GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Next.js React Server Components RCE exploit for CVE-2025-55182
URL:https://github.com/Chocapikk/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Next.js React Server Components RCE exploit for CVE-2025-55182
URL:https://github.com/Chocapikk/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Chocapikk/CVE-2025-55182: Next.js React Server Components RCE exploit for CVE-2025-55182
Next.js React Server Components RCE exploit for CVE-2025-55182 - Chocapikk/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182.
URL:https://github.com/mrknow001/RSC_Detector
标签:#CVE-2025
更新了:CVE-2025
描述:Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182.
URL:https://github.com/mrknow001/RSC_Detector
标签:#CVE-2025
GitHub
GitHub - mrknow001/RSC_Detector: Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182.
Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182. - mrknow001/RSC_Detector
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool
URL:https://github.com/Spritualkb/CVE-2025-55182-exp
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool
URL:https://github.com/Spritualkb/CVE-2025-55182-exp
标签:#CVE-2025
GitHub
GitHub - Spritualkb/CVE-2025-55182-exp: CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool
CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool - Spritualkb/CVE-2025-55182-exp
GitHub监控消息提醒!!!
更新了:绕过
描述:LSPosed模块 - 关闭OKHttp3 SSL证书校验,用于绕过证书固定
URL:https://github.com/banchengkemeng/LSPosed_OKHttp3_SSLBypass
标签:#绕过
更新了:绕过
描述:LSPosed模块 - 关闭OKHttp3 SSL证书校验,用于绕过证书固定
URL:https://github.com/banchengkemeng/LSPosed_OKHttp3_SSLBypass
标签:#绕过
GitHub
GitHub - banchengkemeng/LSPosed_OKHttp3_SSLBypass: LSPosed模块 - 关闭OKHttp3 SSL证书校验,用于绕过证书固定
LSPosed模块 - 关闭OKHttp3 SSL证书校验,用于绕过证书固定. Contribute to banchengkemeng/LSPosed_OKHttp3_SSLBypass development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications
URL:https://github.com/Saturate/CVE-2025-55182-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications
URL:https://github.com/Saturate/CVE-2025-55182-Scanner
标签:#CVE-2025
GitHub
GitHub - Saturate/CVE-2025-55182-Scanner: A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications
A bash scanner for detecting CVE-2025-55182 vulnerability in Next.js applications - Saturate/CVE-2025-55182-Scanner
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite
标签:#Red Team
更新了:Red Team
描述:AI / LLM Red Team Field Manual & Consultant’s Handbook
URL:https://github.com/7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite
标签:#Red Team
GitHub
GitHub - 7zzmqx4g9b-eng/LLM-Red-Teaming-Adversarial-Evaluation-Suite: This repository contains a comprehensive corpus of Large…
This repository contains a comprehensive corpus of Large Language Model (LLM) attack vectors and a Python test harness to evaluate model robustness. It covers techniques ranging from basic prompt i...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/Ashwesker/Blackash-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/Ashwesker/Blackash-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-55182: CVE-2025-55182
CVE-2025-55182. Contribute to Ashwesker/Blackash-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:基于 CVE-2025-55182 burpsuite 被动扫描插件
URL:https://github.com/Pizz33/CVE-2025-55182-burpscanner
标签:#CVE-2025
更新了:CVE-2025
描述:基于 CVE-2025-55182 burpsuite 被动扫描插件
URL:https://github.com/Pizz33/CVE-2025-55182-burpscanner
标签:#CVE-2025
GitHub
GitHub - Pizz33/CVE-2025-55182-burpscanner: 基于 CVE-2025-55182 漏洞检测 burpsuite 被动扫描插件
基于 CVE-2025-55182 漏洞检测 burpsuite 被动扫描插件. Contribute to Pizz33/CVE-2025-55182-burpscanner development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:lab_demo CVE-2025-55182
URL:https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:lab_demo CVE-2025-55182
URL:https://github.com/Sotatek-KhaiNguyen3/CVE-2025-55182
标签:#CVE-2025
GitHub
Sotatek-KhaiNguyen3/CVE-2025-55182
lab_demo CVE-2025-55182. Contribute to Sotatek-KhaiNguyen3/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Elitamz/Cobalt-Strike-csload-plugin
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Elitamz/Cobalt-Strike-csload-plugin
标签:#bypass AntiVirus
GitHub
GitHub - Elitamz/Cobalt-Strike-csload-plugin: A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software. - Elitamz/Cobalt-Strike-csload-plugin
GitHub监控消息提醒!!!
更新了:免杀
描述:SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
URL:https://github.com/6yx1n/sharkBlind
标签:#免杀
更新了:免杀
描述:SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
URL:https://github.com/6yx1n/sharkBlind
标签:#免杀
GitHub
GitHub - 6yx1n/sharkBlind: SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。
SharkBlind是一款专为安全测试设计的免杀型计划任务植入器,它能通过独特的混淆和隐蔽调用技术,将指定载荷可靠且隐蔽地添加进Windows计划任务,从而有效规避常见杀毒软件和终端防护的检测,实现持久的后台驻留。 - 6yx1n/sharkBlind
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/aingram702/Recon-Superpowers
标签:#Red Team
更新了:Red Team
描述:🔒 Automate cybersecurity tasks with n8n workflows for Red Team, Blue Team, and Application Security, enhancing efficiency and response times.
URL:https://github.com/aingram702/Recon-Superpowers
标签:#Red Team
GitHub
GitHub - aingram702/Recon-Superpowers: The swiss-army knife of recon tools! Recon-Superpowers is just like the name suggests, it…
The swiss-army knife of recon tools! Recon-Superpowers is just like the name suggests, it is a superpower for any security analyst or red-teamer to perform quick recon in single interface! If you p...
GitHub监控消息提醒!!!
更新了:burp
描述:sql-injection, burp suite, bypass validation, sql map
URL:https://github.com/PoeenCy/web-ctf-challenge
标签:#burp
更新了:burp
描述:sql-injection, burp suite, bypass validation, sql map
URL:https://github.com/PoeenCy/web-ctf-challenge
标签:#burp
GitHub
GitHub - PoeenCy/web-ctf-challenge: sql-injection, burp suite, bypass validation, sql map
sql-injection, burp suite, bypass validation, sql map - GitHub - PoeenCy/web-ctf-challenge: sql-injection, burp suite, bypass validation, sql map
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2021-3007 Vulnerable Test Environment - Laminas/Zend Framework Deserialization RCE
URL:https://github.com/KrE80r/cve-2021-3007-vulnerable
标签:#RCE
更新了:RCE
描述:CVE-2021-3007 Vulnerable Test Environment - Laminas/Zend Framework Deserialization RCE
URL:https://github.com/KrE80r/cve-2021-3007-vulnerable
标签:#RCE
GitHub
GitHub - KrE80r/cve-2021-3007-vulnerable: CVE-2021-3007 Vulnerable Test Environment - Laminas/Zend Framework Deserialization RCE
CVE-2021-3007 Vulnerable Test Environment - Laminas/Zend Framework Deserialization RCE - KrE80r/cve-2021-3007-vulnerable
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:An analysis of CVE-2025-55182 and CVE-2025-66478 -- the vulnerabilities behind React2Shell. Tools, technical information, etc
URL:https://github.com/freeqaz/react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:An analysis of CVE-2025-55182 and CVE-2025-66478 -- the vulnerabilities behind React2Shell. Tools, technical information, etc
URL:https://github.com/freeqaz/react2shell
标签:#CVE-2025
GitHub
GitHub - freeqaz/react2shell: An analysis of CVE-2025-55182 and CVE-2025-66478 -- the vulnerabilities behind React2Shell. Tools…
An analysis of CVE-2025-55182 and CVE-2025-66478 -- the vulnerabilities behind React2Shell. Tools, technical information, etc - freeqaz/react2shell
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Docker lab for CVE-2025-55182 detection and exploitation
URL:https://github.com/l4rm4nd/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Docker lab for CVE-2025-55182 detection and exploitation
URL:https://github.com/l4rm4nd/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - l4rm4nd/CVE-2025-55182: Docker poc lab for CVE-2025-55182 / CVE-2025-66478 (React2Shell) detection and exploitation
Docker poc lab for CVE-2025-55182 / CVE-2025-66478 (React2Shell) detection and exploitation - l4rm4nd/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:浅谈React Server Components RCE 漏洞分析
URL:https://github.com/Airis101/CVE-2025-55182-analysis
标签:#CVE-2025
更新了:CVE-2025
描述:浅谈React Server Components RCE 漏洞分析
URL:https://github.com/Airis101/CVE-2025-55182-analysis
标签:#CVE-2025
GitHub
GitHub - Airis101/CVE-2025-55182-analysis: 浅谈React Server Components RCE 漏洞分析
浅谈React Server Components RCE 漏洞分析. Contribute to Airis101/CVE-2025-55182-analysis development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:React Server Components 远程代码执行漏洞(CVE-2025-55182)
URL:https://github.com/GelukCrab/React-Server-Components-RCE
标签:#RCE
更新了:RCE
描述:React Server Components 远程代码执行漏洞(CVE-2025-55182)
URL:https://github.com/GelukCrab/React-Server-Components-RCE
标签:#RCE
GitHub
GitHub - GelukCrab/React-Server-Components-RCE: React Server Components 远程代码执行漏洞(CVE-2025-55182)
React Server Components 远程代码执行漏洞(CVE-2025-55182). Contribute to GelukCrab/React-Server-Components-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Interactive RCE Web Shell (CVE-2025-55182) BY Golden-Security
URL:https://github.com/Golden-Secure/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Interactive RCE Web Shell (CVE-2025-55182) BY Golden-Security
URL:https://github.com/Golden-Secure/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Golden-Secure/CVE-2025-55182: Interactive RCE Web Shell (CVE-2025-55182) BY Golden-Security
Interactive RCE Web Shell (CVE-2025-55182) BY Golden-Security - Golden-Secure/CVE-2025-55182