监控Github上的漏洞、红队等信息。
🚨 GitHub 监控消息提醒

🚨 发现关键词: #Fuzzing

📦 项目名称: Real_Fuzzing
👤 项目作者: RelaxWide
🛠 开发语言: Python
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:05:26

📝 项目描述:
无描述

🔗 点击访问项目地址 GitHub - RelaxWide/Real_Fuzzing
🚨 GitHub 监控消息提醒

🚨 发现关键词: #Shellcode

📦 项目名称: Moonwalk--
👤 项目作者: vaishnavipawar-29
🛠 开发语言: C++
Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:01:30

📝 项目描述:
🚀 Enhance call stack security with Moonwalk--, a PoC that combines Stack Moonwalking and memory self-encryption to protect shellcode from inspection.

🔗 点击访问项目地址 GitHub - vaishnavipawar-29/Moonwalk--: 🚀 Enhance call stack security with Moonwalk--, a PoC that combines Stack Moonwalking and…
🚨 GitHub 监控消息提醒

🚨 发现关键词: #CSRF

📦 项目名称: verify-response
👤 项目作者: michaelhardyluthfi
🛠 开发语言: None
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:05:36

📝 项目描述:
🔍 Ensure reliable outputs from language models with verify_response, a Python package that enforces structured formatting and confidence indicators for accuracy.

🔗 点击访问项目地址 GitHub - michaelhardyluthfi/verify-response: 🔍 Ensure reliable outputs from language models with verify_response, a Python package…
🚨 GitHub 监控消息提醒

🚨 发现关键词: #burp

📦 项目名称: HTB-Writeups
👤 项目作者: savitskiyes-stack
🛠 开发语言: Shell
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:04:46

📝 项目描述:
Мои отчёты по penetration testing на Hack The Box. Навыки: Nmap, Burp Suite, etc.

🔗 点击访问项目地址 GitHub - savitskiyes-stack/HTB-Writeups: Мои отчёты по penetration testing на Hack The Box. Навыки: Nmap, Burp Suite, etc.
🚨 GitHub 监控消息提醒

🚨 发现关键词: #Red Team

📦 项目名称: cyber-os-flutter
👤 项目作者: Nightking002
🛠 开发语言: HTML
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:02:57

📝 项目描述:
🛡️ Enhance mobile cyber security with CYBER_OS, a toolkit for penetration testers and researchers featuring advanced reconnaissance and Red Team utilities.

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #webshell

📦 项目名称: OrionPrime
👤 项目作者: mt801
🛠 开发语言: Rust
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:01:30

📝 项目描述:
⚙️ Streamline edge-computation and predictive analytics in containerized microservices with OrionPrime for a highly available, self-healing solution.

🔗 点击访问项目地址 GitHub - mt801/OrionPrime: ⚙️ Streamline edge-computation and predictive analytics in containerized microservices with OrionPrime…
🚨 GitHub 监控消息提醒

🚨 发现关键词: #bypass

📦 项目名称: http-threat-blocklist
👤 项目作者: ddrimus
🛠 开发语言: None
Star数量: 5 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 02:00:52

📝 项目描述:
A daily-updated blocklist of IP addresses involved in malicious HTTP attacks that bypassed multiple security layers. Ideal for protecting web servers against probing, exploits, and bot traffic.

🔗 点击访问项目地址 GitHub - ddrimus/http-threat-blocklist: A daily-updated blocklist of IP addresses involved in malicious HTTP attacks that bypassed…
🚨 GitHub 监控消息提醒

🚨 发现关键词: #RCE

📦 项目名称: react2shellexploitvisualized
👤 项目作者: imm17
🛠 开发语言: Svelte
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 01:59:50

📝 项目描述:
🔍 Visualize and understand the React2Shell vulnerability with a narrated walkthrough, detailing its impact and secure solutions for React Server Components.

🔗 点击访问项目地址 GitHub - imm17/react2shellexploitvisualized: 🔍 Visualize and understand the React2Shell vulnerability with a narrated walkthrough…
🚨 GitHub 监控消息提醒

🚨 发现关键词: #CVE-2026

📦 项目名称: 0xKern3lCrush-Foreverday-BYOVD-CVE-2026-0828
👤 项目作者: DeathShotXD
🛠 开发语言: None
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-04 01:47:37

📝 项目描述:
Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Driver) TTPs for Ring 0 process termination and physical memory R/W. Researching EDR-Killer patterns, PPL bypasses, and kernel-mode primitives used by MedusaLocker and other threat actors.

🔗 点击访问项目地址 DeathShotXD/0xKern3lCrush-Foreverday-BYOVD-CVE-2026-0828
Back to Top