GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 PoC
URL:https://github.com/Night-have-dreams/CVE-2025-55182-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 PoC
URL:https://github.com/Night-have-dreams/CVE-2025-55182-PoC
标签:#CVE-2025
GitHub
GitHub - Night-have-dreams/CVE-2025-55182-PoC: CVE-2025-55182 PoC
CVE-2025-55182 PoC. Contribute to Night-have-dreams/CVE-2025-55182-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
URL:https://github.com/C00LN3T/React4Shell
标签:#CVE-2025
更新了:CVE-2025
描述:ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
URL:https://github.com/C00LN3T/React4Shell
标签:#CVE-2025
GitHub
GitHub - C00LN3T/React4Shell: ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready - C00LN3T/React4Shell
GitHub监控消息提醒!!!
更新了:反序列化
描述:Phigros 存档序列化/反序列化
URL:https://github.com/hepengpeng/Propeller-Design-Program-Based-on-Charts
标签:#反序列化
更新了:反序列化
描述:Phigros 存档序列化/反序列化
URL:https://github.com/hepengpeng/Propeller-Design-Program-Based-on-Charts
标签:#反序列化
GitHub
GitHub - hepengpeng/Propeller-Design-Program-Based-on-Charts: 传统船用螺旋桨图谱设计方法依赖于人工查图、插值与手算,存在设计工作量繁重、效率低下、易引入误差等问题。尤其在终结设计阶段,需对多…
传统船用螺旋桨图谱设计方法依赖于人工查图、插值与手算,存在设计工作量繁重、效率低下、易引入误差等问题。尤其在终结设计阶段,需对多个航速与盘面比组合进行反复图谱查询与数据插值,操作繁琐且难以保证一致性,严重制约了船舶设计效率与质量。为此,基于Python编程语言开发了一套船用螺旋桨图谱程序化设计系统。该系统采用Akima样条与三次样条插值算法,对MAU系列螺旋桨设计图谱进行高精度数据库构建,并...
GitHub监控消息提醒!!!
更新了:Red Team
描述:A tool to scan a file for common keywords. Suitable for CTFs and Red Team activities. Feel free to customise for your own wordlist. Still in development
URL:https://github.com/Jay-Mouria/Vulnerability-Scanner
标签:#Red Team
更新了:Red Team
描述:A tool to scan a file for common keywords. Suitable for CTFs and Red Team activities. Feel free to customise for your own wordlist. Still in development
URL:https://github.com/Jay-Mouria/Vulnerability-Scanner
标签:#Red Team
GitHub
GitHub - Jay-Mouria/Vulnerability-Scanner: A modular Python-based vulnerability scanner built over a 15-week red-teaming learning…
A modular Python-based vulnerability scanner built over a 15-week red-teaming learning program. Includes Nmap-driven network scanning, SQLi/XSS detection, CVSS scoring, automated exploitation check...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
URL:https://github.com/C00LN3T/React2Shell
标签:#CVE-2025
更新了:CVE-2025
描述:ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
URL:https://github.com/C00LN3T/React2Shell
标签:#CVE-2025
GitHub
GitHub - C00LN3T/React2Shell: ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready
ULTIMATE REACT4SHELL EXPLOITATION FRAMEWORK CVE-2025-55182 & CVE-2025-66478 Ready - C00LN3T/React2Shell
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
标签:#CVE-2025
GitHub
GitHub - Syrins/CVE-2025-55182-React2Shell-RCE: A modern, user-friendly GUI application for detecting and exploiting the CVE-2025…
A modern, user-friendly GUI application for detecting and exploiting the CVE-2025-55182 vulnerability in React Server Components. Built with Python and Tkinter, featuring a sleek neon-themed interf...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/7amzahard/React2shell
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/7amzahard/React2shell
标签:#CVE-2025
GitHub
GitHub - 7amzahard/React2shell: CVE-2025-55182
CVE-2025-55182. Contribute to 7amzahard/React2shell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:a dart package to analyze CVE-2025-55182 react2shell
URL:https://github.com/Benrich127N/react2shell_analyzer
标签:#CVE-2025
更新了:CVE-2025
描述:a dart package to analyze CVE-2025-55182 react2shell
URL:https://github.com/Benrich127N/react2shell_analyzer
标签:#CVE-2025
GitHub
GitHub - Benrich127N/react2shell_analyzer: a dart package to analyze CVE-2025-55182 react2shell
a dart package to analyze CVE-2025-55182 react2shell - GitHub - Benrich127N/react2shell_analyzer: a dart package to analyze CVE-2025-55182 react2shell
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
URL:https://github.com/randarts/react-rce
标签:#RCE
更新了:RCE
描述:CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
URL:https://github.com/randarts/react-rce
标签:#RCE
GitHub
GitHub - randarts/react-rce: CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다. Contribute to randarts/react-rce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
URL:https://github.com/zainnyx111/dvwa-command-injection-lab
标签:#RCE
更新了:RCE
描述:CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
URL:https://github.com/zainnyx111/dvwa-command-injection-lab
标签:#RCE
GitHub
GitHub - zainnyx111/dvwa-command-injection-lab: A detailed walkthrough of exploiting Remote Code Execution (RCE) in DVWA, including…
A detailed walkthrough of exploiting Remote Code Execution (RCE) in DVWA, including command injection techniques, reverse shell execution, and mitigation strategies. Ideal for web application secur...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 poc
URL:https://github.com/Archerkong/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 poc
URL:https://github.com/Archerkong/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Archerkong/CVE-2025-55182: CVE-2025-55182 poc
CVE-2025-55182 poc. Contribute to Archerkong/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A lightweight, recursive Bash script to detect Next.js and React Server DOM versions vulnerable to CVE-2025-55182 (React2Shell) in local projects.
URL:https://github.com/hamm0nz/react2shell-audit
标签:#CVE-2025
更新了:CVE-2025
描述:A lightweight, recursive Bash script to detect Next.js and React Server DOM versions vulnerable to CVE-2025-55182 (React2Shell) in local projects.
URL:https://github.com/hamm0nz/react2shell-audit
标签:#CVE-2025
GitHub
GitHub - hamm0nz/react2shell-audit: A lightweight, recursive Bash script to detect Next.js and React Server DOM versions vulnerable…
A lightweight, recursive Bash script to detect Next.js and React Server DOM versions vulnerable to CVE-2025-55182 (React2Shell) in local projects. - hamm0nz/react2shell-audit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-66516
URL:https://github.com/Ashwesker/Blackash-CVE-2025-66516-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-66516
URL:https://github.com/Ashwesker/Blackash-CVE-2025-66516-
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-66516: CVE-2025-66516
CVE-2025-66516 . Contribute to Ashwesker/Blackash-CVE-2025-66516 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/echoenvoy/Vulnerable_PHP_Website
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/echoenvoy/Vulnerable_PHP_Website
标签:#RCE
GitHub
GitHub - echoenvoy/Vulnerable_PHP_Website: A deliberately vulnerable PHP web application for practicing real-world cybersecurity…
A deliberately vulnerable PHP web application for practicing real-world cybersecurity attacks like SQL Injection, XSS, CSRF, File Upload RCE, Directory Traversal, Command Injection, and Broken Auth...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Next.js RCE Scanner (CVE-2025-55182) - Automated vulnerability scanner using Zoomeye search engine. Discovers targets via dorks and tests for CVE-2025-55182 with parallel scanning capabilities.
URL:https://github.com/im-ezboy/CVE-2025-55182-zoomeye
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Next.js RCE Scanner (CVE-2025-55182) - Automated vulnerability scanner using Zoomeye search engine. Discovers targets via dorks and tests for CVE-2025-55182 with parallel scanning capabilities.
URL:https://github.com/im-ezboy/CVE-2025-55182-zoomeye
标签:#CVE-2025
GitHub
GitHub - im-ezboy/CVE-2025-55182-zoomeye: 🔍 Next.js RCE Scanner (CVE-2025-55182) - Automated vulnerability scanner using Zoomeye…
🔍 Next.js RCE Scanner (CVE-2025-55182) - Automated vulnerability scanner using Zoomeye search engine. Discovers targets via dorks and tests for CVE-2025-55182 with parallel scanning capabilities. -...
GitHub监控消息提醒!!!
更新了:代码审计
描述:基于 LLM 的智能代码审计平台,致力于为您打造全流程审计无忧的AI代理。旧版试用:
URL:https://github.com/lintsinghua/DeepAudit
标签:#代码审计
更新了:代码审计
描述:基于 LLM 的智能代码审计平台,致力于为您打造全流程审计无忧的AI代理。旧版试用:
URL:https://github.com/lintsinghua/DeepAudit
标签:#代码审计
GitHub
GitHub - lintsinghua/DeepAudit: DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源的代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama…
DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源的代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署 ,一键生成报告。支持中转站。让安全不再昂贵,让审计不再复杂。 - lintsinghua/DeepAudit
GitHub监控消息提醒!!!
更新了:Red Team
描述:Hackteam-Red BBS a International Bulletin Board System for Red Team Community
URL:https://github.com/Hackteam-Red/bbs
标签:#Red Team
更新了:Red Team
描述:Hackteam-Red BBS a International Bulletin Board System for Red Team Community
URL:https://github.com/Hackteam-Red/bbs
标签:#Red Team
GitHub
GitHub - Hackteam-Red/bbs: Hackteam-Red BBS a International Bulletin Board System for Red Team Community
Hackteam-Red BBS a International Bulletin Board System for Red Team Community - Hackteam-Red/bbs
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 and CVE-2025-66478
URL:https://github.com/FurkanKAYAPINAR/React-Next-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 and CVE-2025-66478
URL:https://github.com/FurkanKAYAPINAR/React-Next-Scanner
标签:#CVE-2025