🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Scanner
📦 项目名称: xss-vulnerability-finder
👤 项目作者: diablosix
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 04:59:50
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Scanner
📦 项目名称: xss-vulnerability-finder
👤 项目作者: diablosix
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 04:59:50
📝 项目描述:
-grade XSS vulnerability scanner with web UI🔗 点击访问项目地址
GitHub
GitHub - diablosix/xss-vulnerability-finder: -grade XSS vulnerability scanner with web UI
-grade XSS vulnerability scanner with web UI. Contribute to diablosix/xss-vulnerability-finder development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Webshell
📦 项目名称: Boot2root
👤 项目作者: jesuismarie
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 06:00:59
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Webshell
📦 项目名称: Boot2root
👤 项目作者: jesuismarie
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 06:00:59
📝 项目描述:
[⚠️ In Progress] This project is a CTF-style vulnerable virtual machine designed for hands-on penetration testing and cybersecurity training. Root the box by exploiting misconfigurations, weak credentials, and privilege escalation paths. Ideal for practicing ethical hacking skills in a controlled lab environment.🔗 点击访问项目地址
GitHub
GitHub - jesuismarie/Boot2root: [⚠️ In Progress] This project is a CTF-style vulnerable virtual machine designed for hands-on penetration…
[⚠️ In Progress] This project is a CTF-style vulnerable virtual machine designed for hands-on penetration testing and cybersecurity training. Root the box by exploiting misconfigurations, weak cred...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XXE
📦 项目名称: DrakonixReverseShellPlayground
👤 项目作者: meltingscales
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 05:14:31
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XXE
📦 项目名称: DrakonixReverseShellPlayground
👤 项目作者: meltingscales
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 05:14:31
📝 项目描述:
wew sh ; Basic SH/BASH/Python exec()/Ruby deserialization/PHP LFI/PHP RFI/XLST XXE/etc.🔗 点击访问项目地址
GitHub
GitHub - meltingscales/DrakonixReverseShellPlayground: wew sh ; Basic SH/BASH/Python exec()/Ruby deserialization/PHP LFI/PHP RFI/XLST…
wew sh ; Basic SH/BASH/Python exec()/Ruby deserialization/PHP LFI/PHP RFI/XLST XXE/etc. - meltingscales/DrakonixReverseShellPlayground
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: laravel-12-ajax-crud-operation-step-by-step-guide
👤 项目作者: itstuffsolutions
🛠 开发语言: Hack
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 05:19:44
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: laravel-12-ajax-crud-operation-step-by-step-guide
👤 项目作者: itstuffsolutions
🛠 开发语言: Hack
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 05:19:44
📝 项目描述:
Laravel 12 AJAX CRUD example with step-by-step implementation. Learn how to build Create, Read, Update, Delete operations using AJAX in Laravel 12 with validation, CSRF protection, Bootstrap UI, and MySQL database integration. Beginner-friendly project tutorial.🔗 点击访问项目地址
GitHub
GitHub - itstuffsolutions/laravel-12-ajax-crud-operation-step-by-step-guide: Laravel 12 AJAX CRUD example with step-by-step implementation.…
Laravel 12 AJAX CRUD example with step-by-step implementation. Learn how to build Create, Read, Update, Delete operations using AJAX in Laravel 12 with validation, CSRF protection, Bootstrap UI, an...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-
👤 项目作者: mbanyamer
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 08:56:57
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-
👤 项目作者: mbanyamer
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 08:56:57
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-
Contribute to mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell- development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: vuln-mcp-ssrf
👤 项目作者: ecap0-ai
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 08:27:09
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: vuln-mcp-ssrf
👤 项目作者: ecap0-ai
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 08:27:09
📝 项目描述:
Security benchmark MCP server - DO NOT USE IN PRODUCTION🔗 点击访问项目地址
GitHub
GitHub - ecap0-ai/vuln-mcp-ssrf: Security benchmark MCP server - DO NOT USE IN PRODUCTION
Security benchmark MCP server - DO NOT USE IN PRODUCTION - ecap0-ai/vuln-mcp-ssrf
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Attack
📦 项目名称: DOM-XSS-detector-preventing-tool-project
👤 项目作者: 0b0d0
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 10:02:17
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Attack
📦 项目名称: DOM-XSS-detector-preventing-tool-project
👤 项目作者: 0b0d0
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 10:02:17
📝 项目描述:
This project is looking at developing a tool that detects and prevent client side cross site noscripting attacks which is also called, 'DOM XSS'🔗 点击访问项目地址
GitHub
GitHub - 0b0d0/DOM-XSS-detector-preventing-tool-project: This project is looking at developing a tool that detects and prevent…
This project is looking at developing a tool that detects and prevent client side cross site noscripting attacks which is also called, 'DOM XSS' - 0b0d0/DOM-XSS-detector-preventing-tool-project
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server #Client
📦 项目名称: PacketSniffer-AI
👤 项目作者: ayinedjimi
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 10:03:08
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server #Client
📦 项目名称: PacketSniffer-AI
👤 项目作者: ayinedjimi
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 10:03:08
📝 项目描述:
AI-Powered Network Packet Analyzer with ML Anomaly Detection - Scapy/scikit-learn, detects port scans, DNS tunneling, DDoS, C2 beaconing, data exfiltration. For authorized security monitoring only.🔗 点击访问项目地址
GitHub
GitHub - ayinedjimi/PacketSniffer-AI: AI-Powered Network Packet Analyzer with ML Anomaly Detection - Scapy/scikit-learn, detects…
AI-Powered Network Packet Analyzer with ML Anomaly Detection - Scapy/scikit-learn, detects port scans, DNS tunneling, DDoS, C2 beaconing, data exfiltration. For authorized security monitoring only....
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV #Patch
📦 项目名称: brave-scraper-mcp
👤 项目作者: VishnuSuresh2000
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 11:00:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV #Patch
📦 项目名称: brave-scraper-mcp
👤 项目作者: VishnuSuresh2000
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 11:00:58
📝 项目描述:
Stealth web scraping MCP server with Patchright + Xvfb for Brave Search with CAPTCHA bypass🔗 点击访问项目地址
GitHub
GitHub - VishnuSuresh2000/brave-scraper-mcp: Stealth web scraping MCP server with Patchright + Xvfb for Brave Search with CAPTCHA…
Stealth web scraping MCP server with Patchright + Xvfb for Brave Search with CAPTCHA bypass - VishnuSuresh2000/brave-scraper-mcp
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-2441-PoC
👤 项目作者: huseyinstif
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 11:53:46
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-2441-PoC
👤 项目作者: huseyinstif
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 11:53:46
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - huseyinstif/CVE-2026-2441-PoC
Contribute to huseyinstif/CVE-2026-2441-PoC development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV #Filter
📦 项目名称: waterfall
👤 项目作者: 0xffabc
🛠 开发语言: Rust
⭐ Star数量: 4 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-18 12:00:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV #Filter
📦 项目名称: waterfall
👤 项目作者: 0xffabc
🛠 开发语言: Rust
⭐ Star数量: 4 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-18 12:00:58
📝 项目描述:
DPI Bypass tool🔗 点击访问项目地址
GitHub
GitHub - 0xffabc/waterfall: DPI Bypass tool
DPI Bypass tool. Contribute to 0xffabc/waterfall development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Loader #Bypass
📦 项目名称: EphemeralML
👤 项目作者: cyntrisec
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:02:54
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Loader #Bypass
📦 项目名称: EphemeralML
👤 项目作者: cyntrisec
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:02:54
📝 项目描述:
Confidential AI inference with cryptographic proof of ephemeral execution. Loads models inside TEEs, returns embeddings + signed Attested Execution Receipts.🔗 点击访问项目地址
GitHub
GitHub - cyntrisec/EphemeralML: Confidential AI inference with cryptographic proof of ephemeral execution. Loads models inside…
Confidential AI inference with cryptographic proof of ephemeral execution. Loads models inside TEEs, returns embeddings + signed Attested Execution Receipts. - cyntrisec/EphemeralML
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-20700-An-analysis-WIP
👤 项目作者: sundenovak
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:40:34
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-20700-An-analysis-WIP
👤 项目作者: sundenovak
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:40:34
📝 项目描述:
[WORK IN PROGRESS] My analysis of CVE-2026-20700🔗 点击访问项目地址
GitHub
GitHub - sundenovak/CVE-2026-20700-An-analysis-WIP: [WORK IN PROGRESS] My analysis of CVE-2026-20700
[WORK IN PROGRESS] My analysis of CVE-2026-20700. Contribute to sundenovak/CVE-2026-20700-An-analysis-WIP development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject #Execute
📦 项目名称: Code-Analysis-What-Really-Indicates-an-Attack-
👤 项目作者: zerodayhunter543
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:54:18
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject #Execute
📦 项目名称: Code-Analysis-What-Really-Indicates-an-Attack-
👤 项目作者: zerodayhunter543
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:54:18
📝 项目描述:
Beginner analysts often fall into the trap of looking for "suspicious" variable names. They see bStr, payload, shellcode in code and immediately think "attack!"🔗 点击访问项目地址
GitHub
GitHub - zerodayhunter543/Code-Analysis-What-Really-Indicates-an-Attack-: Beginner analysts often fall into the trap of looking…
Beginner analysts often fall into the trap of looking for "suspicious" variable names. They see bStr, payload, shellcode in code and immediately think "attack!" ...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server
📦 项目名称: C2_ServerV2
👤 项目作者: Peter211231231231232131
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 13:02:03
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server
📦 项目名称: C2_ServerV2
👤 项目作者: Peter211231231231232131
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 13:02:03
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - Peter211231231231232131/C2_ServerV2
Contribute to Peter211231231231232131/C2_ServerV2 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-20817
👤 项目作者: oxfemale
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 13:56:30
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-20817
👤 项目作者: oxfemale
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 13:56:30
📝 项目描述:
Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit demonstrating local privilege escalation via WER service. 🔗 点击访问项目地址
GitHub
GitHub - oxfemale/CVE-2026-20817: Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit…
Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit demonstrating local privilege escalation via WER service. - GitHub - oxfemale/CVE-2026-20817: Window...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV
📦 项目名称: SetWindowDisplayAffinity-Bypass
👤 项目作者: Baragoda
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 2
📅 更新时间: 2026-02-18 15:01:24
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV
📦 项目名称: SetWindowDisplayAffinity-Bypass
👤 项目作者: Baragoda
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 2
📅 更新时间: 2026-02-18 15:01:24
📝 项目描述:
📸 Bypass Window Capture Protection on Windows using a non-invasive method without DLL injection or API hooking for educational purposes.🔗 点击访问项目地址
GitHub
GitHub - Baragoda/SetWindowDisplayAffinity-Bypass: 📸 Bypass Window Capture Protection on Windows using a non-invasive method without…
📸 Bypass Window Capture Protection on Windows using a non-invasive method without DLL injection or API hooking for educational purposes. - Baragoda/SetWindowDisplayAffinity-Bypass
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: csrf-middleware
👤 项目作者: linkedcode
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 14:55:53
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: csrf-middleware
👤 项目作者: linkedcode
🛠 开发语言: PHP
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 14:55:53
📝 项目描述:
CsrfMiddleware compatible con SessionMiddleware de Odan🔗 点击访问项目地址
GitHub
GitHub - linkedcode/csrf-middleware: CsrfMiddleware compatible con SessionMiddleware de Odan
CsrfMiddleware compatible con SessionMiddleware de Odan - linkedcode/csrf-middleware
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-0915-json-Patch.-V2.0
👤 项目作者: cyberwulfy200-dev
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 15:53:38
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-0915-json-Patch.-V2.0
👤 项目作者: cyberwulfy200-dev
🛠 开发语言: Shell
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 15:53:38
📝 项目描述:
Patch the Bug - glibc 🔗 点击访问项目地址
GitHub
GitHub - cyberwulfy200-dev/CVE-2026-0915-json-Patch.-V2.0: Patch the Bug - glibc
Patch the Bug - glibc . Contribute to cyberwulfy200-dev/CVE-2026-0915-json-Patch.-V2.0 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Framework #Server #Command #Control
📦 项目名称: ShadowlLine
👤 项目作者: MrEx-Right
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 15:57:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Framework #Server #Command #Control
📦 项目名称: ShadowlLine
👤 项目作者: MrEx-Right
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 15:57:58
📝 项目描述:
ShadowLine: A lightweight post-exploitation tool and C2 infrastructure designed for stealth, persistence, and modern evasion techniques.🔗 点击访问项目地址
GitHub
GitHub - MrEx-Right/ShadowlLine: ShadowLine: A lightweight post-exploitation tool and C2 infrastructure designed for stealth, persistence…
ShadowLine: A lightweight post-exploitation tool and C2 infrastructure designed for stealth, persistence, and modern evasion techniques. - MrEx-Right/ShadowlLine