🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Scanner
📦 项目名称: xss-vulnerability-finder
👤 项目作者: diablosix
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 04:59:50
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Scanner
📦 项目名称: xss-vulnerability-finder
👤 项目作者: diablosix
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 04:59:50
📝 项目描述:
-grade XSS vulnerability scanner with web UI🔗 点击访问项目地址
GitHub
GitHub - diablosix/xss-vulnerability-finder: -grade XSS vulnerability scanner with web UI
-grade XSS vulnerability scanner with web UI. Contribute to diablosix/xss-vulnerability-finder development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Webshell
📦 项目名称: Boot2root
👤 项目作者: jesuismarie
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 06:00:59
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Webshell
📦 项目名称: Boot2root
👤 项目作者: jesuismarie
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 06:00:59
📝 项目描述:
[⚠️ In Progress] This project is a CTF-style vulnerable virtual machine designed for hands-on penetration testing and cybersecurity training. Root the box by exploiting misconfigurations, weak credentials, and privilege escalation paths. Ideal for practicing ethical hacking skills in a controlled lab environment.🔗 点击访问项目地址
GitHub
GitHub - jesuismarie/Boot2root: [⚠️ In Progress] This project is a CTF-style vulnerable virtual machine designed for hands-on penetration…
[⚠️ In Progress] This project is a CTF-style vulnerable virtual machine designed for hands-on penetration testing and cybersecurity training. Root the box by exploiting misconfigurations, weak cred...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XXE
📦 项目名称: DrakonixReverseShellPlayground
👤 项目作者: meltingscales
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 05:14:31
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XXE
📦 项目名称: DrakonixReverseShellPlayground
👤 项目作者: meltingscales
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 05:14:31
📝 项目描述:
wew sh ; Basic SH/BASH/Python exec()/Ruby deserialization/PHP LFI/PHP RFI/XLST XXE/etc.🔗 点击访问项目地址
GitHub
GitHub - meltingscales/DrakonixReverseShellPlayground: wew sh ; Basic SH/BASH/Python exec()/Ruby deserialization/PHP LFI/PHP RFI/XLST…
wew sh ; Basic SH/BASH/Python exec()/Ruby deserialization/PHP LFI/PHP RFI/XLST XXE/etc. - meltingscales/DrakonixReverseShellPlayground
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: laravel-12-ajax-crud-operation-step-by-step-guide
👤 项目作者: itstuffsolutions
🛠 开发语言: Hack
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 05:19:44
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: laravel-12-ajax-crud-operation-step-by-step-guide
👤 项目作者: itstuffsolutions
🛠 开发语言: Hack
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 05:19:44
📝 项目描述:
Laravel 12 AJAX CRUD example with step-by-step implementation. Learn how to build Create, Read, Update, Delete operations using AJAX in Laravel 12 with validation, CSRF protection, Bootstrap UI, and MySQL database integration. Beginner-friendly project tutorial.🔗 点击访问项目地址
GitHub
GitHub - itstuffsolutions/laravel-12-ajax-crud-operation-step-by-step-guide: Laravel 12 AJAX CRUD example with step-by-step implementation.…
Laravel 12 AJAX CRUD example with step-by-step implementation. Learn how to build Create, Read, Update, Delete operations using AJAX in Laravel 12 with validation, CSRF protection, Bootstrap UI, an...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-
👤 项目作者: mbanyamer
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 08:56:57
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-
👤 项目作者: mbanyamer
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 08:56:57
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-
Contribute to mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell- development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: vuln-mcp-ssrf
👤 项目作者: ecap0-ai
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 08:27:09
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: vuln-mcp-ssrf
👤 项目作者: ecap0-ai
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 08:27:09
📝 项目描述:
Security benchmark MCP server - DO NOT USE IN PRODUCTION🔗 点击访问项目地址
GitHub
GitHub - ecap0-ai/vuln-mcp-ssrf: Security benchmark MCP server - DO NOT USE IN PRODUCTION
Security benchmark MCP server - DO NOT USE IN PRODUCTION - ecap0-ai/vuln-mcp-ssrf
🚨 GitHub 监控消息提醒
🚨 发现关键词: #XSS #Attack
📦 项目名称: DOM-XSS-detector-preventing-tool-project
👤 项目作者: 0b0d0
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 10:02:17
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XSS #Attack
📦 项目名称: DOM-XSS-detector-preventing-tool-project
👤 项目作者: 0b0d0
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 10:02:17
📝 项目描述:
This project is looking at developing a tool that detects and prevent client side cross site noscripting attacks which is also called, 'DOM XSS'🔗 点击访问项目地址
GitHub
GitHub - 0b0d0/DOM-XSS-detector-preventing-tool-project: This project is looking at developing a tool that detects and prevent…
This project is looking at developing a tool that detects and prevent client side cross site noscripting attacks which is also called, 'DOM XSS' - 0b0d0/DOM-XSS-detector-preventing-tool-project
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server #Client
📦 项目名称: PacketSniffer-AI
👤 项目作者: ayinedjimi
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 10:03:08
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server #Client
📦 项目名称: PacketSniffer-AI
👤 项目作者: ayinedjimi
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 10:03:08
📝 项目描述:
AI-Powered Network Packet Analyzer with ML Anomaly Detection - Scapy/scikit-learn, detects port scans, DNS tunneling, DDoS, C2 beaconing, data exfiltration. For authorized security monitoring only.🔗 点击访问项目地址
GitHub
GitHub - ayinedjimi/PacketSniffer-AI: AI-Powered Network Packet Analyzer with ML Anomaly Detection - Scapy/scikit-learn, detects…
AI-Powered Network Packet Analyzer with ML Anomaly Detection - Scapy/scikit-learn, detects port scans, DNS tunneling, DDoS, C2 beaconing, data exfiltration. For authorized security monitoring only....
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV #Patch
📦 项目名称: brave-scraper-mcp
👤 项目作者: VishnuSuresh2000
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 11:00:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV #Patch
📦 项目名称: brave-scraper-mcp
👤 项目作者: VishnuSuresh2000
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 11:00:58
📝 项目描述:
Stealth web scraping MCP server with Patchright + Xvfb for Brave Search with CAPTCHA bypass🔗 点击访问项目地址
GitHub
GitHub - VishnuSuresh2000/brave-scraper-mcp: Stealth web scraping MCP server with Patchright + Xvfb for Brave Search with CAPTCHA…
Stealth web scraping MCP server with Patchright + Xvfb for Brave Search with CAPTCHA bypass - VishnuSuresh2000/brave-scraper-mcp
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-2441-PoC
👤 项目作者: huseyinstif
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 11:53:46
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-2441-PoC
👤 项目作者: huseyinstif
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 11:53:46
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - huseyinstif/CVE-2026-2441-PoC
Contribute to huseyinstif/CVE-2026-2441-PoC development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV #Filter
📦 项目名称: waterfall
👤 项目作者: 0xffabc
🛠 开发语言: Rust
⭐ Star数量: 4 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-18 12:00:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV #Filter
📦 项目名称: waterfall
👤 项目作者: 0xffabc
🛠 开发语言: Rust
⭐ Star数量: 4 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-18 12:00:58
📝 项目描述:
DPI Bypass tool🔗 点击访问项目地址
GitHub
GitHub - 0xffabc/waterfall: DPI Bypass tool
DPI Bypass tool. Contribute to 0xffabc/waterfall development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Loader #Bypass
📦 项目名称: EphemeralML
👤 项目作者: cyntrisec
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:02:54
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Loader #Bypass
📦 项目名称: EphemeralML
👤 项目作者: cyntrisec
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:02:54
📝 项目描述:
Confidential AI inference with cryptographic proof of ephemeral execution. Loads models inside TEEs, returns embeddings + signed Attested Execution Receipts.🔗 点击访问项目地址
GitHub
GitHub - cyntrisec/EphemeralML: Confidential AI inference with cryptographic proof of ephemeral execution. Loads models inside…
Confidential AI inference with cryptographic proof of ephemeral execution. Loads models inside TEEs, returns embeddings + signed Attested Execution Receipts. - cyntrisec/EphemeralML
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-20700-An-analysis-WIP
👤 项目作者: sundenovak
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:40:34
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-20700-An-analysis-WIP
👤 项目作者: sundenovak
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:40:34
📝 项目描述:
[WORK IN PROGRESS] My analysis of CVE-2026-20700🔗 点击访问项目地址
GitHub
GitHub - sundenovak/CVE-2026-20700-An-analysis-WIP: [WORK IN PROGRESS] My analysis of CVE-2026-20700
[WORK IN PROGRESS] My analysis of CVE-2026-20700. Contribute to sundenovak/CVE-2026-20700-An-analysis-WIP development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject #Execute
📦 项目名称: Code-Analysis-What-Really-Indicates-an-Attack-
👤 项目作者: zerodayhunter543
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:54:18
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject #Execute
📦 项目名称: Code-Analysis-What-Really-Indicates-an-Attack-
👤 项目作者: zerodayhunter543
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 12:54:18
📝 项目描述:
Beginner analysts often fall into the trap of looking for "suspicious" variable names. They see bStr, payload, shellcode in code and immediately think "attack!"🔗 点击访问项目地址
GitHub
GitHub - zerodayhunter543/Code-Analysis-What-Really-Indicates-an-Attack-: Beginner analysts often fall into the trap of looking…
Beginner analysts often fall into the trap of looking for "suspicious" variable names. They see bStr, payload, shellcode in code and immediately think "attack!" ...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server
📦 项目名称: C2_ServerV2
👤 项目作者: Peter211231231231232131
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 13:02:03
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server
📦 项目名称: C2_ServerV2
👤 项目作者: Peter211231231231232131
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 13:02:03
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - Peter211231231231232131/C2_ServerV2
Contribute to Peter211231231231232131/C2_ServerV2 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-20817
👤 项目作者: oxfemale
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 13:56:30
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-20817
👤 项目作者: oxfemale
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 13:56:30
📝 项目描述:
Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit demonstrating local privilege escalation via WER service. 🔗 点击访问项目地址
GitHub
GitHub - oxfemale/CVE-2026-20817: Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit…
Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit demonstrating local privilege escalation via WER service. - GitHub - oxfemale/CVE-2026-20817: Window...
Forwarded from 🌈盘丝洞防失联|导航|广告|管理✨
Forwarded from Channel Help
This media is not supported in your browser
VIEW IN TELEGRAM
支持5倍验资 【验资:@N9KF】
担保域名:N9.TOP 点击查看
💝 新会员好礼
注册就送28.8U
首存100U赠送28U
二存/三存最高赠送
💝 老会员好礼
电子狂欢每日存款赠送10%
充值笔笔送3%无上限
夜间充值最高可优惠
累计存款|打码|VIP升级送彩金
🔥欢迎各位老板加入N9国际娱乐城!
🔥关注N9官方频道参与更多优惠活动
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Channel Help
Media is too big
VIEW IN TELEGRAM
永久网址
🏆 #球速体育 #豪礼大放送 #高端嫩模 #劳力士手表 #奔驰E300 等大礼等你来豪夺 首存日存彩金送不停
球速体育 大会员再创新高:
👉点击:泰国大老板百家乐存50万出512万 查看记录
👉点击:柬埔寨大盘总喜提42万u查看记录
👉点击:单笔提款530万全网独一档查看记录
🏆平台优势:
#u存u提 每日提款无上限,#大额无忧、随便提
#全球不限ip #免实名、无需绑定手机号码和银行卡
🏆平台
🏆每日存款彩金每日送,每笔存款加赠
🌐官方注册网址: qs724.cc
👉点击:体育赛事推荐:@qsty789
👉点击:福利频道: @PG012456
👉vip客服专属热线,添加客服领取活动福利
👉专属客服: @shiya168
👉双向用户点击: @shiya168_bot
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Channel Help
Media is too big
VIEW IN TELEGRAM
永久网址
🏆#182体育 豪礼大放送、#高端嫩模、劳力士手表、奔驰E300等大礼等你来豪夺 首存日存彩金送不停
182体育 封神榜
12月14号神秘盘总pp电子极速糖果直接炸150万成功提款142万
12月26日实力大哥PA真人豪赢170万成功提款163万
1月7号神秘大哥PG麻将胡了直接爆120万成功提款117万
🏆平台优势:
#公平、公正、公开、 #信誉第一、服务第一
#u存u提 每日提款无上限,#大额无忧、随便提
#全球不限ip #免实名、无需绑定手机号码和银行卡
🏆平台
每日存款彩金每日送,每笔存款加赠
182 体育 #电子 #真人 #0审核包出款 日出亿U
🌐 官方注册网址: 182268.com
🌐 官方福利频道: @vip182ty
🌐专属VIP客服: @vipkf_182ty
🌐双向用户点击: @vipkf_182ty_bot
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Channel Help
2025年12月份,大玩家 赌神附体,狂揽一个亿,可自行验证
永久网址
全网广告费每月投入高达500万
🏆平台优势:
1. #电子真人0审核包出款、#反水无上限
2. #巨额无忧,每日提款不限额度不限次数
3.
4、#不限ip、#免实名,无需绑手机号、信息安全有保障
🏆Y3 国际 全站封神榜:
8月13号 神秘玩家仅用300u爆奖140万u,成功提款1088888u
8月16号 反水1700u仅用80u爆奖54万u,成功提款60万u
10月10号 大哥在PG麻将胡了爆奖260万u,成功提款210万u
12月6号 神秘盘总PA真人豪赢400万u,成功提款370万u
#反水无上限 日提无上限 日出千万
每日存款彩金每日送,每笔存款加赠
🌐官网注册链接: y30469.com
🌐Y3国际专属客服: @Y3vip9
🌐双向用户点击: @Y3VIP_bot
🏆更多优惠活动关注福利频道: @Y3vip18
Please open Telegram to view this post
VIEW IN TELEGRAM