravel-rce
标签:#RCE
更新了:RCE
描述:Laravel < 8.4.2 RCE exploit
URL:https://github.com/crypt0lith/laravel-rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and malspam Evidence
URL:https://github.com/ryan-har-plymouth/comp3010hk-set-exercise
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and malspam Evidence
URL:https://github.com/ryan-har-plymouth/comp3010hk-set-exercise
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CTT-Refraction-Vortex-CVE-2026-7731-
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CTT-Refraction-Vortex-CVE-2026-7731-
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:绕过
描述:用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare Turnstile 验证码
URL:https://github.com/XCQ0607/katabump
标签:#绕过
更新了:绕过
描述:用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare Turnstile 验证码
URL:https://github.com/XCQ0607/katabump
标签:#绕过
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CTT-Terrminus-Vortex (CVE-2026-2406)
URL:https://github.com/SimoesCTT/CTT-Sovereign-Vortex
标签:#CVE-2026
更新了:CVE-2026
描述:CTT-Terrminus-Vortex (CVE-2026-2406)
URL:https://github.com/SimoesCTT/CTT-Sovereign-Vortex
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述: AsyncIO Scanner & Exploitation Framework for CVE-2026-24061 (Telnet NEW_ENVIRON Auth Bypass). Features high-concurrency discovery, passive fingerprinting, and authorized root shell escalation
URL:https://github.com/ridpath/Terrminus-CVE-2026-2406
标签:#CVE-2026
更新了:CVE-2026
描述: AsyncIO Scanner & Exploitation Framework for CVE-2026-24061 (Telnet NEW_ENVIRON Auth Bypass). Features high-concurrency discovery, passive fingerprinting, and authorized root shell escalation
URL:https://github.com/ridpath/Terrminus-CVE-2026-2406
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:该系统是一款面向安全开发流程的漏洞扫描器,用于自动识别软件中的安全漏洞。系统具备代码分析、漏洞匹配、风险评估等功能模块,采用深度学习技术,可高效识别和报告安全风险。支持多种编程语言和框架,辅助开发者提升软件安全性。
URL:https://github.com/3886370410/JtpUaUovFg
标签:#漏洞扫描
更新了:漏洞扫描
描述:该系统是一款面向安全开发流程的漏洞扫描器,用于自动识别软件中的安全漏洞。系统具备代码分析、漏洞匹配、风险评估等功能模块,采用深度学习技术,可高效识别和报告安全风险。支持多种编程语言和框架,辅助开发者提升软件安全性。
URL:https://github.com/3886370410/JtpUaUovFg
标签:#漏洞扫描
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE).
URL:https://github.com/ii4gsp/CVE-2026-1457
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE).
URL:https://github.com/ii4gsp/CVE-2026-1457
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory default enabled feature once you register any FortiGate/FortiManager/FortiAnalyzer contains a critical authentication bypass flaw.
URL:https://github.com/SimoesCTT/CTT-Kernel-Resonance-io_uring-Temporal-Phase-Transition
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory default enabled feature once you register any FortiGate/FortiManager/FortiAnalyzer contains a critical authentication bypass flaw.
URL:https://github.com/SimoesCTT/CTT-Kernel-Resonance-io_uring-Temporal-Phase-Transition
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:信息收集
描述:本仓库用于记录和分享本人 Hack The Box(HTB)靶场实战笔记, 围绕信息收集、漏洞利用、权限提升及攻击路径构建等环节, 系统化总结攻防思路与技术要点。
URL:https://github.com/joohnny157/HackTheBox-notes
标签:#信息收集
更新了:信息收集
描述:本仓库用于记录和分享本人 Hack The Box(HTB)靶场实战笔记, 围绕信息收集、漏洞利用、权限提升及攻击路径构建等环节, 系统化总结攻防思路与技术要点。
URL:https://github.com/joohnny157/HackTheBox-notes
标签:#信息收集
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE).
URL:https://github.com/ii4gsp/CVE-2026-1457-TP-Link-VIGI-C385-Authenticated-Remote-Code-Execution
标签:#RCE
更新了:RCE
描述:CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE).
URL:https://github.com/ii4gsp/CVE-2026-1457-TP-Link-VIGI-C385-Authenticated-Remote-Code-Execution
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory default enabled feature once you register any FortiGate/FortiManager/FortiAnalyzer contains a critical authentication bypass flaw.
URL:https://github.com/absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory default enabled feature once you register any FortiGate/FortiManager/FortiAnalyzer contains a critical authentication bypass flaw.
URL:https://github.com/absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass
标签:#CVE-2026