GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/7amzahard/React2shell
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/7amzahard/React2shell
标签:#CVE-2025
GitHub
GitHub - 7amzahard/React2shell: CVE-2025-55182
CVE-2025-55182. Contribute to 7amzahard/React2shell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:a dart package to analyze CVE-2025-55182 react2shell
URL:https://github.com/Benrich127N/react2shell_analyzer
标签:#CVE-2025
更新了:CVE-2025
描述:a dart package to analyze CVE-2025-55182 react2shell
URL:https://github.com/Benrich127N/react2shell_analyzer
标签:#CVE-2025
GitHub
GitHub - Benrich127N/react2shell_analyzer: a dart package to analyze CVE-2025-55182 react2shell
a dart package to analyze CVE-2025-55182 react2shell - GitHub - Benrich127N/react2shell_analyzer: a dart package to analyze CVE-2025-55182 react2shell
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
URL:https://github.com/randarts/react-rce
标签:#RCE
更新了:RCE
描述:CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
URL:https://github.com/randarts/react-rce
标签:#RCE
GitHub
GitHub - randarts/react-rce: CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다. Contribute to randarts/react-rce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
URL:https://github.com/zainnyx111/dvwa-command-injection-lab
标签:#RCE
更新了:RCE
描述:CVE-2025-55182 취약점에 대한 샘플을 AI와 함께 작성 및 테스트 했습니다.
URL:https://github.com/zainnyx111/dvwa-command-injection-lab
标签:#RCE
GitHub
GitHub - zainnyx111/dvwa-command-injection-lab: A detailed walkthrough of exploiting Remote Code Execution (RCE) in DVWA, including…
A detailed walkthrough of exploiting Remote Code Execution (RCE) in DVWA, including command injection techniques, reverse shell execution, and mitigation strategies. Ideal for web application secur...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 poc
URL:https://github.com/Archerkong/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 poc
URL:https://github.com/Archerkong/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Archerkong/CVE-2025-55182: CVE-2025-55182 poc
CVE-2025-55182 poc. Contribute to Archerkong/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A lightweight, recursive Bash script to detect Next.js and React Server DOM versions vulnerable to CVE-2025-55182 (React2Shell) in local projects.
URL:https://github.com/hamm0nz/react2shell-audit
标签:#CVE-2025
更新了:CVE-2025
描述:A lightweight, recursive Bash script to detect Next.js and React Server DOM versions vulnerable to CVE-2025-55182 (React2Shell) in local projects.
URL:https://github.com/hamm0nz/react2shell-audit
标签:#CVE-2025
GitHub
GitHub - hamm0nz/react2shell-audit: A lightweight, recursive Bash script to detect Next.js and React Server DOM versions vulnerable…
A lightweight, recursive Bash script to detect Next.js and React Server DOM versions vulnerable to CVE-2025-55182 (React2Shell) in local projects. - hamm0nz/react2shell-audit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-66516
URL:https://github.com/Ashwesker/Blackash-CVE-2025-66516-
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-66516
URL:https://github.com/Ashwesker/Blackash-CVE-2025-66516-
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-66516: CVE-2025-66516
CVE-2025-66516 . Contribute to Ashwesker/Blackash-CVE-2025-66516 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/echoenvoy/Vulnerable_PHP_Website
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/echoenvoy/Vulnerable_PHP_Website
标签:#RCE
GitHub
GitHub - echoenvoy/Vulnerable_PHP_Website: A deliberately vulnerable PHP web application for practicing real-world cybersecurity…
A deliberately vulnerable PHP web application for practicing real-world cybersecurity attacks like SQL Injection, XSS, CSRF, File Upload RCE, Directory Traversal, Command Injection, and Broken Auth...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Next.js RCE Scanner (CVE-2025-55182) - Automated vulnerability scanner using Zoomeye search engine. Discovers targets via dorks and tests for CVE-2025-55182 with parallel scanning capabilities.
URL:https://github.com/im-ezboy/CVE-2025-55182-zoomeye
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Next.js RCE Scanner (CVE-2025-55182) - Automated vulnerability scanner using Zoomeye search engine. Discovers targets via dorks and tests for CVE-2025-55182 with parallel scanning capabilities.
URL:https://github.com/im-ezboy/CVE-2025-55182-zoomeye
标签:#CVE-2025
GitHub
GitHub - im-ezboy/CVE-2025-55182-zoomeye: 🔍 Next.js RCE Scanner (CVE-2025-55182) - Automated vulnerability scanner using Zoomeye…
🔍 Next.js RCE Scanner (CVE-2025-55182) - Automated vulnerability scanner using Zoomeye search engine. Discovers targets via dorks and tests for CVE-2025-55182 with parallel scanning capabilities. -...
GitHub监控消息提醒!!!
更新了:代码审计
描述:基于 LLM 的智能代码审计平台,致力于为您打造全流程审计无忧的AI代理。旧版试用:
URL:https://github.com/lintsinghua/DeepAudit
标签:#代码审计
更新了:代码审计
描述:基于 LLM 的智能代码审计平台,致力于为您打造全流程审计无忧的AI代理。旧版试用:
URL:https://github.com/lintsinghua/DeepAudit
标签:#代码审计
GitHub
GitHub - lintsinghua/DeepAudit: DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源的代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama…
DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源的代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署 ,一键生成报告。支持中转站。让安全不再昂贵,让审计不再复杂。 - lintsinghua/DeepAudit
GitHub监控消息提醒!!!
更新了:Red Team
描述:Hackteam-Red BBS a International Bulletin Board System for Red Team Community
URL:https://github.com/Hackteam-Red/bbs
标签:#Red Team
更新了:Red Team
描述:Hackteam-Red BBS a International Bulletin Board System for Red Team Community
URL:https://github.com/Hackteam-Red/bbs
标签:#Red Team
GitHub
GitHub - Hackteam-Red/bbs: Hackteam-Red BBS a International Bulletin Board System for Red Team Community
Hackteam-Red BBS a International Bulletin Board System for Red Team Community - Hackteam-Red/bbs
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 and CVE-2025-66478
URL:https://github.com/FurkanKAYAPINAR/React-Next-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 and CVE-2025-66478
URL:https://github.com/FurkanKAYAPINAR/React-Next-Scanner
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-55182 Next.js RCE Exploit Tool
URL:https://github.com/racall/cve-2025-55182-node
标签:#RCE
更新了:RCE
描述:CVE-2025-55182 Next.js RCE Exploit Tool
URL:https://github.com/racall/cve-2025-55182-node
标签:#RCE
GitHub
GitHub - racall/cve-2025-55182-node: CVE-2025-55182 Next.js RCE Exploit Tool
CVE-2025-55182 Next.js RCE Exploit Tool. Contribute to racall/cve-2025-55182-node development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:burp
描述:Self-hosted burpee reminder app with smart nudges
URL:https://github.com/ruinunespt/burpee-reminder-app
标签:#burp
更新了:burp
描述:Self-hosted burpee reminder app with smart nudges
URL:https://github.com/ruinunespt/burpee-reminder-app
标签:#burp
GitHub
GitHub - ruinunespt/burpee-reminder-app: Self-hosted burpee reminder app with smart nudges
Self-hosted burpee reminder app with smart nudges. Contribute to ruinunespt/burpee-reminder-app development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A lightweight Remote Code Execution (RCE) Engine designed for isolation, security, and adaptability.
URL:https://github.com/pahulgogna/pgexec
标签:#RCE
更新了:RCE
描述:A lightweight Remote Code Execution (RCE) Engine designed for isolation, security, and adaptability.
URL:https://github.com/pahulgogna/pgexec
标签:#RCE
GitHub
GitHub - pahulgogna/pgexec: A lightweight Remote Code Execution (RCE) Engine designed for isolation, security, and adaptability.
A lightweight Remote Code Execution (RCE) Engine designed for isolation, security, and adaptability. - pahulgogna/pgexec
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Testing environment for trying CVE-2025-66478
URL:https://github.com/adrianhazgarcia/React4Shell
标签:#CVE-2025
更新了:CVE-2025
描述:Testing environment for trying CVE-2025-66478
URL:https://github.com/adrianhazgarcia/React4Shell
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/hlsitechio/shelllockolm
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/hlsitechio/shelllockolm
标签:#RCE
GitHub
GitHub - hlsitechio/shellockolm: 🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE…
🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE-2025-66478, malware, and supply chain attacks. Elementary security for complex codebases! - hls...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) in web applications
URL:https://github.com/xiaopeng-ye/react2shell-detector
标签:#CVE-2025
更新了:CVE-2025
描述:A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) in web applications
URL:https://github.com/xiaopeng-ye/react2shell-detector
标签:#CVE-2025
GitHub
GitHub - xiaopeng-ye/react2shell-detector: A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025…
A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) in web applications - xiaopeng-ye/react2shell-detector
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/hlsitechio/shellockolm
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/hlsitechio/shellockolm
标签:#RCE
GitHub
GitHub - hlsitechio/shellockolm: 🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE…
🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE-2025-66478, malware, and supply chain attacks. Elementary security for complex codebases! - hls...
GitHub监控消息提醒!!!
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/lza6/typli-2api-cfwork
标签:#绕过
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/lza6/typli-2api-cfwork
标签:#绕过
GitHub
GitHub - lza6/typli-2api-cfwork: 自动 Session 刷新(每次请求生成全新 16 位 Session ID,绕过 Typli 1000 词额度限制)| 指纹伪装(硬编码 Chrome 142 User-Agent/H…
自动 Session 刷新(每次请求生成全新 16 位 Session ID,绕过 Typli 1000 词额度限制)| 指纹伪装(硬编码 Chrome 142 User-Agent/Headers,实现高级匿名与反检测)| 协议转换(将上游 Typli 的自定义 SSE 和图片 API 完美转换为标准 OpenAI v1/chat/completions 流式接口)| 智能路由(统一接口智...
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478
标签:#RCE
GitHub
GitHub - Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478: Scanner for CVE-2025-55182 (React)…
Scanner for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) - Track and remediate a critical React Server Components (RSC) / Flight protocol vulnerability campaign impacting react-server-dom-we...