GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/echoenvoy/Vulnerable_PHP_Website
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/echoenvoy/Vulnerable_PHP_Website
标签:#RCE
GitHub
GitHub - echoenvoy/Vulnerable_PHP_Website: A deliberately vulnerable PHP web application for practicing real-world cybersecurity…
A deliberately vulnerable PHP web application for practicing real-world cybersecurity attacks like SQL Injection, XSS, CSRF, File Upload RCE, Directory Traversal, Command Injection, and Broken Auth...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Next.js RCE Scanner (CVE-2025-55182) - Automated vulnerability scanner using Zoomeye search engine. Discovers targets via dorks and tests for CVE-2025-55182 with parallel scanning capabilities.
URL:https://github.com/im-ezboy/CVE-2025-55182-zoomeye
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Next.js RCE Scanner (CVE-2025-55182) - Automated vulnerability scanner using Zoomeye search engine. Discovers targets via dorks and tests for CVE-2025-55182 with parallel scanning capabilities.
URL:https://github.com/im-ezboy/CVE-2025-55182-zoomeye
标签:#CVE-2025
GitHub
GitHub - im-ezboy/CVE-2025-55182-zoomeye: 🔍 Next.js RCE Scanner (CVE-2025-55182) - Automated vulnerability scanner using Zoomeye…
🔍 Next.js RCE Scanner (CVE-2025-55182) - Automated vulnerability scanner using Zoomeye search engine. Discovers targets via dorks and tests for CVE-2025-55182 with parallel scanning capabilities. -...
GitHub监控消息提醒!!!
更新了:代码审计
描述:基于 LLM 的智能代码审计平台,致力于为您打造全流程审计无忧的AI代理。旧版试用:
URL:https://github.com/lintsinghua/DeepAudit
标签:#代码审计
更新了:代码审计
描述:基于 LLM 的智能代码审计平台,致力于为您打造全流程审计无忧的AI代理。旧版试用:
URL:https://github.com/lintsinghua/DeepAudit
标签:#代码审计
GitHub
GitHub - lintsinghua/DeepAudit: DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源的代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama…
DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源的代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署 ,一键生成报告。支持中转站。让安全不再昂贵,让审计不再复杂。 - lintsinghua/DeepAudit
GitHub监控消息提醒!!!
更新了:Red Team
描述:Hackteam-Red BBS a International Bulletin Board System for Red Team Community
URL:https://github.com/Hackteam-Red/bbs
标签:#Red Team
更新了:Red Team
描述:Hackteam-Red BBS a International Bulletin Board System for Red Team Community
URL:https://github.com/Hackteam-Red/bbs
标签:#Red Team
GitHub
GitHub - Hackteam-Red/bbs: Hackteam-Red BBS a International Bulletin Board System for Red Team Community
Hackteam-Red BBS a International Bulletin Board System for Red Team Community - Hackteam-Red/bbs
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 and CVE-2025-66478
URL:https://github.com/FurkanKAYAPINAR/React-Next-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 and CVE-2025-66478
URL:https://github.com/FurkanKAYAPINAR/React-Next-Scanner
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-55182 Next.js RCE Exploit Tool
URL:https://github.com/racall/cve-2025-55182-node
标签:#RCE
更新了:RCE
描述:CVE-2025-55182 Next.js RCE Exploit Tool
URL:https://github.com/racall/cve-2025-55182-node
标签:#RCE
GitHub
GitHub - racall/cve-2025-55182-node: CVE-2025-55182 Next.js RCE Exploit Tool
CVE-2025-55182 Next.js RCE Exploit Tool. Contribute to racall/cve-2025-55182-node development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:burp
描述:Self-hosted burpee reminder app with smart nudges
URL:https://github.com/ruinunespt/burpee-reminder-app
标签:#burp
更新了:burp
描述:Self-hosted burpee reminder app with smart nudges
URL:https://github.com/ruinunespt/burpee-reminder-app
标签:#burp
GitHub
GitHub - ruinunespt/burpee-reminder-app: Self-hosted burpee reminder app with smart nudges
Self-hosted burpee reminder app with smart nudges. Contribute to ruinunespt/burpee-reminder-app development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A lightweight Remote Code Execution (RCE) Engine designed for isolation, security, and adaptability.
URL:https://github.com/pahulgogna/pgexec
标签:#RCE
更新了:RCE
描述:A lightweight Remote Code Execution (RCE) Engine designed for isolation, security, and adaptability.
URL:https://github.com/pahulgogna/pgexec
标签:#RCE
GitHub
GitHub - pahulgogna/pgexec: A lightweight Remote Code Execution (RCE) Engine designed for isolation, security, and adaptability.
A lightweight Remote Code Execution (RCE) Engine designed for isolation, security, and adaptability. - pahulgogna/pgexec
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Testing environment for trying CVE-2025-66478
URL:https://github.com/adrianhazgarcia/React4Shell
标签:#CVE-2025
更新了:CVE-2025
描述:Testing environment for trying CVE-2025-66478
URL:https://github.com/adrianhazgarcia/React4Shell
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/hlsitechio/shelllockolm
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/hlsitechio/shelllockolm
标签:#RCE
GitHub
GitHub - hlsitechio/shellockolm: 🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE…
🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE-2025-66478, malware, and supply chain attacks. Elementary security for complex codebases! - hls...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) in web applications
URL:https://github.com/xiaopeng-ye/react2shell-detector
标签:#CVE-2025
更新了:CVE-2025
描述:A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) in web applications
URL:https://github.com/xiaopeng-ye/react2shell-detector
标签:#CVE-2025
GitHub
GitHub - xiaopeng-ye/react2shell-detector: A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025…
A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) in web applications - xiaopeng-ye/react2shell-detector
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/hlsitechio/shellockolm
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/hlsitechio/shellockolm
标签:#RCE
GitHub
GitHub - hlsitechio/shellockolm: 🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE…
🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE-2025-66478, malware, and supply chain attacks. Elementary security for complex codebases! - hls...
GitHub监控消息提醒!!!
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/lza6/typli-2api-cfwork
标签:#绕过
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/lza6/typli-2api-cfwork
标签:#绕过
GitHub
GitHub - lza6/typli-2api-cfwork: 自动 Session 刷新(每次请求生成全新 16 位 Session ID,绕过 Typli 1000 词额度限制)| 指纹伪装(硬编码 Chrome 142 User-Agent/H…
自动 Session 刷新(每次请求生成全新 16 位 Session ID,绕过 Typli 1000 词额度限制)| 指纹伪装(硬编码 Chrome 142 User-Agent/Headers,实现高级匿名与反检测)| 协议转换(将上游 Typli 的自定义 SSE 和图片 API 完美转换为标准 OpenAI v1/chat/completions 流式接口)| 智能路由(统一接口智...
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478
标签:#RCE
GitHub
GitHub - Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478: Scanner for CVE-2025-55182 (React)…
Scanner for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) - Track and remediate a critical React Server Components (RSC) / Flight protocol vulnerability campaign impacting react-server-dom-we...
GitHub监控消息提醒!!!
更新了:RCE
描述:A vulnerable Python Web IDE environment for RCE analysis and SOC monitoring training.
URL:https://github.com/alperen0707x/RCE-Simulation-Lab
标签:#RCE
更新了:RCE
描述:A vulnerable Python Web IDE environment for RCE analysis and SOC monitoring training.
URL:https://github.com/alperen0707x/RCE-Simulation-Lab
标签:#RCE
GitHub
alperen0707x/RCE-Simulation-Lab
A vulnerable Python Web IDE environment for RCE analysis and SOC monitoring training. - alperen0707x/RCE-Simulation-Lab
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/ejpir/CVE-2025-55182-bypass
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/ejpir/CVE-2025-55182-bypass
标签:#RCE
GitHub
GitHub - ejpir/CVE-2025-55182-bypass: Header bypass for CVE-2025-55182 (React Server Components RCE).
Header bypass for CVE-2025-55182 (React Server Components RCE). - GitHub - ejpir/CVE-2025-55182-bypass: Header bypass for CVE-2025-55182 (React Server Components RCE).
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Scanner to detect the presence of CVE-2025-55182 & CVE-2025-66478 on targeted web services.
URL:https://github.com/Shield-Cyber/react2shell-scanner
标签:#CVE-2025
更新了:CVE-2025
描述:Scanner to detect the presence of CVE-2025-55182 & CVE-2025-66478 on targeted web services.
URL:https://github.com/Shield-Cyber/react2shell-scanner
标签:#CVE-2025
GitHub
GitHub - Shield-Cyber/react2shell-scanner: Scanner to detect the presence of CVE-2025-55182 & CVE-2025-66478 on targeted web services.
Scanner to detect the presence of CVE-2025-55182 & CVE-2025-66478 on targeted web services. - Shield-Cyber/react2shell-scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:VulnCheck CVE-2025-55182 react2shell
URL:https://github.com/vulncheck-oss/cve-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:VulnCheck CVE-2025-55182 react2shell
URL:https://github.com/vulncheck-oss/cve-2025-55182
标签:#CVE-2025
GitHub
GitHub - vulncheck-oss/cve-2025-55182: VulnCheck CVE-2025-55182 react2shell
VulnCheck CVE-2025-55182 react2shell. Contribute to vulncheck-oss/cve-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: CVE-2025-55182 React2Shell PoC
URL:https://github.com/lowercasenumbers/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述: CVE-2025-55182 React2Shell PoC
URL:https://github.com/lowercasenumbers/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - lowercasenumbers/CVE-2025-55182: CVE-2025-55182 React2Shell PoC
CVE-2025-55182 React2Shell PoC. Contribute to lowercasenumbers/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/iami317/Defense-Tool
标签:#应急响应
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/iami317/Defense-Tool
标签:#应急响应
GitHub
GitHub - iami317/Defense-Tool: 本项目集成了全网优秀的开源攻防武器项目,包含信息收集工具(自动化利用工具、资产发现工具、目录扫描工具、子域名收集工具、指纹识别工具、端口扫描工具、各种插件....etc...),漏洞利用工具…
本项目集成了全网优秀的开源攻防武器项目,包含信息收集工具(自动化利用工具、资产发现工具、目录扫描工具、子域名收集工具、指纹识别工具、端口扫描工具、各种插件....etc...),漏洞利用工具(各大CMS、OA利用工具、中间件利用工具、反序列化利用工具、数据库利用工具等项目........),内网渗透工具(隧道代理、密码提取、木马免杀、域渗透.....)、应急响应工具、甲方运维工具、等其他安全...