GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A curated list of resources regarding CVE-2025-55182, the critical Remote Code Execution (RCE) vulnerability in React Server Components known as \"React2Shell\".
URL:https://github.com/websecuritylabs/React2Shell-Library
标签:#CVE-2025
更新了:CVE-2025
描述:A curated list of resources regarding CVE-2025-55182, the critical Remote Code Execution (RCE) vulnerability in React Server Components known as \"React2Shell\".
URL:https://github.com/websecuritylabs/React2Shell-Library
标签:#CVE-2025
GitHub
GitHub - websecuritylabs/React2Shell-Library: A curated list of resources regarding CVE-2025-55182, the critical Remote Code Execution…
A curated list of resources regarding CVE-2025-55182, the critical Remote Code Execution (RCE) vulnerability in React Server Components known as "React2Shell". - websecuritylabs/R...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:* React2Shell-CVE-2025-55182
URL:https://github.com/ihsansencan/React2Shell-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:* React2Shell-CVE-2025-55182
URL:https://github.com/ihsansencan/React2Shell-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - ihsansencan/React2Shell-CVE-2025-55182: * React2Shell-CVE-2025-55182
* React2Shell-CVE-2025-55182. Contribute to ihsansencan/React2Shell-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:一款基于ChatGPT开发的,使用360Quake,Gemini,AWVS等工具的红队信息收集/攻击面/漏洞/AI分析系统
URL:https://github.com/sylvieverykawaii/Lucifina
标签:#信息收集
更新了:信息收集
描述:一款基于ChatGPT开发的,使用360Quake,Gemini,AWVS等工具的红队信息收集/攻击面/漏洞/AI分析系统
URL:https://github.com/sylvieverykawaii/Lucifina
标签:#信息收集
GitHub
GitHub - sylvieverykawaii/Lucifina: 一款基于ChatGPT开发的,使用360Quake,Gemini,AWVS等工具的红队信息收集/攻击面/漏洞/AI分析系统
一款基于ChatGPT开发的,使用360Quake,Gemini,AWVS等工具的红队信息收集/攻击面/漏洞/AI分析系统 - sylvieverykawaii/Lucifina
GitHub监控消息提醒!!!
更新了:信息收集
描述:NeoScan 是一个综合性自动扫描信息收集系统,采用分布式架构设计,支持多种扫描类型和智能任务调度,主要用于网络安全评估、资产发现和漏洞检测。
URL:https://github.com/PengZhang0/QT-based-wireless-sensing-system-for-IoT
标签:#信息收集
更新了:信息收集
描述:NeoScan 是一个综合性自动扫描信息收集系统,采用分布式架构设计,支持多种扫描类型和智能任务调度,主要用于网络安全评估、资产发现和漏洞检测。
URL:https://github.com/PengZhang0/QT-based-wireless-sensing-system-for-IoT
标签:#信息收集
GitHub
GitHub - PengZhang0/QT-based-wireless-sensing-system-for-IoT: 针对传统的以嵌入式家庭网关为中心的智能家居系统的不足,提出一种基于物联网的智能家居系统。以GEC6818为平台,通过系统的框架构…
针对传统的以嵌入式家庭网关为中心的智能家居系统的不足,提出一种基于物联网的智能家居系统。以GEC6818为平台,通过系统的框架构造,界面设计,逻辑架构,算法优化等方面综合进行系统的设计,基于Zigbee无线网络及CC2530传感器来采集家居内的环境,再由物联网网关将这些信息转发至互联网中的服务器,用户通过客户端软件登录服务器便可以监控智能家居各个子系统的运行状况。以Qt5.9及Linux交叉...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (fully working exploit and scanner)
URL:https://github.com/l0n3m4n/CVE-2025-55182-Clean
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (fully working exploit and scanner)
URL:https://github.com/l0n3m4n/CVE-2025-55182-Clean
标签:#CVE-2025
GitHub
GitHub - l0n3m4n/CVE-2025-55182-Clean: CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (fully working exploit and…
CVE-2025-55182 RCE vulnerability in Next.js/React RSC servers (fully working exploit and scanner) - GitHub - l0n3m4n/CVE-2025-55182-Clean: CVE-2025-55182 RCE vulnerability in Next.js/React RSC ser...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 PoC
URL:https://github.com/Night-have-dreams/CVE-2025-55182-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 PoC
URL:https://github.com/Night-have-dreams/CVE-2025-55182-PoC
标签:#CVE-2025
GitHub
GitHub - Night-have-dreams/CVE-2025-55182-PoC: CVE-2025-55182 PoC
CVE-2025-55182 PoC. Contribute to Night-have-dreams/CVE-2025-55182-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
URL:https://github.com/C00LN3T/React4Shell
标签:#CVE-2025
更新了:CVE-2025
描述:ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
URL:https://github.com/C00LN3T/React4Shell
标签:#CVE-2025
GitHub
GitHub - C00LN3T/React4Shell: ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready - C00LN3T/React4Shell
GitHub监控消息提醒!!!
更新了:反序列化
描述:Phigros 存档序列化/反序列化
URL:https://github.com/hepengpeng/Propeller-Design-Program-Based-on-Charts
标签:#反序列化
更新了:反序列化
描述:Phigros 存档序列化/反序列化
URL:https://github.com/hepengpeng/Propeller-Design-Program-Based-on-Charts
标签:#反序列化
GitHub
GitHub - hepengpeng/Propeller-Design-Program-Based-on-Charts: 传统船用螺旋桨图谱设计方法依赖于人工查图、插值与手算,存在设计工作量繁重、效率低下、易引入误差等问题。尤其在终结设计阶段,需对多…
传统船用螺旋桨图谱设计方法依赖于人工查图、插值与手算,存在设计工作量繁重、效率低下、易引入误差等问题。尤其在终结设计阶段,需对多个航速与盘面比组合进行反复图谱查询与数据插值,操作繁琐且难以保证一致性,严重制约了船舶设计效率与质量。为此,基于Python编程语言开发了一套船用螺旋桨图谱程序化设计系统。该系统采用Akima样条与三次样条插值算法,对MAU系列螺旋桨设计图谱进行高精度数据库构建,并...
GitHub监控消息提醒!!!
更新了:Red Team
描述:A tool to scan a file for common keywords. Suitable for CTFs and Red Team activities. Feel free to customise for your own wordlist. Still in development
URL:https://github.com/Jay-Mouria/Vulnerability-Scanner
标签:#Red Team
更新了:Red Team
描述:A tool to scan a file for common keywords. Suitable for CTFs and Red Team activities. Feel free to customise for your own wordlist. Still in development
URL:https://github.com/Jay-Mouria/Vulnerability-Scanner
标签:#Red Team
GitHub
GitHub - Jay-Mouria/Vulnerability-Scanner: A modular Python-based vulnerability scanner built over a 15-week red-teaming learning…
A modular Python-based vulnerability scanner built over a 15-week red-teaming learning program. Includes Nmap-driven network scanning, SQLi/XSS detection, CVSS scoring, automated exploitation check...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
URL:https://github.com/C00LN3T/React2Shell
标签:#CVE-2025
更新了:CVE-2025
描述:ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
URL:https://github.com/C00LN3T/React2Shell
标签:#CVE-2025
GitHub
GitHub - C00LN3T/React2Shell: ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready - C00LN3T/React2Shell
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
标签:#CVE-2025
GitHub
GitHub - Syrins/CVE-2025-55182-React2Shell-RCE: A modern, user-friendly GUI application for detecting and exploiting the CVE-2025…
A modern, user-friendly GUI application for detecting and exploiting the CVE-2025-55182 vulnerability in React Server Components. Built with Python and Tkinter, featuring a sleek neon-themed interf...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/7amzahard/React2shell
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/7amzahard/React2shell
标签:#CVE-2025
GitHub
GitHub - 7amzahard/React2shell: CVE-2025-55182
CVE-2025-55182. Contribute to 7amzahard/React2shell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:a dart package to analyze CVE-2025-55182 react2shell
URL:https://github.com/Benrich127N/react2shell_analyzer
标签:#CVE-2025
更新了:CVE-2025
描述:a dart package to analyze CVE-2025-55182 react2shell
URL:https://github.com/Benrich127N/react2shell_analyzer
标签:#CVE-2025
GitHub
GitHub - Benrich127N/react2shell_analyzer: a dart package to analyze CVE-2025-55182 react2shell
a dart package to analyze CVE-2025-55182 react2shell - GitHub - Benrich127N/react2shell_analyzer: a dart package to analyze CVE-2025-55182 react2shell
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
URL:https://github.com/randarts/react-rce
标签:#RCE
更新了:RCE
描述:CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
URL:https://github.com/randarts/react-rce
标签:#RCE
GitHub
GitHub - randarts/react-rce: CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다. Contribute to randarts/react-rce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
URL:https://github.com/zainnyx111/dvwa-command-injection-lab
标签:#RCE
更新了:RCE
描述:CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
URL:https://github.com/zainnyx111/dvwa-command-injection-lab
标签:#RCE
GitHub
GitHub - zainnyx111/dvwa-command-injection-lab: A detailed walkthrough of exploiting Remote Code Execution (RCE) in DVWA, including…
A detailed walkthrough of exploiting Remote Code Execution (RCE) in DVWA, including command injection techniques, reverse shell execution, and mitigation strategies. Ideal for web application secur...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 poc
URL:https://github.com/Archerkong/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 poc
URL:https://github.com/Archerkong/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Archerkong/CVE-2025-55182: CVE-2025-55182 poc
CVE-2025-55182 poc. Contribute to Archerkong/CVE-2025-55182 development by creating an account on GitHub.