GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Explanation and PoC for CVE-2025-55182
URL:https://github.com/msanft/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Explanation and PoC for CVE-2025-55182
URL:https://github.com/msanft/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - msanft/CVE-2025-55182: Explanation and full RCE PoC for CVE-2025-55182
Explanation and full RCE PoC for CVE-2025-55182. Contribute to msanft/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Check for CVE-2025-55182 - Critical RCE vulnerability in React Server Components (CVSS 10.0)
URL:https://github.com/luskafaria/cve-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Check for CVE-2025-55182 - Critical RCE vulnerability in React Server Components (CVSS 10.0)
URL:https://github.com/luskafaria/cve-2025-55182
标签:#CVE-2025
GitHub
GitHub - luskafaria/cve-2025-55182: Check for CVE-2025-55182 - Critical RCE vulnerability in React Server Components (CVSS 10.0)
Check for CVE-2025-55182 - Critical RCE vulnerability in React Server Components (CVSS 10.0) - luskafaria/cve-2025-55182
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike MCP based on CS 4.12
URL:https://github.com/ibaiC/CS-MCP
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike MCP based on CS 4.12
URL:https://github.com/ibaiC/CS-MCP
标签:#Cobalt Strike
GitHub
GitHub - ibaiC/CS-MCP: Cobalt Strike MCP based on CS 4.12
Cobalt Strike MCP based on CS 4.12. Contribute to ibaiC/CS-MCP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnerability.
URL:https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478
标签:#CVE-2025
更新了:CVE-2025
描述:A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnerability.
URL:https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478
标签:#CVE-2025
GitHub
GitHub - Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478: A command-line scanner for batch detection of Next.js application versions…
A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnerability. - Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:some notes && (somewhat?) poc-adjacent stuff for CVE-2025-55182
URL:https://github.com/c0rydoras/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:some notes && (somewhat?) poc-adjacent stuff for CVE-2025-55182
URL:https://github.com/c0rydoras/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - c0rydoras/CVE-2025-55182: some notes && (somewhat?) poc-adjacent stuff for CVE-2025-55182
some notes && (somewhat?) poc-adjacent stuff for CVE-2025-55182 - c0rydoras/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2Shell Scanner (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/CymulateResearch/React2Shell-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:React2Shell Scanner (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/CymulateResearch/React2Shell-Scanner
标签:#CVE-2025
GitHub
GitHub - CymulateResearch/React2Shell-Scanner: React2Shell Scanner (CVE-2025-55182 & CVE-2025-66478)
React2Shell Scanner (CVE-2025-55182 & CVE-2025-66478) - CymulateResearch/React2Shell-Scanner
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike BOF
URL:https://github.com/loland/inlineExecute
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike BOF
URL:https://github.com/loland/inlineExecute
标签:#Cobalt Strike
GitHub
GitHub - loland/inlineExecute: Cobalt Strike BOF
Cobalt Strike BOF. Contribute to loland/inlineExecute development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Vulnerable Docker environment for reproducing CVE-2025-55182.
URL:https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab
标签:#CVE-2025
更新了:CVE-2025
描述:Vulnerable Docker environment for reproducing CVE-2025-55182.
URL:https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab
标签:#CVE-2025
GitHub
GitHub - SoICT-BKSEC/CVE-2025-55182-docker-lab: Vulnerable Docker environment for reproducing CVE-2025-55182.
Vulnerable Docker environment for reproducing CVE-2025-55182. - SoICT-BKSEC/CVE-2025-55182-docker-lab
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 POC
URL:https://github.com/ejpir/CVE-2025-55182-research
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 POC
URL:https://github.com/ejpir/CVE-2025-55182-research
标签:#CVE-2025
GitHub
GitHub - ejpir/CVE-2025-55182-research: CVE-2025-55182 POC
CVE-2025-55182 POC. Contribute to ejpir/CVE-2025-55182-research development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:webshell in jsp
URL:https://github.com/ricihost01-droid/Shelljsp
标签:#webshell
更新了:webshell
描述:webshell in jsp
URL:https://github.com/ricihost01-droid/Shelljsp
标签:#webshell
GitHub
ricihost01-droid/Shelljsp
webshell in jsp. Contribute to ricihost01-droid/Shelljsp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 POC for Next.js App Router
URL:https://github.com/deadbeesec/CVE-2025-55182-POC-for-Next.js
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 POC for Next.js App Router
URL:https://github.com/deadbeesec/CVE-2025-55182-POC-for-Next.js
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Not a POC. Just notes on stuff I've tried and the weird behaviors I see. Still no RCE but can detect the presence of vulnerability based on response
URL:https://github.com/acheong08/CVE-2025-55182-vite-rsc
标签:#RCE
更新了:RCE
描述:Not a POC. Just notes on stuff I've tried and the weird behaviors I see. Still no RCE but can detect the presence of vulnerability based on response
URL:https://github.com/acheong08/CVE-2025-55182-vite-rsc
标签:#RCE
GitHub
GitHub - acheong08/CVE-2025-55182-poc: Actual CVE-2025-55182 detection and exploit. No bullshit LLMs.
Actual CVE-2025-55182 detection and exploit. No bullshit LLMs. - acheong08/CVE-2025-55182-poc
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Deliberately vulnerable banking app for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) to learn, detect, and safely exercise React2Shell. Runs unpatched React 19.0.0 and Next.js 15.0.3.
URL:https://github.com/jctommasi/react2shellVulnApp
标签:#CVE-2025
更新了:CVE-2025
描述:Deliberately vulnerable banking app for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) to learn, detect, and safely exercise React2Shell. Runs unpatched React 19.0.0 and Next.js 15.0.3.
URL:https://github.com/jctommasi/react2shellVulnApp
标签:#CVE-2025
GitHub
GitHub - jctommasi/react2shellVulnApp: Deliberately vulnerable banking app for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js)…
Deliberately vulnerable banking app for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) to learn, detect, and safely exercise React2Shell. Runs unpatched React 19.0.0 and Next.js 15.0.3. - jcto...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Nuclei template for detecting react2shell (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/shamo0/react2shell-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Nuclei template for detecting react2shell (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/shamo0/react2shell-PoC
标签:#CVE-2025
GitHub
GitHub - shamo0/react2shell-PoC: Nuclei template for detecting react2shell (CVE-2025-55182 & CVE-2025-66478)
Nuclei template for detecting react2shell (CVE-2025-55182 & CVE-2025-66478) - shamo0/react2shell-PoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Poc for CVE-2025-55182 (remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages)
URL:https://github.com/EynaExp/CVE-2025-55182-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Poc for CVE-2025-55182 (remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages)
URL:https://github.com/EynaExp/CVE-2025-55182-POC
标签:#CVE-2025
GitHub
GitHub - EynaExp/CVE-2025-55182-POC: Poc for CVE-2025-55182 (remote code execution vulnerability exists in React Server Components…
Poc for CVE-2025-55182 (remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages) - EynaExp/CVE-2025-55182-POC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Poc for CVE-2025-55182
URL:https://github.com/Emiyelbarto/CVE-2025-55182-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Poc for CVE-2025-55182
URL:https://github.com/Emiyelbarto/CVE-2025-55182-PoC
标签:#CVE-2025
GitHub
GitHub - Emiyelbarto/CVE-2025-55182-PoC: Poc for CVE-2025-55182
Poc for CVE-2025-55182. Contribute to Emiyelbarto/CVE-2025-55182-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike aggressor script to add context-menu option for clearing beacon queue
URL:https://github.com/PN-Tester/AbortCommand
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike aggressor script to add context-menu option for clearing beacon queue
URL:https://github.com/PN-Tester/AbortCommand
标签:#Cobalt Strike
GitHub
GitHub - PN-Tester/AbortCommand: CobaltStrike aggressor script to add context-menu option for clearing beacon queues
CobaltStrike aggressor script to add context-menu option for clearing beacon queues - PN-Tester/AbortCommand
GitHub监控消息提醒!!!
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/pdyt/-MCMC-
标签:#信息收集
更新了:信息收集
描述:Scout 是一个基于 Roo Code VS Code 扩展 设计的实验性 Agent 实现。它专注于通过模拟人类行为进行精准的网络信息收集、研究与交互,旨在将 Roo Code 转变为一个强大的 Web 研究助手。
URL:https://github.com/pdyt/-MCMC-
标签:#信息收集
GitHub
GitHub - pdyt/-MCMC-: 比特币作为区块链驱动的另类资产,以 2100 万枚稀缺性、与传统资产低相关性等属性成为配置标的,但其极致时变波动对收益刻画构成挑战。传统 ARCH 类模型因波动率的确定性设定,难适配其波动聚集、厚尾特征;随机…
比特币作为区块链驱动的另类资产,以 2100 万枚稀缺性、与传统资产低相关性等属性成为配置标的,但其极致时变波动对收益刻画构成挑战。传统 ARCH 类模型因波动率的确定性设定,难适配其波动聚集、厚尾特征;随机波动率(SV)模型将波动率对数设为线性随机过程,更契合信息流驱动的波动逻辑。 本文以 2015-2025 年比特币对美元日收益率为样本,采用马尔可夫链蒙特卡洛方法估计 SV 模型 —— ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 detection for Vite Rsc and NextJS. Real shit, no LLMs
URL:https://github.com/acheong08/CVE-2025-55182-detection
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 detection for Vite Rsc and NextJS. Real shit, no LLMs
URL:https://github.com/acheong08/CVE-2025-55182-detection
标签:#CVE-2025
GitHub
GitHub - acheong08/CVE-2025-55182-poc: Actual CVE-2025-55182 detection and exploit. No bullshit LLMs.
Actual CVE-2025-55182 detection and exploit. No bullshit LLMs. - acheong08/CVE-2025-55182-poc
GitHub监控消息提醒!!!
更新了:RCE
描述:Burp Suite extension to detect the Next.js / React Server Components (RSC) Remote Code Execution vulnerability (CVE-2025-55182 & CVE-2025-66478).
URL:https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension-
标签:#RCE
更新了:RCE
描述:Burp Suite extension to detect the Next.js / React Server Components (RSC) Remote Code Execution vulnerability (CVE-2025-55182 & CVE-2025-66478).
URL:https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension-
标签:#RCE
GitHub
GitHub - tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension-: Burp Suite extension to detect the Next.js / React Server Components…
Burp Suite extension to detect the Next.js / React Server Components (RSC) Remote Code Execution vulnerability (CVE-2025-55182 & CVE-2025-66478). - tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-S...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Burp Suite extension to detect the Next.js / React Server Components (RSC) Remote Code Execution vulnerability (CVE-2025-55182 & CVE-2025-66478).
URL:https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
标签:#CVE-2025
更新了:CVE-2025
描述:Burp Suite extension to detect the Next.js / React Server Components (RSC) Remote Code Execution vulnerability (CVE-2025-55182 & CVE-2025-66478).
URL:https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
标签:#CVE-2025
GitHub
GitHub - tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension: Burp Suite extension to detect the Next.js / React Server Components…
Burp Suite extension to detect the Next.js / React Server Components (RSC) Remote Code Execution vulnerability (CVE-2025-55182 & CVE-2025-66478). - tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-S...