GitHub监控消息提醒!!!
更新了:漏洞检测
描述:一款针对 CVE-2025-55182 的独立安全评估工具,基于 Go 开发,提供图形化界面(GUI),用于快速完成漏洞检测与验证。
URL:https://github.com/Rsatan/CVE-2025-55182-Tools
标签:#漏洞检测
更新了:漏洞检测
描述:一款针对 CVE-2025-55182 的独立安全评估工具,基于 Go 开发,提供图形化界面(GUI),用于快速完成漏洞检测与验证。
URL:https://github.com/Rsatan/CVE-2025-55182-Tools
标签:#漏洞检测
GitHub
GitHub - Rsatan/Next.js-Exploit-Tool: Next.js-Exploit-Tool 图形化综合利用工具,基于 Go 开发,一款针对 CVE-2025-55182 的独立安全评估工具。
Next.js-Exploit-Tool 图形化综合利用工具,基于 Go 开发,一款针对 CVE-2025-55182 的独立安全评估工具。 - Rsatan/Next.js-Exploit-Tool
GitHub监控消息提醒!!!
更新了:反序列化
描述:这是一个用于交换的CAD格式及其序列化和反序列化项目
URL:https://github.com/0Pursuer/CADExchange
标签:#反序列化
更新了:反序列化
描述:这是一个用于交换的CAD格式及其序列化和反序列化项目
URL:https://github.com/0Pursuer/CADExchange
标签:#反序列化
GitHub
GitHub - 0Pursuer/CADExchange: 这是一个用于交换的CAD格式及其序列化和反序列化项目
这是一个用于交换的CAD格式及其序列化和反序列化项目. Contribute to 0Pursuer/CADExchange development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Pre-auth RCE in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0.
URL:https://github.com/dwisiswant0/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Pre-auth RCE in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0.
URL:https://github.com/dwisiswant0/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - dwisiswant0/CVE-2025-55182: Pre-auth RCE in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0.
Pre-auth RCE in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0. - dwisiswant0/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2Shell Scanner & Guardrail Suite for CVE-2025-55182 in React.js and CVE-2025-66478 for the Next.js framework
URL:https://github.com/gensecaihq/react2shell-scanner
标签:#CVE-2025
更新了:CVE-2025
描述:React2Shell Scanner & Guardrail Suite for CVE-2025-55182 in React.js and CVE-2025-66478 for the Next.js framework
URL:https://github.com/gensecaihq/react2shell-scanner
标签:#CVE-2025
GitHub
GitHub - gensecaihq/react2shell-scanner: Security scanner for CVE-2025-55182 - Critical RCE vulnerability in React Server Components.…
Security scanner for CVE-2025-55182 - Critical RCE vulnerability in React Server Components. Scan npm/pnpm/yarn lockfiles, Docker images, SBOMs, and live URLs. Auto-fix, SARIF output, GitHub Act...
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-55182: React Server Components RCE - Vulnerable and Patched Next.js Applications
URL:https://github.com/CyCognito/cve-2025-55182-rsc-rce
标签:#RCE
更新了:RCE
描述:CVE-2025-55182: React Server Components RCE - Vulnerable and Patched Next.js Applications
URL:https://github.com/CyCognito/cve-2025-55182-rsc-rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Explanation and PoC for CVE-2025-55182
URL:https://github.com/msanft/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Explanation and PoC for CVE-2025-55182
URL:https://github.com/msanft/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - msanft/CVE-2025-55182: Explanation and full RCE PoC for CVE-2025-55182
Explanation and full RCE PoC for CVE-2025-55182. Contribute to msanft/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Check for CVE-2025-55182 - Critical RCE vulnerability in React Server Components (CVSS 10.0)
URL:https://github.com/luskafaria/cve-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Check for CVE-2025-55182 - Critical RCE vulnerability in React Server Components (CVSS 10.0)
URL:https://github.com/luskafaria/cve-2025-55182
标签:#CVE-2025
GitHub
GitHub - luskafaria/cve-2025-55182: Check for CVE-2025-55182 - Critical RCE vulnerability in React Server Components (CVSS 10.0)
Check for CVE-2025-55182 - Critical RCE vulnerability in React Server Components (CVSS 10.0) - luskafaria/cve-2025-55182
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike MCP based on CS 4.12
URL:https://github.com/ibaiC/CS-MCP
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike MCP based on CS 4.12
URL:https://github.com/ibaiC/CS-MCP
标签:#Cobalt Strike
GitHub
GitHub - ibaiC/CS-MCP: Cobalt Strike MCP based on CS 4.12
Cobalt Strike MCP based on CS 4.12. Contribute to ibaiC/CS-MCP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnerability.
URL:https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478
标签:#CVE-2025
更新了:CVE-2025
描述:A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnerability.
URL:https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478
标签:#CVE-2025
GitHub
GitHub - Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478: A command-line scanner for batch detection of Next.js application versions…
A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnerability. - Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:some notes && (somewhat?) poc-adjacent stuff for CVE-2025-55182
URL:https://github.com/c0rydoras/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:some notes && (somewhat?) poc-adjacent stuff for CVE-2025-55182
URL:https://github.com/c0rydoras/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - c0rydoras/CVE-2025-55182: some notes && (somewhat?) poc-adjacent stuff for CVE-2025-55182
some notes && (somewhat?) poc-adjacent stuff for CVE-2025-55182 - c0rydoras/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2Shell Scanner (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/CymulateResearch/React2Shell-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:React2Shell Scanner (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/CymulateResearch/React2Shell-Scanner
标签:#CVE-2025
GitHub
GitHub - CymulateResearch/React2Shell-Scanner: React2Shell Scanner (CVE-2025-55182 & CVE-2025-66478)
React2Shell Scanner (CVE-2025-55182 & CVE-2025-66478) - CymulateResearch/React2Shell-Scanner
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike BOF
URL:https://github.com/loland/inlineExecute
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike BOF
URL:https://github.com/loland/inlineExecute
标签:#Cobalt Strike
GitHub
GitHub - loland/inlineExecute: Cobalt Strike BOF
Cobalt Strike BOF. Contribute to loland/inlineExecute development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Vulnerable Docker environment for reproducing CVE-2025-55182.
URL:https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab
标签:#CVE-2025
更新了:CVE-2025
描述:Vulnerable Docker environment for reproducing CVE-2025-55182.
URL:https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab
标签:#CVE-2025
GitHub
GitHub - SoICT-BKSEC/CVE-2025-55182-docker-lab: Vulnerable Docker environment for reproducing CVE-2025-55182.
Vulnerable Docker environment for reproducing CVE-2025-55182. - SoICT-BKSEC/CVE-2025-55182-docker-lab
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 POC
URL:https://github.com/ejpir/CVE-2025-55182-research
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 POC
URL:https://github.com/ejpir/CVE-2025-55182-research
标签:#CVE-2025
GitHub
GitHub - ejpir/CVE-2025-55182-research: CVE-2025-55182 POC
CVE-2025-55182 POC. Contribute to ejpir/CVE-2025-55182-research development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:webshell in jsp
URL:https://github.com/ricihost01-droid/Shelljsp
标签:#webshell
更新了:webshell
描述:webshell in jsp
URL:https://github.com/ricihost01-droid/Shelljsp
标签:#webshell
GitHub
ricihost01-droid/Shelljsp
webshell in jsp. Contribute to ricihost01-droid/Shelljsp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 POC for Next.js App Router
URL:https://github.com/deadbeesec/CVE-2025-55182-POC-for-Next.js
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 POC for Next.js App Router
URL:https://github.com/deadbeesec/CVE-2025-55182-POC-for-Next.js
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Not a POC. Just notes on stuff I've tried and the weird behaviors I see. Still no RCE but can detect the presence of vulnerability based on response
URL:https://github.com/acheong08/CVE-2025-55182-vite-rsc
标签:#RCE
更新了:RCE
描述:Not a POC. Just notes on stuff I've tried and the weird behaviors I see. Still no RCE but can detect the presence of vulnerability based on response
URL:https://github.com/acheong08/CVE-2025-55182-vite-rsc
标签:#RCE
GitHub
GitHub - acheong08/CVE-2025-55182-poc: Actual CVE-2025-55182 detection and exploit. No bullshit LLMs.
Actual CVE-2025-55182 detection and exploit. No bullshit LLMs. - acheong08/CVE-2025-55182-poc
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Deliberately vulnerable banking app for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) to learn, detect, and safely exercise React2Shell. Runs unpatched React 19.0.0 and Next.js 15.0.3.
URL:https://github.com/jctommasi/react2shellVulnApp
标签:#CVE-2025
更新了:CVE-2025
描述:Deliberately vulnerable banking app for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) to learn, detect, and safely exercise React2Shell. Runs unpatched React 19.0.0 and Next.js 15.0.3.
URL:https://github.com/jctommasi/react2shellVulnApp
标签:#CVE-2025
GitHub
GitHub - jctommasi/react2shellVulnApp: Deliberately vulnerable banking app for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js)…
Deliberately vulnerable banking app for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) to learn, detect, and safely exercise React2Shell. Runs unpatched React 19.0.0 and Next.js 15.0.3. - jcto...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Nuclei template for detecting react2shell (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/shamo0/react2shell-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Nuclei template for detecting react2shell (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/shamo0/react2shell-PoC
标签:#CVE-2025
GitHub
GitHub - shamo0/react2shell-PoC: Nuclei template for detecting react2shell (CVE-2025-55182 & CVE-2025-66478)
Nuclei template for detecting react2shell (CVE-2025-55182 & CVE-2025-66478) - shamo0/react2shell-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Poc for CVE-2025-55182 (remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages)
URL:https://github.com/EynaExp/CVE-2025-55182-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Poc for CVE-2025-55182 (remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages)
URL:https://github.com/EynaExp/CVE-2025-55182-POC
标签:#CVE-2025
GitHub
GitHub - EynaExp/CVE-2025-55182-POC: Poc for CVE-2025-55182 (remote code execution vulnerability exists in React Server Components…
Poc for CVE-2025-55182 (remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages) - EynaExp/CVE-2025-55182-POC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Poc for CVE-2025-55182
URL:https://github.com/Emiyelbarto/CVE-2025-55182-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Poc for CVE-2025-55182
URL:https://github.com/Emiyelbarto/CVE-2025-55182-PoC
标签:#CVE-2025
GitHub
GitHub - Emiyelbarto/CVE-2025-55182-PoC: Poc for CVE-2025-55182
Poc for CVE-2025-55182. Contribute to Emiyelbarto/CVE-2025-55182-PoC development by creating an account on GitHub.