监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Elias966/edex-ui-fixed
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Elias966/edex-ui-fixed
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Validating DNS Exfiltration and Python Pickle RCE Attack Chains in AI Code Execution Sandboxes
URL:https://github.com/SnailSploit/chatgpt-rce-dns
标签:#RCE
更新了:RCE
描述:Validating DNS Exfiltration and Python Pickle RCE Attack Chains in AI Code Execution Sandboxes
URL:https://github.com/SnailSploit/chatgpt-rce-dns
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Advanced WordPress vulnerability scanner targeting 30+ critical RCE vulnerabilities (2019-2025). Supports both single-target and mass scanning with multi-threading.
URL:https://github.com/xKRD/WP-RCE
标签:#RCE
更新了:RCE
描述:Advanced WordPress vulnerability scanner targeting 30+ critical RCE vulnerabilities (2019-2025). Supports both single-target and mass scanning with multi-threading.
URL:https://github.com/xKRD/WP-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/sastraadiwiguna-purpleeliteteaming/Dissecting-CVE-2026-0628-Chromium-Extension-Privilege-Escalation
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/sastraadiwiguna-purpleeliteteaming/Dissecting-CVE-2026-0628-Chromium-Extension-Privilege-Escalation
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-22807的靶场
URL:https://github.com/otakuliu/CVE-2026-22807_Range
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-22807的靶场
URL:https://github.com/otakuliu/CVE-2026-22807_Range
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass-
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass-
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/Jvr2022/CVE-2026-25126
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-25126 Proof-of-Concept demonstrating vote count manipulation in PolarLearn due to improper runtime validation of the forum vote direction parameter. Published after upstream patch release.
URL:https://github.com/Jvr2022/CVE-2026-25126
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`).
URL:https://github.com/SimoesCTT/CTT-NFS-Vortex-RCE
标签:#CVE-2026
更新了:CVE-2026
描述:New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`).
URL:https://github.com/SimoesCTT/CTT-NFS-Vortex-RCE
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
URL:https://github.com/otakuliu/CVE-2026-24841_Range
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
URL:https://github.com/otakuliu/CVE-2026-24841_Range
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Scanner for CVE-2026-24061
URL:https://github.com/buzz075/CVE-2026-24061
标签:#CVE-2026
更新了:CVE-2026
描述:Scanner for CVE-2026-24061
URL:https://github.com/buzz075/CVE-2026-24061
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:POC in python for CVE-2026-2461
URL:https://github.com/destiny-creates/CVE-2026-2461-poc
标签:#CVE-2026
更新了:CVE-2026
描述:POC in python for CVE-2026-2461
URL:https://github.com/destiny-creates/CVE-2026-2461-poc
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:应急响应
描述:深度学习目标检测算法YOLOV8如何训练无人机搜救人员数据集 如何应用与灾害应急响应、AI智能搜救、无人机自主识别人员检测 无人机航拍行人检测数据集
URL:https://github.com/QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas
标签:#应急响应
更新了:应急响应
描述:深度学习目标检测算法YOLOV8如何训练无人机搜救人员数据集 如何应用与灾害应急响应、AI智能搜救、无人机自主识别人员检测 无人机航拍行人检测数据集
URL:https://github.com/QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas
标签:#应急响应
GitHub监控消息提醒!!!
更新了:RCE
描述:Laravel < 8.4.2 RCE exploit
URL:https://github.com/crypt0lith/laravel-rce
标签:#RCE
更新了:RCE
描述:Laravel < 8.4.2 RCE exploit
URL:https://github.com/crypt0lith/laravel-rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and malspam Evidence
URL:https://github.com/ryan-har-plymouth/comp3010hk-set-exercise
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and malspam Evidence
URL:https://github.com/ryan-har-plymouth/comp3010hk-set-exercise
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CTT-Refraction-Vortex-CVE-2026-7731-
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CTT-Refraction-Vortex-CVE-2026-7731-
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:绕过
描述:用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare Turnstile 验证码
URL:https://github.com/XCQ0607/katabump
标签:#绕过
更新了:绕过
描述:用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare Turnstile 验证码
URL:https://github.com/XCQ0607/katabump
标签:#绕过
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CTT-Terrminus-Vortex (CVE-2026-2406)
URL:https://github.com/SimoesCTT/CTT-Sovereign-Vortex
标签:#CVE-2026
更新了:CVE-2026
描述:CTT-Terrminus-Vortex (CVE-2026-2406)
URL:https://github.com/SimoesCTT/CTT-Sovereign-Vortex
标签:#CVE-2026