GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/rubensuxo-eh/react2shell-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/rubensuxo-eh/react2shell-exploit
标签:#CVE-2025
GitHub
GitHub - rubensuxo-eh/react2shell-exploit: React2Shell-Exploit — Complete exploitation framework for CVE-2025-55182, including…
React2Shell-Exploit — Complete exploitation framework for CVE-2025-55182, including Python exploit, Docker vulnerable lab, Burp Suite manual and automated exploitation, Nuclei detection template, a...
GitHub监控消息提醒!!!
更新了:RCE
描述:One command to fix CVE-2025-66478 (React 2 Shell RCE) in your Next.js / React RSC app.
URL:https://github.com/vercel-labs/fix-react2shell-next
标签:#RCE
更新了:RCE
描述:One command to fix CVE-2025-66478 (React 2 Shell RCE) in your Next.js / React RSC app.
URL:https://github.com/vercel-labs/fix-react2shell-next
标签:#RCE
GitHub
GitHub - vercel-labs/fix-react2shell-next: One command to fix CVE-2025-66478 (React 2 Shell RCE) in your Next.js / React RSC app.
One command to fix CVE-2025-66478 (React 2 Shell RCE) in your Next.js / React RSC app. - vercel-labs/fix-react2shell-next
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Mass Exploit to new CVE-2025-55182 (also referred to as “React2Shell”)
URL:https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Mass Exploit to new CVE-2025-55182 (also referred to as “React2Shell”)
URL:https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - CirqueiraDev/MassExploit-CVE-2025-55182: CVE-2025-55182 RCE - Massive Scanner POC
CVE-2025-55182 RCE - Massive Scanner POC. Contribute to CirqueiraDev/MassExploit-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:One command to fix CVE-2025-66478 (React 2 Shell RCE) in your Next.js / React RSC app.
URL:https://github.com/L1337Xi/CVE-2024-28397-Exploit-Automation
标签:#RCE
更新了:RCE
描述:One command to fix CVE-2025-66478 (React 2 Shell RCE) in your Next.js / React RSC app.
URL:https://github.com/L1337Xi/CVE-2024-28397-Exploit-Automation
标签:#RCE
GitHub
GitHub - L1337Xi/CVE-2024-28397-Exploit-Automation: A Python automation script for exploiting the **js2py Sandbox Escape** vulnerability…
A Python automation script for exploiting the **js2py Sandbox Escape** vulnerability (CVE-2024-28397). This tool automates the payload generation and delivery process to achieve Remote Code Executi...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detects exposed React Server Components vulnerable to CVE-2025-55182 via RSC negotiation.
URL:https://github.com/w3irdo21/CVE-2025-55182-react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:Detects exposed React Server Components vulnerable to CVE-2025-55182 via RSC negotiation.
URL:https://github.com/w3irdo21/CVE-2025-55182-react2shell
标签:#CVE-2025
GitHub
GitHub - w3irdo21/CVE-2025-55182-react2shell: Detects exposed React Server Components vulnerable to CVE-2025-55182 via RSC negotiation.
Detects exposed React Server Components vulnerable to CVE-2025-55182 via RSC negotiation. - w3irdo21/CVE-2025-55182-react2shell
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Advanced security testing tool for CVE-2025-55182 vulnerability assessment in Next.js applications. Features interactive shell, batch scanning, WAF bypass, and comprehensive reporting.
URL:https://github.com/zamdevio/r2s
标签:#CVE-2025
更新了:CVE-2025
描述:Advanced security testing tool for CVE-2025-55182 vulnerability assessment in Next.js applications. Features interactive shell, batch scanning, WAF bypass, and comprehensive reporting.
URL:https://github.com/zamdevio/r2s
标签:#CVE-2025
GitHub
GitHub - zamdevio/r2s: Advanced security testing tool for CVE-2025-55182 vulnerability assessment in Next.js applications. Features…
Advanced security testing tool for CVE-2025-55182 vulnerability assessment in Next.js applications. Features interactive shell, batch scanning, WAF bypass, and comprehensive reporting. - zamdevio/r2s
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web
标签:#CVE-2025
更新了:CVE-2025
描述:Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web
标签:#CVE-2025
GitHub
GitHub - AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web: React2Shell, CVE-2025-55182, RCE…
React2Shell, CVE-2025-55182, RCE Vulnerability: A critical breakdown of the unsafe deserialization flaw in React Server Components that enables unauthenticated remote code execution across default ...
GitHub监控消息提醒!!!
更新了:RCE
描述:Interactive RCE exploitation tool targeting CVE-2025-55182, a critical vulnerability in React Server Components (RSC) affecting React 19.0.0 - 19.2.0 and Next.js applications.
URL:https://github.com/Hghost0x00/CVE-2025-55182
标签:#RCE
更新了:RCE
描述:Interactive RCE exploitation tool targeting CVE-2025-55182, a critical vulnerability in React Server Components (RSC) affecting React 19.0.0 - 19.2.0 and Next.js applications.
URL:https://github.com/Hghost0x00/CVE-2025-55182
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Poc for CVE-2025-55182
URL:https://github.com/MuhammadWaseem29/React2Shell_Rce-cve-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Poc for CVE-2025-55182
URL:https://github.com/MuhammadWaseem29/React2Shell_Rce-cve-2025-55182
标签:#CVE-2025
GitHub
GitHub - MuhammadWaseem29/React2Shell_Rce-cve-2025-55182: React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0,…
React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0, including react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack, contain a remote code execution vul...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Poc for CVE-2025-55182
URL:https://github.com/0xN7y/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Poc for CVE-2025-55182
URL:https://github.com/0xN7y/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - 0xN7y/CVE-2025-55182: Poc for CVE-2025-55182
Poc for CVE-2025-55182. Contribute to 0xN7y/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 Scanner - Multi-variant payloads, OOB callbacks, timing & digest verification
URL:https://github.com/Shadowroot97/POC-React2Shell-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 Scanner - Multi-variant payloads, OOB callbacks, timing & digest verification
URL:https://github.com/Shadowroot97/POC-React2Shell-CVE-2025-55182
标签:#CVE-2025
GitHub
Shadowroot97/POC-React2Shell-CVE-2025-55182
CVE-2025-55182 Scanner - Multi-variant payloads, OOB callbacks, timing & digest verification - Shadowroot97/POC-React2Shell-CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (fully working exploit and scanner)
URL:https://github.com/l0n3m4n/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (fully working exploit and scanner)
URL:https://github.com/l0n3m4n/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - l0n3m4n/CVE-2025-55182-Waf: CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (exploit and scanner)
CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (exploit and scanner) - GitHub - l0n3m4n/CVE-2025-55182-Waf: CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (exploit an...
GitHub监控消息提醒!!!
更新了:RCE
描述:A PoC for RCE2Shell (CVE-2025-55182)
URL:https://github.com/shreyas-malhotra/RCE2Shell-CVE-2025-55182
标签:#RCE
更新了:RCE
描述:A PoC for RCE2Shell (CVE-2025-55182)
URL:https://github.com/shreyas-malhotra/RCE2Shell-CVE-2025-55182
标签:#RCE
GitHub
shreyas-malhotra/RCE2Shell-CVE-2025-55182
A PoC for RCE2Shell (CVE-2025-55182). Contribute to shreyas-malhotra/RCE2Shell-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:React Shell & Next.js RSC Exploit Tool (CVE-2025-55182)
URL:https://github.com/ynsmroztas/NextRce
标签:#RCE
更新了:RCE
描述:React Shell & Next.js RSC Exploit Tool (CVE-2025-55182)
URL:https://github.com/ynsmroztas/NextRce
标签:#RCE
GitHub
GitHub - ynsmroztas/NextRce: React Shell & Next.js RSC Exploit Tool (CVE-2025-55182)
React Shell & Next.js RSC Exploit Tool (CVE-2025-55182) - ynsmroztas/NextRce
GitHub监控消息提醒!!!
更新了:RCE
描述:React2Shell Auto Exploit: A CLI tool to exploit prototype pollution vulnerabilities (RCE) in React Server Actions
URL:https://github.com/sammwyy/R2SAE
标签:#RCE
更新了:RCE
描述:React2Shell Auto Exploit: A CLI tool to exploit prototype pollution vulnerabilities (RCE) in React Server Actions
URL:https://github.com/sammwyy/R2SAE
标签:#RCE
GitHub
GitHub - sammwyy/R2SAE: React2Shell Auto Exploit: A CLI tool to exploit prototype pollution vulnerabilities (RCE) in React Server…
React2Shell Auto Exploit: A CLI tool to exploit prototype pollution vulnerabilities (RCE) in React Server Actions - sammwyy/R2SAE
GitHub监控消息提醒!!!
更新了:RCE
描述:A minimal RCE PoC for CVE-2025-55182
URL:https://github.com/shreyas-malhotra/React2Shell-CVE-2025-55182
标签:#RCE
更新了:RCE
描述:A minimal RCE PoC for CVE-2025-55182
URL:https://github.com/shreyas-malhotra/React2Shell-CVE-2025-55182
标签:#RCE
GitHub
GitHub - shreyas-malhotra/React2Shell-CVE-2025-55182: A minimal RCE PoC for CVE-2025-55182
A minimal RCE PoC for CVE-2025-55182. Contribute to shreyas-malhotra/React2Shell-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 PoC Exploit
URL:https://github.com/sohaibeb/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 PoC Exploit
URL:https://github.com/sohaibeb/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - sohaibeb/CVE-2025-55182: CVE-2025-55182 PoC Exploit
CVE-2025-55182 PoC Exploit. Contribute to sohaibeb/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/hlsitechio/cve-2025-55182-tools
标签:#CVE-2025
更新了:CVE-2025
描述:Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/hlsitechio/cve-2025-55182-tools
标签:#CVE-2025
GitHub
GitHub - hlsitechio/shellockolm: 🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE…
🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE-2025-66478, malware, and supply chain attacks. Elementary security for complex codebases! - hls...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A modified and a little boosted exploit for CVE-2025-55182, React2Shell: Pre-authentication Remote Code Execution in react-server-dom-webpack@19.0.0
URL:https://github.com/MikeTheHash/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:A modified and a little boosted exploit for CVE-2025-55182, React2Shell: Pre-authentication Remote Code Execution in react-server-dom-webpack@19.0.0
URL:https://github.com/MikeTheHash/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - MikeTheHash/CVE-2025-55182: A modified and a little boosted exploit for CVE-2025-55182, React2Shell: Pre-authentication…
A modified and a little boosted exploit for CVE-2025-55182, React2Shell: Pre-authentication Remote Code Execution in React Server Packages - GitHub - MikeTheHash/CVE-2025-55182: A modified and a ...
GitHub监控消息提醒!!!
更新了:RCE
描述:Web Application Firewall lab using NGINX, ModSecurity, and OWASP CRS in Docker. Demonstrates protection against SQLi, XSS, and RCE attacks with hands-on examples.
URL:https://github.com/Pedram-Faramarz/waf-lab-nginx-modsecurity
标签:#RCE
更新了:RCE
描述:Web Application Firewall lab using NGINX, ModSecurity, and OWASP CRS in Docker. Demonstrates protection against SQLi, XSS, and RCE attacks with hands-on examples.
URL:https://github.com/Pedram-Faramarz/waf-lab-nginx-modsecurity
标签:#RCE
GitHub
GitHub - Pedram-Faramarz/waf-lab-nginx-modsecurity: Web Application Firewall lab using NGINX, ModSecurity, and OWASP CRS in Docker.…
Web Application Firewall lab using NGINX, ModSecurity, and OWASP CRS in Docker. Demonstrates protection against SQLi, XSS, and RCE attacks with hands-on examples. - Pedram-Faramarz/waf-lab-nginx-mo...
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/NaftalidaCosta/File-Upload-VulnerabilitiesLab
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/NaftalidaCosta/File-Upload-VulnerabilitiesLab
标签:#RCE
GitHub
GitHub - NaftalidaCosta/File-Upload-VulnerabilitiesLab: Projeto onde exploro vulnerabilidades de File Upload a partir dos labs…
Projeto onde exploro vulnerabilidades de File Upload a partir dos labs da PortSwigger, realizando RCE via upload de arquivos PHP e bypass de validações como Content-Type usando Caido e Burp Suite. ...