监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:绕过
描述:一个基于 Go + CGO + DPDK + librdkafka 构建的高性能流量采集探针。它利用 DPDK 绕过内核直接从网卡收包(Zero-Copy rx),并将数据包封装后高效推送到 Kafka 集群。
URL:https://github.com/randolphcyg/capturer
标签:#绕过
更新了:绕过
描述:一个基于 Go + CGO + DPDK + librdkafka 构建的高性能流量采集探针。它利用 DPDK 绕过内核直接从网卡收包(Zero-Copy rx),并将数据包封装后高效推送到 Kafka 集群。
URL:https://github.com/randolphcyg/capturer
标签:#绕过
GitHub监控消息提醒!!!
更新了:渗透测试
描述:CUC_渗透测试与安全评估
URL:https://github.com/SakuraZubuki/CUC_Penetration-testing-and-security-assessments
标签:#渗透测试
更新了:渗透测试
描述:CUC_渗透测试与安全评估
URL:https://github.com/SakuraZubuki/CUC_Penetration-testing-and-security-assessments
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:反序列化
描述:序列化/反序列化框架
URL:https://github.com/gogohusky-lgtm/Smart_environment_monitor
标签:#反序列化
更新了:反序列化
描述:序列化/反序列化框架
URL:https://github.com/gogohusky-lgtm/Smart_environment_monitor
标签:#反序列化
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/franckferman/CVE_2026_24061_PoC
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/franckferman/CVE_2026_24061_PoC
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:RCE
描述:Uses CrewAI Multi Agentic System to showcase memory poisoning with RAG workflow for a zero click RCE.
URL:https://github.com/AkhilSharma90/Bsides-Workshop-Demo-Agent-RCE-Zero-Click-Attack
标签:#RCE
更新了:RCE
描述:Uses CrewAI Multi Agentic System to showcase memory poisoning with RAG workflow for a zero click RCE.
URL:https://github.com/AkhilSharma90/Bsides-Workshop-Demo-Agent-RCE-Zero-Click-Attack
标签:#RCE
GitHub监控消息提醒!!!
更新了:代码审计
描述:nday与源码的收集,以便兄弟们代码审计使用
URL:https://github.com/imjianglee/SystemSentinel-
标签:#代码审计
更新了:代码审计
描述:nday与源码的收集,以便兄弟们代码审计使用
URL:https://github.com/imjianglee/SystemSentinel-
标签:#代码审计
GitHub监控消息提醒!!!
更新了:护网
描述:一款用于检测网站安全的软件,底层逻辑为漏洞检测,可以检测XSS,CSRF等多项漏洞,底层还设有SM3的国密算法,可以保护用户数据,除此之外,包含有优化算法,强化学习,边缘算法以及优化推荐策略。
URL:https://github.com/17-debryne/-
标签:#护网
更新了:护网
描述:一款用于检测网站安全的软件,底层逻辑为漏洞检测,可以检测XSS,CSRF等多项漏洞,底层还设有SM3的国密算法,可以保护用户数据,除此之外,包含有优化算法,强化学习,边缘算法以及优化推荐策略。
URL:https://github.com/17-debryne/-
标签:#护网
GitHub监控消息提醒!!!
更新了:信息收集
描述:一款红队在信息收集时规避IP封禁的傻瓜式一键代理池,通过大量代理节点轮询的代理池工具
URL:https://github.com/Yn8rt/Befree
标签:#信息收集
更新了:信息收集
描述:一款红队在信息收集时规避IP封禁的傻瓜式一键代理池,通过大量代理节点轮询的代理池工具
URL:https://github.com/Yn8rt/Befree
标签:#信息收集
GitHub监控消息提醒!!!
更新了:RCE
描述:우리FISA 기술세미나 3팀: React Server Component의 RCE 취약점인 'React2Shell (CVE-2025-55182)' 분석 및 연구
URL:https://github.com/woorifisa-service-dev-6th/tech-seminar-React2Shell
标签:#RCE
更新了:RCE
描述:우리FISA 기술세미나 3팀: React Server Component의 RCE 취약점인 'React2Shell (CVE-2025-55182)' 분석 및 연구
URL:https://github.com/woorifisa-service-dev-6th/tech-seminar-React2Shell
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:OSCP-style penetration test walkthrough of the VulnHub DC-1 machine (Drupal 7 → RCE → root).
URL:https://github.com/Nevtech05/DC-1_VulnHub.com_WriteUp
标签:#RCE
更新了:RCE
描述:OSCP-style penetration test walkthrough of the VulnHub DC-1 machine (Drupal 7 → RCE → root).
URL:https://github.com/Nevtech05/DC-1_VulnHub.com_WriteUp
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:POC Script for CVE-2026-24061 (GNU Telnetd Exploit)
URL:https://github.com/X-croot/CVE-2026-24061_POC
标签:#CVE-2026
更新了:CVE-2026
描述:POC Script for CVE-2026-24061 (GNU Telnetd Exploit)
URL:https://github.com/X-croot/CVE-2026-24061_POC
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CTT-MICROSOFT-OFFICE-OLE-MANIFOLD-BYPASS-CVE-2026-21509
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CTT-MICROSOFT-OFFICE-OLE-MANIFOLD-BYPASS-CVE-2026-21509
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CVE-2026-21509-Microsoft-Office-OLE-Manifold-Bypass
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CVE-2026-21509-Microsoft-Office-OLE-Manifold-Bypass
标签:#CVE-2026
GitHub监控消息提醒!!!
更新了:RCE
描述:A high-performance C++ Web Application Firewall (WAF) protecting against SQLi, XSS, and RCE.
URL:https://github.com/Asttr0/SentiLight
标签:#RCE
更新了:RCE
描述:A high-performance C++ Web Application Firewall (WAF) protecting against SQLi, XSS, and RCE.
URL:https://github.com/Asttr0/SentiLight
标签:#RCE
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Web 安全渗透测试工具,包含端点发现、跨域消息追踪、原型污染检测、词表生成和 DOM XSS 检测
URL:https://github.com/Zacarx/VulnRadar
标签:#渗透测试
更新了:渗透测试
描述:Web 安全渗透测试工具,包含端点发现、跨域消息追踪、原型污染检测、词表生成和 DOM XSS 检测
URL:https://github.com/Zacarx/VulnRadar
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-1281
URL:https://github.com/Ashwesker/Ashwesker-CVE-2026-1281
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-1281
URL:https://github.com/Ashwesker/Ashwesker-CVE-2026-1281
标签:#CVE-2026