🌈Github红队资源监控✨ – Telegram
🌈Github红队资源监控
13.2K subscribers
20 photos
10 videos
13.8K links
监控Github上的漏洞、红队等信息。
Download Telegram
🚨 GitHub 监控消息提醒

🚨 发现关键词: #XSS #Attack

📦 项目名称: Web-Security-Project-Demo
👤 项目作者: wolfibleah
🛠 开发语言: HTML
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 18:49:33

📝 项目描述:
Full-stack web application demonstrating authentication, web vulnerabilities (XSS, SQLi), attack simulations, logging analysis, SSO with OpenID Connect, and HTTPS configuration.

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #BlueTeam #Response

📦 项目名称: soc-detection-lab
👤 项目作者: miholmestech
🛠 开发语言: None
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 19:52:00

📝 项目描述:
SIEM-based SOC lab with real investigations, telemetry, and detection use cases across Windows & Linux

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #Bypass #AV

📦 项目名称: Muck-MASS-SMS-Sender-Whatsapp-Boomber
👤 项目作者: zwerkenm
🛠 开发语言: Visual Basic .NET
Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 20:00:00

📝 项目描述:
SMS APIs and gateways enable services like messaging, verification, and spamming. Tools like SMS bombers or prank apps exploit these systems, while bypassing platforms like WhatsApp, Telegram, and Instagram for malicious or recreational hacking purposes.

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #C2 #Command

📦 项目名称: mt-2025-02022j
👤 项目作者: Bcruzgon
🛠 开发语言: Jupyter Notebook
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 22:02:37

📝 项目描述:
Live/dead assay: DAPI nuclei (blue C1, Otsu seg 50-1000px), calcein-AM live (green C2 ∩ nuclei 30-800px), red LNPs/dead (C3 ∩ DAPI+ only). Viability=(live/total nuclei)×100. Contours: green (green>1.5×red), red (LNP+), gray (ambiguous).

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #Bypass #AV

📦 项目名称: ai-humanizer-api
👤 项目作者: unknownman1244
🛠 开发语言: None
Star数量: 2 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-18 23:00:51

📝 项目描述:
🤖 Transform AI text into human-like writing with the AI Humanizer API, ensuring authenticity and fluency while bypassing major AI detectors.

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #EXP #Exploit

📦 项目名称: inskillflow-docs-systeme-d-exploitation-linux-exercices
👤 项目作者: hrhouma1
🛠 开发语言: Shell
Star数量: 4 | 🍴 Fork数量: 19
📅 更新时间: 2026-02-19 00:00:08

📝 项目描述:
无描述

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #BlueTeam #Monitor #Response

📦 项目名称: SOC-BlueTeam-Lab-Network-Defense
👤 项目作者: Maher-Mansour-CyberSec
🛠 开发语言: HTML
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 23:57:34

📝 项目描述:
无描述

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #SSRF

📦 项目名称: test-ssrf
👤 项目作者: Amrendra1111
🛠 开发语言: None
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-18 23:29:43

📝 项目描述:
无描述

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #Bypass #AV

📦 项目名称: event-horizon
👤 项目作者: Imusama23
🛠 开发语言: Python
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-19 02:01:09

📝 项目描述:
🚀 Bypass ad blocking per device on Pi-hole v6, allowing temporary pauses for individual users with automatic restoration and easy controls.

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #POC #CVE

📦 项目名称: vulscanner
👤 项目作者: ryzecx
🛠 开发语言: Python
Star数量: 1 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-19 04:00:05

📝 项目描述:
🔍 Scan for vulnerabilities with an AI-powered tool that enhances security in your development process, ensuring safety before production.

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #SSRF

📦 项目名称: SSRF-Decision-Aid
👤 项目作者: PedroLinks
🛠 开发语言: HTML
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-19 04:00:35

📝 项目描述:
无描述

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #CSRF

📦 项目名称: csurf
👤 项目作者: loilo-inc
🛠 开发语言: TypeScript
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-19 05:59:22

📝 项目描述:
CSRF token middleware

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #SSRF

📦 项目名称: vibehunter
👤 项目作者: worldtreeboy
🛠 开发语言: Python
Star数量: 4 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-19 08:38:14

📝 项目描述:
Cross-platform vulnerability scanner for .NET deserialization, SQL injection, SSTI, SSRF, and more. Made using claude

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #CSRF

📦 项目名称: soc-project4-web-app-vulnerability-assessment-dvwa-burp-suite
👤 项目作者: Oracleo
🛠 开发语言: None
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-19 08:57:40

📝 项目描述:
Web application security assessment demonstrating SOC analyst skills. Conducted comprehensive vulnerability testing on DVWA using Burp Suite, identifying & documenting critical security flaws including SQL Injection, XSS, Brute Force, and CSRF vulnerabilities. Complete with traffic analysis, exploitation techniques, & remediation recommendations.

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #CSRF

📦 项目名称: CSRF-PoC-Generator
👤 项目作者: Vaibhavraj8225
🛠 开发语言: None
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-19 11:02:12

📝 项目描述:
This python noscript generates burpsuite professional style CSRF PoC completely working in portswigger. It uses customKintker for UI and has various features.

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #Burp #Extension

📦 项目名称: burp-extensions-suite
👤 项目作者: mic-cyberkid
🛠 开发语言: None
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-19 10:46:40

📝 项目描述:
Repo for custom burp extensions

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #CSRF

📦 项目名称: secure-job-application-portal
👤 项目作者: aichaoukdour
🛠 开发语言: None
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-19 11:50:22

📝 项目描述:
A secure and responsive job application landing page built with Next.js, featuring reCAPTCHA v2, CSRF protection, CSP headers, server-side validation, and secure CV upload with JSON storage in applicants/.

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #C2 #Framework

📦 项目名称: C-Dev-Sandbox
👤 项目作者: J-c0d3-4Fun
🛠 开发语言: C
Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-19 12:03:03

📝 项目描述:
C-Dev-Sandbox is my engineering journal for learning C from the ground up—starting with fundamentals and progressing into low-level concepts like memory management, pointers, file streams, and binary manipulation. The ultimate goal: gain the systems knowledge required for Red Team tooling, malware development, and C2 frameworks.

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #Bypass #AV #Filter #Patch

📦 项目名称: ZDT-D
👤 项目作者: GAME-OVER-op
🛠 开发语言: Kotlin
Star数量: 109 | 🍴 Fork数量: 1
📅 更新时间: 2026-02-19 13:01:24

📝 项目描述:
ZDT-D, Bypassing Internet blocks in Russia.

🔗 点击访问项目地址
🚨 GitHub 监控消息提醒

🚨 发现关键词: #CSRF

📦 项目名称: YouCan-Admin-Takeover
👤 项目作者: imad457
🛠 开发语言: None
Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-19 12:33:24

📝 项目描述:
YouCan.shop CVSS 9.8 SSO Bypass: 52,706 stores vulnerable via token leak in 302 redirect. Store ID → token1 → admin sessionid → full dashboard + Orders/PII access. Zero-auth takeover. PoC chain: curl accounts.youcan.shop/sso?broker→302 leak→admin panel. Fixed: server-side tokens + CSRF. (Dec 25, 2025)

🔗 点击访问项目地址