🚨 GitHub 监控消息提醒
🚨 发现关键词: #渗透 #测试
📦 项目名称: pentest-skills
👤 项目作者: crazyMarky
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 16:05:32
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #渗透 #测试
📦 项目名称: pentest-skills
👤 项目作者: crazyMarky
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 16:05:32
📝 项目描述:
Forget complex command lines. Complete professional penetration testing with natural language.告别复杂的命令行,用自然语言完成专业渗透测试。🔗 点击访问项目地址
GitHub
GitHub - crazyMarky/pentest-skills: Forget complex command lines. Complete professional penetration testing with natural langu…
Forget complex command lines. Complete professional penetration testing with natural language.告别复杂的命令行,用自然语言完成专业渗透测试。 - crazyMarky/pentest-skills
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #EDR
📦 项目名称: googledrive-bypass
👤 项目作者: Clovie8
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 17:00:27
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #EDR
📦 项目名称: googledrive-bypass
👤 项目作者: Clovie8
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 17:00:27
📝 项目描述:
Bypass Google Virus warning page with download anyway button when your trying to download larger file from google drive >100 MBs🔗 点击访问项目地址
GitHub
GitHub - Clovie8/googledrive-bypass: Bypass Google Virus warning page with download anyway button when your trying to download…
Bypass Google Virus warning page with download anyway button when your trying to download larger file from google drive >100 MBs - Clovie8/googledrive-bypass
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: agent-fetch
👤 项目作者: Parassharmaa
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 18:01:00
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: agent-fetch
👤 项目作者: Parassharmaa
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 18:01:00
📝 项目描述:
Sandboxed HTTP client with SSRF protection for AI agents. Prevents DNS rebinding, blocks private IPs, and validates every connection — available as a Rust crate and npm package.🔗 点击访问项目地址
GitHub
GitHub - Parassharmaa/agent-fetch: Sandboxed HTTP client with SSRF protection for AI agents. Prevents DNS rebinding, blocks private…
Sandboxed HTTP client with SSRF protection for AI agents. Prevents DNS rebinding, blocks private IPs, and validates every connection — available as a Rust crate and npm package. - Parassharmaa/agen...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Command
📦 项目名称: hermes
👤 项目作者: 0xbbuddha
🛠 开发语言: Python
⭐ Star数量: 10 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-07 17:56:23
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Command
📦 项目名称: hermes
👤 项目作者: 0xbbuddha
🛠 开发语言: Python
⭐ Star数量: 10 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-07 17:56:23
📝 项目描述:
A Python agent targeting Linux for Mythic C2🔗 点击访问项目地址
GitHub
GitHub - 0xbbuddha/hermes: A Python agent targeting Linux for Mythic C2
A Python agent targeting Linux for Mythic C2. Contribute to 0xbbuddha/hermes development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Extension
📦 项目名称: venom-cache
👤 项目作者: invaen
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 17:44:51
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Extension
📦 项目名称: venom-cache
👤 项目作者: invaen
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 17:44:51
📝 项目描述:
Web cache poisoning detection from the command line. No Burp Suite required.🔗 点击访问项目地址
GitHub
GitHub - invaen/venom-cache: Web cache poisoning detection from the command line. No Burp Suite required.
Web cache poisoning detection from the command line. No Burp Suite required. - invaen/venom-cache
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: cve-2026-21509
👤 项目作者: PinPin1140
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 19:14:24
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: cve-2026-21509
👤 项目作者: PinPin1140
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 19:14:24
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
PinPin1140/cve-2026-21509
Contribute to PinPin1140/cve-2026-21509 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: ModioDirect
👤 项目作者: Therootexec
🛠 开发语言: Python
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 20:01:08
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: ModioDirect
👤 项目作者: Therootexec
🛠 开发语言: Python
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 20:01:08
📝 项目描述:
ModioDirect is a lightweight, single-file CLI that reliably downloads mods straight from mod.io via the official API—safe, fast, and free for use. Supports manual API-key downloads, bypassing the official client. Works with Space Engineers, SnowRunner, and more.🔗 点击访问项目地址
GitHub
GitHub - Therootexec/ModioDirect: ModioDirect is a lightweight, single-file CLI that reliably downloads mods straight from mod.io…
ModioDirect is a lightweight, single-file CLI that reliably downloads mods straight from mod.io via the official API—safe, fast, and free for use. Supports manual API-key downloads, bypassing the o...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Command
📦 项目名称: Backdoor
👤 项目作者: Salahidk
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 20:02:53
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Command
📦 项目名称: Backdoor
👤 项目作者: Salahidk
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 20:02:53
📝 项目描述:
🛡️ A Python-based Backdoor Proof-of-Concept (PoC) demonstrating C2 communication, persistence mechanisms, and remote command execution for educational analysis.🔗 点击访问项目地址
GitHub
Salahidk/Backdoor
🛡️ A Python-based Backdoor Proof-of-Concept (PoC) demonstrating C2 communication, persistence mechanisms, and remote command execution for educational analysis. - Salahidk/Backdoor
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Plugin #Extension
📦 项目名称: BurpAIAnalyst
👤 项目作者: TheDudesRepo
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 21:02:29
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Plugin #Extension
📦 项目名称: BurpAIAnalyst
👤 项目作者: TheDudesRepo
🛠 开发语言: Java
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 21:02:29
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - TheDudesRepo/BurpAIAnalyst
Contribute to TheDudesRepo/BurpAIAnalyst development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-25731
👤 项目作者: dxlerYT
🛠 开发语言: None
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 21:37:01
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-25731
👤 项目作者: dxlerYT
🛠 开发语言: None
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 21:37:01
📝 项目描述:
Proof of Concept for a Server-Side Template Injection (SSTI) vulnerability in Calibre’s Templite engine (GHSA-xrh9-w7qx-3gcc). Demonstrates arbitrary Python code execution via user-supplied HTML export templates in affected versions (≤ 9.1.0).🔗 点击访问项目地址
GitHub
GitHub - dxlerYT/CVE-2026-25731: Proof of Concept for a Server-Side Template Injection (SSTI) vulnerability in Calibre’s Templite…
Proof of Concept for a Server-Side Template Injection (SSTI) vulnerability in Calibre’s Templite engine (GHSA-xrh9-w7qx-3gcc). Demonstrates arbitrary Python code execution via user-supplied HTML ex...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: WEB-Scanner
👤 项目作者: 0warn
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-07 21:54:51
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: WEB-Scanner
👤 项目作者: 0warn
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-07 21:54:51
📝 项目描述:
🔍! This is the WEB-scanner tool which is made for reduse time for scanning vulnerability on website. This noscript has the power to detect sql, xss, CSRF, file & command injection on the url of website.🔗 点击访问项目地址
GitHub
GitHub - 0warn/WEB-Scanner: 🔍! This is the WEB-scanner tool which is made for reduse time for scanning vulnerability on website.…
🔍! This is the WEB-scanner tool which is made for reduse time for scanning vulnerability on website. This noscript has the power to detect sql, xss, CSRF, file & command injection on the url ...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: wreq-js
👤 项目作者: sqdshguy
🛠 开发语言: TypeScript
⭐ Star数量: 13 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-07 23:01:28
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: wreq-js
👤 项目作者: sqdshguy
🛠 开发语言: TypeScript
⭐ Star数量: 13 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-07 23:01:28
📝 项目描述:
Node.js/TypeScript HTTP client with browser TLS fingerprint impersonation (JA3/JA4). Bypass Cloudflare and anti-bot detection. Rust-powered, fetch()-compatible.🔗 点击访问项目地址
GitHub
GitHub - sqdshguy/wreq-js: Node.js/TypeScript HTTP client with browser TLS fingerprint impersonation (JA3/JA4). Bypass Cloudflare…
Node.js/TypeScript HTTP client with browser TLS fingerprint impersonation (JA3/JA4). Bypass Cloudflare and anti-bot detection. Rust-powered, fetch()-compatible. - sqdshguy/wreq-js
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Framework #Server
📦 项目名称: C2_cpts
👤 项目作者: stina-sh
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 23:01:26
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Framework #Server
📦 项目名称: C2_cpts
👤 项目作者: stina-sh
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 23:01:26
📝 项目描述:
a minimal C2 implementation for taking the CPTS exam 🔗 点击访问项目地址
GitHub
GitHub - stina-sh/C2_cpts: a minimal C2 implementation for taking the CPTS exam
a minimal C2 implementation for taking the CPTS exam - GitHub - stina-sh/C2_cpts: a minimal C2 implementation for taking the CPTS exam
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Credential Dumping
📦 项目名称: Password-Cracking-Credential-Attack-Suite
👤 项目作者: Tatyasaheb-27
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 22:58:09
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Credential Dumping
📦 项目名称: Password-Cracking-Credential-Attack-Suite
👤 项目作者: Tatyasaheb-27
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 22:58:09
📝 项目描述:
This project focuses on the design and development of a practical toolkit for password policy testing and credential security assessment. Weak passwords are among the most exploited vulnerabilities in cybersecurity. Attackers commonly use dictionary attacks, credential dumping, and brute-force techniques to gain unauthorized access to systems.🔗 点击访问项目地址
GitHub
GitHub - Tatyasaheb-27/Password-Cracking-Credential-Attack-Suite: This project focuses on the design and development of a practical…
This project focuses on the design and development of a practical toolkit for password policy testing and credential security assessment. Weak passwords are among the most exploited vulnerabilities...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-0770-PoC
👤 项目作者: affix
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 23:35:05
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-0770-PoC
👤 项目作者: affix
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 23:35:05
📝 项目描述:
Proof of Concept for CVE-2026-0770 - Langflow Remote Code Execution🔗 点击访问项目地址
GitHub
GitHub - affix/CVE-2026-0770-PoC: Proof of Concept for CVE-2026-0770 - Langflow Remote Code Execution
Proof of Concept for CVE-2026-0770 - Langflow Remote Code Execution - affix/CVE-2026-0770-PoC
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: VulnLabz
👤 项目作者: l0s0s
🛠 开发语言: Go
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 23:30:06
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: VulnLabz
👤 项目作者: l0s0s
🛠 开发语言: Go
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 23:30:06
📝 项目描述:
🧪 VulnLabz is a hacker-style test lab for your web app: run security regression scenarios (SQLi, IDOR, SSRF, brute force) and catch broken defenses before release.🔗 点击访问项目地址
GitHub
GitHub - l0s0s/VulnLabz: 🧪 VulnLabz is a hacker-style test lab for your web app: run security regression scenarios (SQLi, IDOR…
🧪 VulnLabz is a hacker-style test lab for your web app: run security regression scenarios (SQLi, IDOR, SSRF, brute force) and catch broken defenses before release. - l0s0s/VulnLabz
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: cybervolcano.github.io
👤 项目作者: CyberVolcano
🛠 开发语言: CSS
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 23:29:28
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: cybervolcano.github.io
👤 项目作者: CyberVolcano
🛠 开发语言: CSS
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-07 23:29:28
📝 项目描述:
a webpage for the occasional CSRF CTF style post request challenge🔗 点击访问项目地址
GitHub
GitHub - CyberVolcano/cybervolcano.github.io: a webpage for the occasional CSRF CTF style post request challenge
a webpage for the occasional CSRF CTF style post request challenge - CyberVolcano/cybervolcano.github.io
🚨 GitHub 监控消息提醒
🚨 发现关键词: #注入 #命令
📦 项目名称: baidu-cookie-manager
👤 项目作者: 1837620622
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-08 01:01:09
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #注入 #命令
📦 项目名称: baidu-cookie-manager
👤 项目作者: 1837620622
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-08 01:01:09
📝 项目描述:
🍪 百度Cookie自动保活工具 | BDUSS验证+注入登录+定时保活 | 4方法交叉验证+投票机制 | Python自动化脚本 | Selenium+Requests | 百度贴吧/网盘/好看视频全平台保活🔗 点击访问项目地址
GitHub
GitHub - 1837620622/baidu-cookie-manager: 🍪 百度Cookie自动保活工具 | BDUSS验证+注入登录+定时保活 | 4方法交叉验证+投票机制 | Python自动化脚本 | Selenium+Requests…
🍪 百度Cookie自动保活工具 | BDUSS验证+注入登录+定时保活 | 4方法交叉验证+投票机制 | Python自动化脚本 | Selenium+Requests | 百度贴吧/网盘/好看视频全平台保活 - 1837620622/baidu-cookie-manager
🚨 GitHub 监控消息提醒
🚨 发现关键词: #漏洞 #EXP #POC #利用 #复现 #扫描 #检测 #挖掘 #分析
📦 项目名称: wxvuln
👤 项目作者: Ice-001
🛠 开发语言: Python
⭐ Star数量: 53 | 🍴 Fork数量: 14
📅 更新时间: 2026-02-08 01:27:48
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #漏洞 #EXP #POC #利用 #复现 #扫描 #检测 #挖掘 #分析
📦 项目名称: wxvuln
👤 项目作者: Ice-001
🛠 开发语言: Python
⭐ Star数量: 53 | 🍴 Fork数量: 14
📅 更新时间: 2026-02-08 01:27:48
📝 项目描述:
自动抓取微信公众号安全漏洞文章,转换为Markdown格式并建立本地知识库,每日持续更新。本项目(https://github.com/4ESTSEC/wxvl) [基于] [原版wxvl](https://github.com/20142995/wxvl) 进行扩展。🔗 点击访问项目地址
GitHub
GitHub - Ice-001/wxvuln: 自动抓取微信公众号安全漏洞文章,转换为Markdown格式并建立本地知识库,每日持续更新。本项目(https://github.com/4ESTSEC/wxvl) [基于] [原版wxvl](https…
自动抓取微信公众号安全漏洞文章,转换为Markdown格式并建立本地知识库,每日持续更新。本项目(https://github.com/4ESTSEC/wxvl) [基于] [原版wxvl](https://github.com/20142995/wxvl) 进行扩展。 - Ice-001/wxvuln
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: nextjs-csrf-token
👤 项目作者: rwx222
🛠 开发语言: TypeScript
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-08 01:38:14
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: nextjs-csrf-token
👤 项目作者: rwx222
🛠 开发语言: TypeScript
⭐ Star数量: 3 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-08 01:38:14
📝 项目描述:
Next.js and csrf tokens🔗 点击访问项目地址
GitHub
GitHub - rwx222/nextjs-csrf-token: Next.js and csrf tokens
Next.js and csrf tokens. Contribute to rwx222/nextjs-csrf-token development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Attack
📦 项目名称: OGT-Cyber-Game
👤 项目作者: RUANZITO1111
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-08 01:58:13
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Attack
📦 项目名称: OGT-Cyber-Game
👤 项目作者: RUANZITO1111
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-08 01:58:13
📝 项目描述:
🎮 Master web security vulnerabilities through interactive levels and real attack simulations with the OGT Cybersecurity Learning Game.🔗 点击访问项目地址
GitHub
GitHub - RUANZITO1111/OGT-Cyber-Game: 🎮 Master web security vulnerabilities through interactive levels and real attack simulations…
🎮 Master web security vulnerabilities through interactive levels and real attack simulations with the OGT Cybersecurity Learning Game. - RUANZITO1111/OGT-Cyber-Game