🚨 GitHub 监控消息提醒
🚨 发现关键词: #XXE
📦 项目名称: xxe
👤 项目作者: sleepless1009-noscript
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 09:24:18
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #XXE
📦 项目名称: xxe
👤 项目作者: sleepless1009-noscript
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 09:24:18
📝 项目描述:
..🔗 点击访问项目地址
GitHub
GitHub - sleepless1009-noscript/xxe: ..
.. Contribute to sleepless1009-noscript/xxe development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: xsukax-RSS-to-Mastodon
👤 项目作者: xsukax
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 09:41:55
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: xsukax-RSS-to-Mastodon
👤 项目作者: xsukax
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 09:41:55
📝 项目描述:
Self-hosted Python web app that auto-posts RSS/Atom feeds to multiple Mastodon accounts. Single-file, multi-instance, per-feed hashtags, live scheduler dashboard, OAuth 2.0, CSRF protection, and SQLite storage - no cloud, no tracking, full control.🔗 点击访问项目地址
GitHub
GitHub - xsukax/xsukax-RSS-to-Mastodon: Self-hosted Python web app that auto-posts RSS/Atom feeds to multiple Mastodon accounts.…
Self-hosted Python web app that auto-posts RSS/Atom feeds to multiple Mastodon accounts. Single-file, multi-instance, per-feed hashtags, live scheduler dashboard, OAuth 2.0, CSRF protection, and SQ...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Extension
📦 项目名称: FocusFire
👤 项目作者: chromanite
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 09:53:36
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Extension
📦 项目名称: FocusFire
👤 项目作者: chromanite
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 09:53:36
📝 项目描述:
Advanced automated penetration testing extension for Burp Suite Professional/Community. 🔗 点击访问项目地址
GitHub
GitHub - chromanite/FocusFire: Advanced automated penetration testing extension for Burp Suite Professional/Community.
Advanced automated penetration testing extension for Burp Suite Professional/Community. - GitHub - chromanite/FocusFire: Advanced automated penetration testing extension for Burp Suite Professiona...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Xray #POC
📦 项目名称: Detecting-COVID19-Chest-XRay-PyTorch
👤 项目作者: Akshita-jpg
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 11:03:17
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Xray #POC
📦 项目名称: Detecting-COVID19-Chest-XRay-PyTorch
👤 项目作者: Akshita-jpg
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 11:03:17
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - Akshita-jpg/Detecting-COVID19-Chest-XRay-PyTorch
Contribute to Akshita-jpg/Detecting-COVID19-Chest-XRay-PyTorch development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: majordomo-CVE-2026-27174-poc
👤 项目作者: MaxMnMl
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 11:56:17
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: majordomo-CVE-2026-27174-poc
👤 项目作者: MaxMnMl
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 11:56:17
📝 项目描述:
CVE-2026-27174 - An unauthenticated remote code execution via the admin panel's PHP console feature🔗 点击访问项目地址
GitHub
GitHub - MaxMnMl/majordomo-CVE-2026-27174-poc: CVE-2026-27174 - An unauthenticated remote code execution via the admin panel's…
CVE-2026-27174 - An unauthenticated remote code execution via the admin panel's PHP console feature - MaxMnMl/majordomo-CVE-2026-27174-poc
🚨 GitHub 监控消息提醒
🚨 发现关键词: #SSRF
📦 项目名称: requests-secure
👤 项目作者: jayjza
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 11:55:40
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #SSRF
📦 项目名称: requests-secure
👤 项目作者: jayjza
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 11:55:40
📝 项目描述:
A thin wrapper of requests that provides SSRF and DNS rebinding protection🔗 点击访问项目地址
GitHub
GitHub - jayjza/requests-secure: A thin wrapper of requests that provides SSRF and DNS rebinding protection
A thin wrapper of requests that provides SSRF and DNS rebinding protection - jayjza/requests-secure
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: httpz-csrf
👤 项目作者: erwagasore
🛠 开发语言: Zig
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 11:41:45
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: httpz-csrf
👤 项目作者: erwagasore
🛠 开发语言: Zig
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 11:41:45
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - erwagasore/httpz-csrf
Contribute to erwagasore/httpz-csrf development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #Filter
📦 项目名称: Peacock-Ads
👤 项目作者: ajstrick81
🛠 开发语言: None
⭐ Star数量: 4 | 🍴 Fork数量: 2
📅 更新时间: 2026-02-26 13:00:56
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #Filter
📦 项目名称: Peacock-Ads
👤 项目作者: ajstrick81
🛠 开发语言: None
⭐ Star数量: 4 | 🍴 Fork数量: 2
📅 更新时间: 2026-02-26 13:00:56
📝 项目描述:
Block, Bypass, Filter Peacock Ads using AdGuard🔗 点击访问项目地址
GitHub
GitHub - ajstrick81/Peacock-Ads: Block, Bypass, Filter Peacock Ads using AdGuard
Block, Bypass, Filter Peacock Ads using AdGuard. Contribute to ajstrick81/Peacock-Ads development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #免杀 #Bypass
📦 项目名称: Memory-bypass-of-multi-layered-hooks
👤 项目作者: lovexunako
🛠 开发语言: C++
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 12:59:01
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #免杀 #Bypass
📦 项目名称: Memory-bypass-of-multi-layered-hooks
👤 项目作者: lovexunako
🛠 开发语言: C++
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 12:59:01
📝 项目描述:
基于多层hook流的免杀🔗 点击访问项目地址
GitHub
GitHub - lovexunako/Memory-bypass-of-multi-layered-hooks: 基于多层hook流的免杀
基于多层hook流的免杀. Contribute to lovexunako/Memory-bypass-of-multi-layered-hooks development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Control
📦 项目名称: C2RoPE
👤 项目作者: Lavanthi
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 13:02:51
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Control
📦 项目名称: C2RoPE
👤 项目作者: Lavanthi
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 13:02:51
📝 项目描述:
🧠 Improve 3D multimodal model reasoning using causal continuous rotary positional encoding for enhanced spatial understanding and performance.🔗 点击访问项目地址
GitHub
GitHub - Lavanthi/C2RoPE: 🧠 Improve 3D multimodal model reasoning using causal continuous rotary positional encoding for enhanced…
🧠 Improve 3D multimodal model reasoning using causal continuous rotary positional encoding for enhanced spatial understanding and performance. - Lavanthi/C2RoPE
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE_2026_25892
👤 项目作者: dzmind2312
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 13:56:34
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE_2026_25892
👤 项目作者: dzmind2312
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 13:56:34
📝 项目描述:
CVE_2026_25892 BY DZ MIND INJECTOR🔗 点击访问项目地址
GitHub
GitHub - dzmind2312/CVE_2026_25892: CVE_2026_25892 BY DZ MIND INJECTOR
CVE_2026_25892 BY DZ MIND INJECTOR. Contribute to dzmind2312/CVE_2026_25892 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #UAC
📦 项目名称: DroverManager
👤 项目作者: eniqx
🛠 开发语言: Go
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 13:59:37
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #UAC
📦 项目名称: DroverManager
👤 项目作者: eniqx
🛠 开发语言: Go
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 13:59:37
📝 项目描述:
Discord proxy manager with system tray, multi-profile support and zapret DPI bypass🔗 点击访问项目地址
GitHub
GitHub - eniqx/DroverManager: Discord proxy manager with system tray, multi-profile support and zapret DPI bypass
Discord proxy manager with system tray, multi-profile support and zapret DPI bypass - eniqx/DroverManager
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: Secure-MERN-Authentication-System-with-JWT-2FA-Role-Based-Access
👤 项目作者: nesarikartejas10
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 13:46:05
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: Secure-MERN-Authentication-System-with-JWT-2FA-Role-Based-Access
👤 项目作者: nesarikartejas10
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 13:46:05
📝 项目描述:
Enterprise-grade full-stack authentication system with JWT, Refresh Tokens, 2FA (OTP), Role-Based Access Control, CSRF protection, rate limiting, and secure cookie management built using MERN stack.🔗 点击访问项目地址
GitHub
GitHub - nesarikartejas10/Secure-MERN-Authentication-System-with-JWT-2FA-Role-Based-Access: Enterprise-grade full-stack authentication…
Enterprise-grade full-stack authentication system with JWT, Refresh Tokens, 2FA (OTP), Role-Based Access Control, CSRF protection, rate limiting, and secure cookie management built using MERN stack...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Framework #Command #Control
📦 项目名称: C2Q
👤 项目作者: pitesse
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 14:01:46
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Framework #Command #Control
📦 项目名称: C2Q
👤 项目作者: pitesse
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 14:01:46
📝 项目描述:
An MLIR-based research compiler for synthesizing quantum arithmetic circuits from high-level C code.🔗 点击访问项目地址
GitHub
GitHub - pitesse/C2Q: An MLIR-based research compiler for synthesizing quantum arithmetic circuits from high-level C code.
An MLIR-based research compiler for synthesizing quantum arithmetic circuits from high-level C code. - pitesse/C2Q
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Bypass #AV #OTP
📦 项目名称: 2fa-bypass-labs
👤 项目作者: 0xHaise
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 14:59:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Bypass #AV #OTP
📦 项目名称: 2fa-bypass-labs
👤 项目作者: 0xHaise
🛠 开发语言: JavaScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 14:59:58
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - 0xHaise/2fa-bypass-labs
Contribute to 0xHaise/2fa-bypass-labs development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-23550
👤 项目作者: DedsecTeam-BlackHat
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 15:57:14
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-23550
👤 项目作者: DedsecTeam-BlackHat
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 15:57:14
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - DedsecTeam-BlackHat/CVE-2026-23550
Contribute to DedsecTeam-BlackHat/CVE-2026-23550 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #RedTeam #Ops
📦 项目名称: azure-ai-redteam-eval
👤 项目作者: sohamda
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 15:51:46
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #RedTeam #Ops
📦 项目名称: azure-ai-redteam-eval
👤 项目作者: sohamda
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 15:51:46
📝 项目描述:
Continuous Evaluation & Monitoring for AI Applications using AgentFramework & RedTeam🔗 点击访问项目地址
GitHub
GitHub - sohamda/azure-ai-redteam-eval: Continuous Evaluation & Monitoring for AI Applications using AgentFramework & RedTeam
Continuous Evaluation & Monitoring for AI Applications using AgentFramework & RedTeam - sohamda/azure-ai-redteam-eval
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CSRF
📦 项目名称: CSRF-Exploit-Lab
👤 项目作者: abhinandanpandey-in
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 15:50:16
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CSRF
📦 项目名称: CSRF-Exploit-Lab
👤 项目作者: abhinandanpandey-in
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 15:50:16
📝 项目描述:
Security research lab demonstrating Cross-Site Request Forgery (CSRF / CWE-352). Features a vulnerable Flask banking application, a cross-origin HTML exploit, and architectural remediation using cryptographic Synchronizer Tokens to block forged state-changing requests.🔗 点击访问项目地址
GitHub
GitHub - abhinandanpandey-in/CSRF-Exploit-Lab: Security research lab demonstrating Cross-Site Request Forgery (CSRF / CWE-352).…
Security research lab demonstrating Cross-Site Request Forgery (CSRF / CWE-352). Features a vulnerable Flask banking application, a cross-origin HTML exploit, and architectural remediation using cr...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Burp #Extension
📦 项目名称: PathBreaker
👤 项目作者: thezakman
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 17:02:18
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Burp #Extension
📦 项目名称: PathBreaker
👤 项目作者: thezakman
🛠 开发语言: HTML
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 17:02:18
📝 项目描述:
A professional path and header fuzzing extension for Burp Suite.🔗 点击访问项目地址
GitHub
GitHub - thezakman/PathBreaker: A professional path and header fuzzing extension for Burp Suite.
A professional path and header fuzzing extension for Burp Suite. - thezakman/PathBreaker
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Xray #POC
📦 项目名称: Xray-Reality
👤 项目作者: ISFZY
🛠 开发语言: Shell
⭐ Star数量: 143 | 🍴 Fork数量: 29
📅 更新时间: 2026-02-26 17:01:40
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Xray #POC
📦 项目名称: Xray-Reality
👤 项目作者: ISFZY
🛠 开发语言: Shell
⭐ Star数量: 143 | 🍴 Fork数量: 29
📅 更新时间: 2026-02-26 17:01:40
📝 项目描述:
Xray 一键脚本,基于 VLESS + Reality-Vision/xhttp 顶尖流控协议。专为 Debian 和 Ubuntu 系统设计,提供极致的性能优化与安全防护。(An advanced, fully automated deployment noscript for Xray, featuring VLESS + Reality-Vision/xhttp. Designed for performance, security, and ease of use on Debian and Ubuntu systems. )🔗 点击访问项目地址
GitHub
GitHub - ISFZY/Xray-Reality: Xray 一键脚本,基于 VLESS + Reality-Vision/xhttp 顶尖流控协议。专为 Debian 和 Ubuntu 系统设计,提供极致的性能优化与安全防护。(An advanced…
Xray 一键脚本,基于 VLESS + Reality-Vision/xhttp 顶尖流控协议。专为 Debian 和 Ubuntu 系统设计,提供极致的性能优化与安全防护。(An advanced, fully automated deployment noscript for Xray, featuring VLESS + Reality-Vision/xhttp. Designed fo...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-2636_PoC
👤 项目作者: oxfemale
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 17:33:21
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #CVE-2026
📦 项目名称: CVE-2026-2636_PoC
👤 项目作者: oxfemale
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-02-26 17:33:21
📝 项目描述:
**CVE-2026-2636** is a vulnerability in the Windows Common Log File System (CLFS) driver (`CLFS.sys`). An unprivileged user can trigger an unrecoverable system state by calling the `ReadFile` API on a handle opened via `CreateLogFile`. This results in a Blue Screen of Death (BSoD), leading to a denial of service (DoS)🔗 点击访问项目地址
GitHub
GitHub - oxfemale/CVE-2026-2636_PoC: **CVE-2026-2636** is a vulnerability in the Windows Common Log File System (CLFS) driver (`CLFS.sys`).…
**CVE-2026-2636** is a vulnerability in the Windows Common Log File System (CLFS) driver (`CLFS.sys`). An unprivileged user can trigger an unrecoverable system state by calling the `ReadFile` API o...