GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Torito React2Shell Scanner & Exploit Tool (CVE-2025-55182 / 66478)
URL:https://github.com/ToritoIO/Torito-R2S
标签:#CVE-2025
更新了:CVE-2025
描述:Torito React2Shell Scanner & Exploit Tool (CVE-2025-55182 / 66478)
URL:https://github.com/ToritoIO/Torito-R2S
标签:#CVE-2025
GitHub
GitHub - ToritoIO/Torito-R2S: Torito React2Shell Scanner & Exploit Tool (CVE-2025-55182 / 66478)
Torito React2Shell Scanner & Exploit Tool (CVE-2025-55182 / 66478) - ToritoIO/Torito-R2S
GitHub监控消息提醒!!!
更新了:RCE
描述:Python RCE exploit for Sendmail with ClamAV-Milter <0.91.2 (CVE-2007-4560). Remote root command injection via SMTP RCPT TO headers.
URL:https://github.com/strikoder/sendmail-clamav-exploit-CVE-2007-4560
标签:#RCE
更新了:RCE
描述:Python RCE exploit for Sendmail with ClamAV-Milter <0.91.2 (CVE-2007-4560). Remote root command injection via SMTP RCPT TO headers.
URL:https://github.com/strikoder/sendmail-clamav-exploit-CVE-2007-4560
标签:#RCE
GitHub
GitHub - strikoder/sendmail-clamav-exploit-CVE-2007-4560: Python RCE exploit for Sendmail with ClamAV-Milter <0.91.2 (CVE-2007…
Python RCE exploit for Sendmail with ClamAV-Milter <0.91.2 (CVE-2007-4560). Remote root command injection via SMTP RCPT TO headers. - strikoder/sendmail-clamav-exploit-CVE-2007-4560
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:react2shell CVE-2025-55182 PoC
URL:https://github.com/surajhacx/react2shellpoc
标签:#CVE-2025
更新了:CVE-2025
描述:react2shell CVE-2025-55182 PoC
URL:https://github.com/surajhacx/react2shellpoc
标签:#CVE-2025
GitHub
GitHub - surajhacx/react2shellpoc: react2shell CVE-2025-55182 PoC
react2shell CVE-2025-55182 PoC . Contribute to surajhacx/react2shellpoc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Step-by-step walkthrough of CVE-2025-55182 (React2Shell) by tracing React's Flight protocol internals.
URL:https://github.com/kavienanj/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Step-by-step walkthrough of CVE-2025-55182 (React2Shell) by tracing React's Flight protocol internals.
URL:https://github.com/kavienanj/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - kavienanj/CVE-2025-55182: Step-by-step walkthrough of CVE-2025-55182 (React2Shell) by tracing React's Flight protocol…
Step-by-step walkthrough of CVE-2025-55182 (React2Shell) by tracing React's Flight protocol internals. - kavienanj/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:RCE
描述:CS-Cart Authenticated RCE & LFI Exploitation Tool | Template Editor File Upload Vulnerability + PHPMailer Local File Inclusion | Proof of Concept for CS-Cart 1.3.3
URL:https://github.com/strikoder/cscart-rce-lfi-exploit
标签:#RCE
更新了:RCE
描述:CS-Cart Authenticated RCE & LFI Exploitation Tool | Template Editor File Upload Vulnerability + PHPMailer Local File Inclusion | Proof of Concept for CS-Cart 1.3.3
URL:https://github.com/strikoder/cscart-rce-lfi-exploit
标签:#RCE
GitHub
GitHub - strikoder/CS-Cart-POC: CS-Cart Authenticated RCE & LFI Exploitation Tool | Template Editor File Upload Vulnerability +…
CS-Cart Authenticated RCE & LFI Exploitation Tool | Template Editor File Upload Vulnerability + PHPMailer Local File Inclusion | Proof of Concept for CS-Cart 1.3.3 - strikoder/CS-Cart-POC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:High-fidelity RCE scanner for CVE-2025-55182 affecting Next.js RSC. Supports mass scanning, command execution, and automated recon pipelines. Built for pentesters, researchers, and bounty hunters.
URL:https://github.com/satriarizka/CVE-2025-55182-Simple-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:High-fidelity RCE scanner for CVE-2025-55182 affecting Next.js RSC. Supports mass scanning, command execution, and automated recon pipelines. Built for pentesters, researchers, and bounty hunters.
URL:https://github.com/satriarizka/CVE-2025-55182-Simple-Scanner
标签:#CVE-2025
GitHub
GitHub - satriarizka/CVE-2025-55182-Simple-Scanner: High-fidelity RCE scanner for CVE-2025-55182 affecting Next.js RSC. Supports…
High-fidelity RCE scanner for CVE-2025-55182 affecting Next.js RSC. Supports mass scanning, command execution, and automated recon pipelines. Built for pentesters, researchers, and bounty hunters. ...
GitHub监控消息提醒!!!
更新了:hvv
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/NerdySoftPaw/VRRAPI-HACS
标签:#hvv
更新了:hvv
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/NerdySoftPaw/VRRAPI-HACS
标签:#hvv
GitHub
GitHub - NerdySoftPaw/VRRAPI-HACS: A Home Assistant integration for the public transport networks VRR (Verkehrsverbund Rhein-Ruhr)…
A Home Assistant integration for the public transport networks VRR (Verkehrsverbund Rhein-Ruhr), KVV (Karlsruher Verkehrsverbund), HVV (Hochbahn), Trafiklab (Sweden) and NTA (National Transport Aut...
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/kevinyang5771323/IsMdKBMNTx
标签:#应急响应
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/kevinyang5771323/IsMdKBMNTx
标签:#应急响应
GitHub
GitHub - kevinyang5771323/IsMdKBMNTx: 本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急…
本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。 - kevinyang5771323/IsMdK...
GitHub监控消息提醒!!!
更新了:漏洞EXP
描述:[漏洞复现] 全球首款基于RSC特性绕WAF的CVE-2025-55182 React RCE 漏洞 EXP
URL:https://github.com/xcanwin/CVE-2025-55182-React-RCE
标签:#漏洞EXP
更新了:漏洞EXP
描述:[漏洞复现] 全球首款基于RSC特性绕WAF的CVE-2025-55182 React RCE 漏洞 EXP
URL:https://github.com/xcanwin/CVE-2025-55182-React-RCE
标签:#漏洞EXP
GitHub
GitHub - xcanwin/CVE-2025-55182-React-RCE: [漏洞复现] 全球首款基于RSC特性能绕过WAF检测的CVE-2025-55182 React Server RCE 漏洞 EXP。
[漏洞复现] 全球首款基于RSC特性能绕过WAF检测的CVE-2025-55182 React Server RCE 漏洞 EXP。 - xcanwin/CVE-2025-55182-React-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A curated list of resources regarding CVE-2025-55182, the critical Remote Code Execution (RCE) vulnerability in React Server Components known as \"React2Shell\".
URL:https://github.com/websecuritylabs/React2Shell-Library
标签:#CVE-2025
更新了:CVE-2025
描述:A curated list of resources regarding CVE-2025-55182, the critical Remote Code Execution (RCE) vulnerability in React Server Components known as \"React2Shell\".
URL:https://github.com/websecuritylabs/React2Shell-Library
标签:#CVE-2025
GitHub
GitHub - websecuritylabs/React2Shell-Library: A curated list of resources regarding CVE-2025-55182, the critical Remote Code Execution…
A curated list of resources regarding CVE-2025-55182, the critical Remote Code Execution (RCE) vulnerability in React Server Components known as "React2Shell". - websecuritylabs/R...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:* React2Shell-CVE-2025-55182
URL:https://github.com/ihsansencan/React2Shell-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:* React2Shell-CVE-2025-55182
URL:https://github.com/ihsansencan/React2Shell-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - ihsansencan/React2Shell-CVE-2025-55182: * React2Shell-CVE-2025-55182
* React2Shell-CVE-2025-55182. Contribute to ihsansencan/React2Shell-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:一款基于ChatGPT开发的,使用360Quake,Gemini,AWVS等工具的红队信息收集/攻击面/漏洞/AI分析系统
URL:https://github.com/sylvieverykawaii/Lucifina
标签:#信息收集
更新了:信息收集
描述:一款基于ChatGPT开发的,使用360Quake,Gemini,AWVS等工具的红队信息收集/攻击面/漏洞/AI分析系统
URL:https://github.com/sylvieverykawaii/Lucifina
标签:#信息收集
GitHub
GitHub - sylvieverykawaii/Lucifina: 一款基于ChatGPT开发的,使用360Quake,Gemini,AWVS等工具的红队信息收集/攻击面/漏洞/AI分析系统
一款基于ChatGPT开发的,使用360Quake,Gemini,AWVS等工具的红队信息收集/攻击面/漏洞/AI分析系统 - sylvieverykawaii/Lucifina
GitHub监控消息提醒!!!
更新了:信息收集
描述:NeoScan 是一个综合性自动扫描信息收集系统,采用分布式架构设计,支持多种扫描类型和智能任务调度,主要用于网络安全评估、资产发现和漏洞检测。
URL:https://github.com/PengZhang0/QT-based-wireless-sensing-system-for-IoT
标签:#信息收集
更新了:信息收集
描述:NeoScan 是一个综合性自动扫描信息收集系统,采用分布式架构设计,支持多种扫描类型和智能任务调度,主要用于网络安全评估、资产发现和漏洞检测。
URL:https://github.com/PengZhang0/QT-based-wireless-sensing-system-for-IoT
标签:#信息收集
GitHub
GitHub - PengZhang0/QT-based-wireless-sensing-system-for-IoT: 针对传统的以嵌入式家庭网关为中心的智能家居系统的不足,提出一种基于物联网的智能家居系统。以GEC6818为平台,通过系统的框架构…
针对传统的以嵌入式家庭网关为中心的智能家居系统的不足,提出一种基于物联网的智能家居系统。以GEC6818为平台,通过系统的框架构造,界面设计,逻辑架构,算法优化等方面综合进行系统的设计,基于Zigbee无线网络及CC2530传感器来采集家居内的环境,再由物联网网关将这些信息转发至互联网中的服务器,用户通过客户端软件登录服务器便可以监控智能家居各个子系统的运行状况。以Qt5.9及Linux交叉...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (fully working exploit and scanner)
URL:https://github.com/l0n3m4n/CVE-2025-55182-Clean
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (fully working exploit and scanner)
URL:https://github.com/l0n3m4n/CVE-2025-55182-Clean
标签:#CVE-2025
GitHub
GitHub - l0n3m4n/CVE-2025-55182-Clean: CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (fully working exploit and…
CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (fully working exploit and scanner) - GitHub - l0n3m4n/CVE-2025-55182-Clean: CVE-2025-55182 RCE vulnerability in Next.js/React RSC ser...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 PoC
URL:https://github.com/Night-have-dreams/CVE-2025-55182-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 PoC
URL:https://github.com/Night-have-dreams/CVE-2025-55182-PoC
标签:#CVE-2025
GitHub
GitHub - Night-have-dreams/CVE-2025-55182-PoC: CVE-2025-55182 PoC
CVE-2025-55182 PoC. Contribute to Night-have-dreams/CVE-2025-55182-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
URL:https://github.com/C00LN3T/React4Shell
标签:#CVE-2025
更新了:CVE-2025
描述:ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
URL:https://github.com/C00LN3T/React4Shell
标签:#CVE-2025
GitHub
GitHub - C00LN3T/React4Shell: ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready - C00LN3T/React4Shell
GitHub监控消息提醒!!!
更新了:反序列化
描述:Phigros 存档序列化/反序列化
URL:https://github.com/hepengpeng/Propeller-Design-Program-Based-on-Charts
标签:#反序列化
更新了:反序列化
描述:Phigros 存档序列化/反序列化
URL:https://github.com/hepengpeng/Propeller-Design-Program-Based-on-Charts
标签:#反序列化
GitHub
GitHub - hepengpeng/Propeller-Design-Program-Based-on-Charts: 传统船用螺旋桨图谱设计方法依赖于人工查图、插值与手算,存在设计工作量繁重、效率低下、易引入误差等问题。尤其在终结设计阶段,需对多…
传统船用螺旋桨图谱设计方法依赖于人工查图、插值与手算,存在设计工作量繁重、效率低下、易引入误差等问题。尤其在终结设计阶段,需对多个航速与盘面比组合进行反复图谱查询与数据插值,操作繁琐且难以保证一致性,严重制约了船舶设计效率与质量。为此,基于Python编程语言开发了一套船用螺旋桨图谱程序化设计系统。该系统采用Akima样条与三次样条插值算法,对MAU系列螺旋桨设计图谱进行高精度数据库构建,并...
GitHub监控消息提醒!!!
更新了:Red Team
描述:A tool to scan a file for common keywords. Suitable for CTFs and Red Team activities. Feel free to customise for your own wordlist. Still in development
URL:https://github.com/Jay-Mouria/Vulnerability-Scanner
标签:#Red Team
更新了:Red Team
描述:A tool to scan a file for common keywords. Suitable for CTFs and Red Team activities. Feel free to customise for your own wordlist. Still in development
URL:https://github.com/Jay-Mouria/Vulnerability-Scanner
标签:#Red Team
GitHub
GitHub - Jay-Mouria/Vulnerability-Scanner: A modular Python-based vulnerability scanner built over a 15-week red-teaming learning…
A modular Python-based vulnerability scanner built over a 15-week red-teaming learning program. Includes Nmap-driven network scanning, SQLi/XSS detection, CVSS scoring, automated exploitation check...