监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC: CVE-2025-55182 (React) and CVE-2025-66478 (Next.js)
URL:https://github.com/nehkark/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:PoC: CVE-2025-55182 (React) and CVE-2025-66478 (Next.js)
URL:https://github.com/nehkark/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cooolis-ms is a tool that incorporates the Metasploit Payload Loader, Cobalt Strike External C2 Loader, and Reflective DLL injection.
URL:https://github.com/otuhsgcasg/Cooolis-ms-C2-Loader-Metasploit
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cooolis-ms is a tool that incorporates the Metasploit Payload Loader, Cobalt Strike External C2 Loader, and Reflective DLL injection.
URL:https://github.com/otuhsgcasg/Cooolis-ms-C2-Loader-Metasploit
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:研究CVE-2025-55182全版本利用漏洞
URL:https://github.com/Rat5ak/CVE-2025-55182-React2Shell-RCE-POC
标签:#CVE-2025
更新了:CVE-2025
描述:研究CVE-2025-55182全版本利用漏洞
URL:https://github.com/Rat5ak/CVE-2025-55182-React2Shell-RCE-POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:研究CVE-2025-55182全版本利用漏洞
URL:https://github.com/XiaomingX/CVE-2025-55182-poc
标签:#CVE-2025
更新了:CVE-2025
描述:研究CVE-2025-55182全版本利用漏洞
URL:https://github.com/XiaomingX/CVE-2025-55182-poc
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit/PoC code for CVE-2025-1913
URL:https://github.com/S0haib518-KSA/CVE-2025-1913-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit/PoC code for CVE-2025-1913
URL:https://github.com/S0haib518-KSA/CVE-2025-1913-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Interactive RCE Web Shell (CVE-2025-55182) BY Golden-Security
URL:https://github.com/Golden-Secure/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Interactive RCE Web Shell (CVE-2025-55182) BY Golden-Security
URL:https://github.com/Golden-Secure/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:React Server Components 远程代码执行漏洞(CVE-2025-55182)
URL:https://github.com/GelukCrab/React-Server-Components-RCE
标签:#RCE
更新了:RCE
描述:React Server Components 远程代码执行漏洞(CVE-2025-55182)
URL:https://github.com/GelukCrab/React-Server-Components-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:浅谈React Server Components RCE 漏洞分析
URL:https://github.com/Airis101/CVE-2025-55182-analysis
标签:#CVE-2025
更新了:CVE-2025
描述:浅谈React Server Components RCE 漏洞分析
URL:https://github.com/Airis101/CVE-2025-55182-analysis
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Docker lab for CVE-2025-55182 detection and exploitation
URL:https://github.com/l4rm4nd/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Docker lab for CVE-2025-55182 detection and exploitation
URL:https://github.com/l4rm4nd/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:An analysis of CVE-2025-55182 and CVE-2025-66478 -- the vulnerabilities behind React2Shell. Tools, technical information, etc
URL:https://github.com/freeqaz/react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:An analysis of CVE-2025-55182 and CVE-2025-66478 -- the vulnerabilities behind React2Shell. Tools, technical information, etc
URL:https://github.com/freeqaz/react2shell
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2021-3007 Vulnerable Test Environment - Laminas/Zend Framework Deserialization RCE
URL:https://github.com/KrE80r/cve-2021-3007-vulnerable
标签:#RCE
更新了:RCE
描述:CVE-2021-3007 Vulnerable Test Environment - Laminas/Zend Framework Deserialization RCE
URL:https://github.com/KrE80r/cve-2021-3007-vulnerable
标签:#RCE
GitHub监控消息提醒!!!
更新了:burp
描述:sql-injection, burp suite, bypass validation, sql map
URL:https://github.com/PoeenCy/web-ctf-challenge
标签:#burp
更新了:burp
描述:sql-injection, burp suite, bypass validation, sql map
URL:https://github.com/PoeenCy/web-ctf-challenge
标签:#burp
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/aingram702/Recon-Superpowers
标签:#Red Team
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/aingram702/Recon-Superpowers
标签:#Red Team
GitHub监控消息提醒!!!
更新了:免杀
描述:SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
URL:https://github.com/6yx1n/sharkBlind
标签:#免杀
更新了:免杀
描述:SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
URL:https://github.com/6yx1n/sharkBlind
标签:#免杀
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Elitamz/Cobalt-Strike-csload-plugin
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Elitamz/Cobalt-Strike-csload-plugin
标签:#bypass AntiVirus
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:lab_demo CVE-2025-55182
URL:https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:lab_demo CVE-2025-55182
URL:https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:基于 CVE-2025-55182 burpsuite 被动扫描插件
URL:https://github.com/Pizz33/CVE-2025-55182-burpscanner
标签:#CVE-2025
更新了:CVE-2025
描述:基于 CVE-2025-55182 burpsuite 被动扫描插件
URL:https://github.com/Pizz33/CVE-2025-55182-burpscanner
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/Ashwesker/Blackash-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/Ashwesker/Blackash-CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite
标签:#Red Team
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite
标签:#Red Team