监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:RCE
描述:Script to quick check CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) - Critical unauthenticated RCE vulnerabilities in the React Server Components (RSC) “Flight” protocol.
URL:https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
标签:#RCE
更新了:RCE
描述:Script to quick check CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) - Critical unauthenticated RCE vulnerabilities in the React Server Components (RSC) “Flight” protocol.
URL:https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:iOS app that does stuff with CVE-2025-24091
URL:https://github.com/rooootdev/evilnotify
标签:#CVE-2025
更新了:CVE-2025
描述:iOS app that does stuff with CVE-2025-24091
URL:https://github.com/rooootdev/evilnotify
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Script to quick check CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) - Critical unauthenticated RCE vulnerabilities in the React Server Components (RSC) “Flight” protocol.
URL:https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js-
标签:#CVE-2025
更新了:CVE-2025
描述:Script to quick check CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) - Critical unauthenticated RCE vulnerabilities in the React Server Components (RSC) “Flight” protocol.
URL:https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploit and test stand for CVE-2025-41115
URL:https://github.com/I3r1h0n/GrafanaSCIMalform
标签:#CVE-2025
更新了:CVE-2025
描述:Exploit and test stand for CVE-2025-41115
URL:https://github.com/I3r1h0n/GrafanaSCIMalform
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Public exploit for CVE-2025-41744
URL:https://github.com/gromila7813/CVE-2025-41744
标签:#CVE-2025
更新了:CVE-2025
描述:Public exploit for CVE-2025-41744
URL:https://github.com/gromila7813/CVE-2025-41744
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Understanding prompt injection SSRF, RCE and other stuff
URL:https://github.com/noypearl/PromptInjectionPoC
标签:#RCE
更新了:RCE
描述:Understanding prompt injection SSRF, RCE and other stuff
URL:https://github.com/noypearl/PromptInjectionPoC
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-24091
URL:https://github.com/TS0NW0RK/CVE-2025-24091
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-24091
URL:https://github.com/TS0NW0RK/CVE-2025-24091
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Red Team
描述:Blue Team vs Red Team fight in a Wi-Fi enabled scenario
URL:https://github.com/NS-Projects-Unina/WiFi_Blue_vs_Red_1
标签:#Red Team
更新了:Red Team
描述:Blue Team vs Red Team fight in a Wi-Fi enabled scenario
URL:https://github.com/NS-Projects-Unina/WiFi_Blue_vs_Red_1
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-13372
URL:https://github.com/Ashwesker/Blackash-CVE-2025-13372
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-13372
URL:https://github.com/Ashwesker/Blackash-CVE-2025-13372
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/Shiva108/ai-llm-red-team-handbook
标签:#Red Team
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/Shiva108/ai-llm-red-team-handbook
标签:#Red Team
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:🛠️ Leverage BOF Spawn for advanced process injection and shellcode execution with evasion techniques to enhance your Cobalt Strike operations.
URL:https://github.com/KaztoRay/Cardinal-C2-Framework
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:🛠️ Leverage BOF Spawn for advanced process injection and shellcode execution with evasion techniques to enhance your Cobalt Strike operations.
URL:https://github.com/KaztoRay/Cardinal-C2-Framework
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/laowang111101/tpUlcWKBAT
标签:#应急响应
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/laowang111101/tpUlcWKBAT
标签:#应急响应
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/kevinyang5771323/YXZgWWDpWA
标签:#应急响应
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/kevinyang5771323/YXZgWWDpWA
标签:#应急响应
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一个用于 AI 驱动的渗透测试竞赛的**模型上下文协议 (MCP)** 服务器。该工 具提供了一个完整的 API 接口,使 LLM 能够自主参与 CTF 挑战。
URL:https://github.com/m-sec-org/ez-xbow-platform-mcp
标签:#渗透测试
更新了:渗透测试
描述:一个用于 AI 驱动的渗透测试竞赛的**模型上下文协议 (MCP)** 服务器。该工 具提供了一个完整的 API 接口,使 LLM 能够自主参与 CTF 挑战。
URL:https://github.com/m-sec-org/ez-xbow-platform-mcp
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/sharma19d/CVE-2025-61148
标签:#CVE-2025
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/sharma19d/CVE-2025-61148
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-59427 Cloudflare & Vite/Wrangler With Simple 403 Bypass
URL:https://github.com/ibnurusdianto/CVE-2025-59427
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-59427 Cloudflare & Vite/Wrangler With Simple 403 Bypass
URL:https://github.com/ibnurusdianto/CVE-2025-59427
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔒 Manage your server's IP whitelist with ease using iptables, featuring backup, logging, and interactive modes for Red Team vs Blue Team competitions.
URL:https://github.com/DEVayman20/firewall-whitelist-admin
标签:#Red Team
更新了:Red Team
描述:🔒 Manage your server's IP whitelist with ease using iptables, featuring backup, logging, and interactive modes for Red Team vs Blue Team competitions.
URL:https://github.com/DEVayman20/firewall-whitelist-admin
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept exploit for the Untrusted Pointer Dereference vulnerability in Windows Graphics Component (CVE-2025-50165).
URL:https://github.com/useci-sys/CVE-2025-50165
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept exploit for the Untrusted Pointer Dereference vulnerability in Windows Graphics Component (CVE-2025-50165).
URL:https://github.com/useci-sys/CVE-2025-50165
标签:#CVE-2025