GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A proof of concept exploit script for CVE-2025-55182
URL:https://github.com/Cillian-Collins/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:A proof of concept exploit script for CVE-2025-55182
URL:https://github.com/Cillian-Collins/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Cillian-Collins/CVE-2025-55182: A proof of concept exploit script for CVE-2025-55182
A proof of concept exploit script for CVE-2025-55182 - Cillian-Collins/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/lza6/infip-2api-cfwork
标签:#绕过
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/lza6/infip-2api-cfwork
标签:#绕过
GitHub
GitHub - lza6/infip-2api-cfwork: Cloudflare Workers 边缘计算 · 无需 Cookie (自动凭证获取/会话保活) · 浏览器指纹全真模拟 (User-Agent/Sec-CH-UA) · 动态 IP 伪装与轮询…
Cloudflare Workers 边缘计算 · 无需 Cookie (自动凭证获取/会话保活) · 浏览器指纹全真模拟 (User-Agent/Sec-CH-UA) · 动态 IP 伪装与轮询 (绕过 IP 封禁) · 深度抗 429/WAF 限流策略 · 智能指数退避重试机制 · 强制串行队列管理 · OpenAI 流式接口 (SSE) 完美转译 · 多模态 (Vision/Base6...
GitHub监控消息提醒!!!
更新了:攻防
描述:一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
URL:https://github.com/Huu1j/crawl_xz
标签:#攻防
更新了:攻防
描述:一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
URL:https://github.com/Huu1j/crawl_xz
标签:#攻防
GitHub
GitHub - Huu1j/crawl_xz: 一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出
一个批量爬取安全技术社区文章的工具(目前支持先知社区、奇安信攻防社区),支持Markdown、PDF、HTML多种格式输出 - Huu1j/crawl_xz
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a POC script for CVE-2025-55182 (React SSR RCE)
URL:https://github.com/Darker-Ink/react-ssr-vulnerability
标签:#RCE
更新了:RCE
描述:This is a POC script for CVE-2025-55182 (React SSR RCE)
URL:https://github.com/Darker-Ink/react-ssr-vulnerability
标签:#RCE
GitHub
GitHub - Darker-Ink/react-ssr-vulnerability: This is a POC script for CVE-2025-55182 (React SSR RCE)
This is a POC script for CVE-2025-55182 (React SSR RCE) - Darker-Ink/react-ssr-vulnerability
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for CVE-2025-55182
URL:https://github.com/emadshanab/POC-for-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:POC for CVE-2025-55182
URL:https://github.com/emadshanab/POC-for-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - emadshanab/POC-for-CVE-2025-55182: POC for CVE-2025-55182
POC for CVE-2025-55182. Contribute to emadshanab/POC-for-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Exploit for CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
标签:#RCE
更新了:RCE
描述:Exploit for CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
标签:#RCE
GitHub
GitHub - pyroxenites/Nextjs_RCE_Exploit_Tool: Exploit for CVE-2025-55182 & CVE-2025-66478
Exploit for CVE-2025-55182 & CVE-2025-66478. Contribute to pyroxenites/Nextjs_RCE_Exploit_Tool development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Next.js React Server Components RCE exploit for CVE-2025-55182
URL:https://github.com/Chocapikk/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Next.js React Server Components RCE exploit for CVE-2025-55182
URL:https://github.com/Chocapikk/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Chocapikk/CVE-2025-55182: Next.js React Server Components RCE exploit for CVE-2025-55182
Next.js React Server Components RCE exploit for CVE-2025-55182 - Chocapikk/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182.
URL:https://github.com/mrknow001/RSC_Detector
标签:#CVE-2025
更新了:CVE-2025
描述:Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182.
URL:https://github.com/mrknow001/RSC_Detector
标签:#CVE-2025
GitHub
GitHub - mrknow001/RSC_Detector: Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182.
Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182. - mrknow001/RSC_Detector
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool
URL:https://github.com/Spritualkb/CVE-2025-55182-exp
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool
URL:https://github.com/Spritualkb/CVE-2025-55182-exp
标签:#CVE-2025
GitHub
GitHub - Spritualkb/CVE-2025-55182-exp: CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool
CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool - Spritualkb/CVE-2025-55182-exp
GitHub监控消息提醒!!!
更新了:绕过
描述:LSPosed模块 - 关闭OKHttp3 SSL证书校验,用于绕过证书固定
URL:https://github.com/banchengkemeng/LSPosed_OKHttp3_SSLBypass
标签:#绕过
更新了:绕过
描述:LSPosed模块 - 关闭OKHttp3 SSL证书校验,用于绕过证书固定
URL:https://github.com/banchengkemeng/LSPosed_OKHttp3_SSLBypass
标签:#绕过
GitHub
GitHub - banchengkemeng/LSPosed_OKHttp3_SSLBypass: LSPosed模块 - 关闭OKHttp3 SSL证书校验,用于绕过证书固定
LSPosed模块 - 关闭OKHttp3 SSL证书校验,用于绕过证书固定. Contribute to banchengkemeng/LSPosed_OKHttp3_SSLBypass development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications
URL:https://github.com/Saturate/CVE-2025-55182-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications
URL:https://github.com/Saturate/CVE-2025-55182-Scanner
标签:#CVE-2025
GitHub
GitHub - Saturate/CVE-2025-55182-Scanner: A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications
A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications - Saturate/CVE-2025-55182-Scanner
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite
标签:#Red Team
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite
标签:#Red Team
GitHub
GitHub - 7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite: This repository contains a comprehensive corpus of Large…
This repository contains a comprehensive corpus of Large Language Model (LLM) attack vectors and a Python test harness to evaluate model robustness. It covers techniques ranging from basic prompt i...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/Ashwesker/Blackash-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/Ashwesker/Blackash-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-55182: CVE-2025-55182
CVE-2025-55182. Contribute to Ashwesker/Blackash-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:基于 CVE-2025-55182 burpsuite 被动扫描插件
URL:https://github.com/Pizz33/CVE-2025-55182-burpscanner
标签:#CVE-2025
更新了:CVE-2025
描述:基于 CVE-2025-55182 burpsuite 被动扫描插件
URL:https://github.com/Pizz33/CVE-2025-55182-burpscanner
标签:#CVE-2025
GitHub
GitHub - Pizz33/CVE-2025-55182-burpscanner: 基于 CVE-2025-55182 漏洞检测 burpsuite 被动扫描插件
基于 CVE-2025-55182 漏洞检测 burpsuite 被动扫描插件. Contribute to Pizz33/CVE-2025-55182-burpscanner development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:lab_demo CVE-2025-55182
URL:https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:lab_demo CVE-2025-55182
URL:https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182
标签:#CVE-2025
GitHub
Sotatek-KhaiNguyen3/CVE-2025-55182
lab_demo CVE-2025-55182. Contribute to Sotatek-KhaiNguyen3/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Elitamz/Cobalt-Strike-csload-plugin
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Elitamz/Cobalt-Strike-csload-plugin
标签:#bypass AntiVirus
GitHub
GitHub - Elitamz/Cobalt-Strike-csload-plugin: A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software. - Elitamz/Cobalt-Strike-csload-plugin
GitHub监控消息提醒!!!
更新了:免杀
描述:SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
URL:https://github.com/6yx1n/sharkBlind
标签:#免杀
更新了:免杀
描述:SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
URL:https://github.com/6yx1n/sharkBlind
标签:#免杀
GitHub
GitHub - 6yx1n/sharkBlind: SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。 - 6yx1n/sharkBlind
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/aingram702/Recon-Superpowers
标签:#Red Team
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/aingram702/Recon-Superpowers
标签:#Red Team
GitHub
GitHub - aingram702/Recon-Superpowers: The swiss-army knife of recon tools! Recon-Superpowers is just like the name suggests, it…
The swiss-army knife of recon tools! Recon-Superpowers is just like the name suggests, it is a superpower for any security analyst or red-teamer to perform quick recon in single interface! If you p...