GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/hlsitechio/shelllockolm
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/hlsitechio/shelllockolm
标签:#RCE
GitHub
GitHub - hlsitechio/shellockolm: 🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE…
🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE-2025-66478, malware, and supply chain attacks. Elementary security for complex codebases! - hls...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) in web applications
URL:https://github.com/xiaopeng-ye/react2shell-detector
标签:#CVE-2025
更新了:CVE-2025
描述:A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) in web applications
URL:https://github.com/xiaopeng-ye/react2shell-detector
标签:#CVE-2025
GitHub
GitHub - xiaopeng-ye/react2shell-detector: A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025…
A Chrome extension for detecting React2Shell vulnerabilities (CVE-2025-55182 & CVE-2025-66478) in web applications - xiaopeng-ye/react2shell-detector
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/hlsitechio/shellockolm
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/hlsitechio/shellockolm
标签:#RCE
GitHub
GitHub - hlsitechio/shellockolm: 🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE…
🔍 Shellockolm - Your Security Detective for React, Next.js & npm. Detects CVE-2025-55182, CVE-2025-66478, malware, and supply chain attacks. Elementary security for complex codebases! - hls...
GitHub监控消息提醒!!!
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/lza6/typli-2api-cfwork
标签:#绕过
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/lza6/typli-2api-cfwork
标签:#绕过
GitHub
GitHub - lza6/typli-2api-cfwork: 自动 Session 刷新(每次请求生成全新 16 位 Session ID,绕过 Typli 1000 词额度限制)| 指纹伪装(硬编码 Chrome 142 User-Agent/H…
自动 Session 刷新(每次请求生成全新 16 位 Session ID,绕过 Typli 1000 词额度限制)| 指纹伪装(硬编码 Chrome 142 User-Agent/Headers,实现高级匿名与反检测)| 协议转换(将上游 Typli 的自定义 SSE 和图片 API 完美转换为标准 OpenAI v1/chat/completions 流式接口)| 智能路由(统一接口智...
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478
标签:#RCE
GitHub
GitHub - Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478: Scanner for CVE-2025-55182 (React)…
Scanner for CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) - Track and remediate a critical React Server Components (RSC) / Flight protocol vulnerability campaign impacting react-server-dom-we...
GitHub监控消息提醒!!!
更新了:RCE
描述:A vulnerable Python Web IDE environment for RCE analysis and SOC monitoring training.
URL:https://github.com/alperen0707x/RCE-Simulation-Lab
标签:#RCE
更新了:RCE
描述:A vulnerable Python Web IDE environment for RCE analysis and SOC monitoring training.
URL:https://github.com/alperen0707x/RCE-Simulation-Lab
标签:#RCE
GitHub
alperen0707x/RCE-Simulation-Lab
A vulnerable Python Web IDE environment for RCE analysis and SOC monitoring training. - alperen0707x/RCE-Simulation-Lab
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/ejpir/CVE-2025-55182-bypass
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/ejpir/CVE-2025-55182-bypass
标签:#RCE
GitHub
GitHub - ejpir/CVE-2025-55182-bypass: Header bypass for CVE-2025-55182 (React Server Components RCE).
Header bypass for CVE-2025-55182 (React Server Components RCE). - GitHub - ejpir/CVE-2025-55182-bypass: Header bypass for CVE-2025-55182 (React Server Components RCE).
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Scanner to detect the presence of CVE-2025-55182 & CVE-2025-66478 on targeted web services.
URL:https://github.com/Shield-Cyber/react2shell-scanner
标签:#CVE-2025
更新了:CVE-2025
描述:Scanner to detect the presence of CVE-2025-55182 & CVE-2025-66478 on targeted web services.
URL:https://github.com/Shield-Cyber/react2shell-scanner
标签:#CVE-2025
GitHub
GitHub - Shield-Cyber/react2shell-scanner: Scanner to detect the presence of CVE-2025-55182 & CVE-2025-66478 on targeted web services.
Scanner to detect the presence of CVE-2025-55182 & CVE-2025-66478 on targeted web services. - Shield-Cyber/react2shell-scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:VulnCheck CVE-2025-55182 react2shell
URL:https://github.com/vulncheck-oss/cve-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:VulnCheck CVE-2025-55182 react2shell
URL:https://github.com/vulncheck-oss/cve-2025-55182
标签:#CVE-2025
GitHub
GitHub - vulncheck-oss/cve-2025-55182: VulnCheck CVE-2025-55182 react2shell
VulnCheck CVE-2025-55182 react2shell. Contribute to vulncheck-oss/cve-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: CVE-2025-55182 React2Shell PoC
URL:https://github.com/lowercasenumbers/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述: CVE-2025-55182 React2Shell PoC
URL:https://github.com/lowercasenumbers/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - lowercasenumbers/CVE-2025-55182: CVE-2025-55182 React2Shell PoC
CVE-2025-55182 React2Shell PoC. Contribute to lowercasenumbers/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/iami317/Defense-Tool
标签:#应急响应
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/iami317/Defense-Tool
标签:#应急响应
GitHub
GitHub - iami317/Defense-Tool: 本项目集成了全网优秀的开源攻防武器项目,包含信息收集工具(自动化利用工具、资产发现工具、目录扫描工具、子域名收集工具、指纹识别工具、端口扫描工具、各种插件....etc...),漏洞利用工具…
本项目集成了全网优秀的开源攻防武器项目,包含信息收集工具(自动化利用工具、资产发现工具、目录扫描工具、子域名收集工具、指纹识别工具、端口扫描工具、各种插件....etc...),漏洞利用工具(各大CMS、OA利用工具、中间件利用工具、反序列化利用工具、数据库利用工具等项目........),内网渗透工具(隧道代理、密码提取、木马免杀、域渗透.....)、应急响应工具、甲方运维工具、等其他安全...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 检测方式和攻击利用
URL:https://github.com/sun977/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 检测方式和攻击利用
URL:https://github.com/sun977/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - sun977/CVE-2025-55182: CVE-2025-55182 检测方式和攻击利用
CVE-2025-55182 检测方式和攻击利用. Contribute to sun977/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detect CVE-2025-55182 & CVE-2025-66478 in Next.js/RSC applications (Rust)
URL:https://github.com/ancs21/react2shell-scanner-rust
标签:#CVE-2025
更新了:CVE-2025
描述:Detect CVE-2025-55182 & CVE-2025-66478 in Next.js/RSC applications (Rust)
URL:https://github.com/ancs21/react2shell-scanner-rust
标签:#CVE-2025
GitHub
GitHub - ancs21/react2shell-scanner-rust: Detect CVE-2025-55182 & CVE-2025-66478 in Next.js/RSC applications (Rust)
Detect CVE-2025-55182 & CVE-2025-66478 in Next.js/RSC applications (Rust) - ancs21/react2shell-scanner-rust
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC-react2shell-CVE-2025-55182
URL:https://github.com/garux-sec/PoC-react2shell-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:PoC-react2shell-CVE-2025-55182
URL:https://github.com/garux-sec/PoC-react2shell-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - garux-sec/PoC-react2shell-CVE-2025-55182: PoC-react2shell-CVE-2025-55182
PoC-react2shell-CVE-2025-55182. Contribute to garux-sec/PoC-react2shell-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Test case for CVE-2025-66478
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm
标签:#CVE-2025
更新了:CVE-2025
描述:Test case for CVE-2025-66478
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm
标签:#CVE-2025
GitHub
GitHub - react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm: Test case for CVE-2025-66478
Test case for CVE-2025-66478. Contribute to react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:[beta] Detection of the React Server Actions Exploit vector – CVE-2025-55182 / CVE-2025-66478
URL:https://github.com/MoisesTapia/http-react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:[beta] Detection of the React Server Actions Exploit vector – CVE-2025-55182 / CVE-2025-66478
URL:https://github.com/MoisesTapia/http-react2shell
标签:#CVE-2025
GitHub
GitHub - MoisesTapia/http-react2shell: Detection of the React Server Actions Exploit vector – CVE-2025-55182 / CVE-2025-66478
Detection of the React Server Actions Exploit vector – CVE-2025-55182 / CVE-2025-66478 - MoisesTapia/http-react2shell
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/from-rookie/P2P_File_Transmission_Tool
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/from-rookie/P2P_File_Transmission_Tool
标签:#护网
GitHub
GitHub - from-rookie/P2P_File_Transmission_Tool: 这是一个基于P2P架构的文件传输系统,支持用户登录、好友管理和点对点文件传输。该系统使用Java开发,具有直观的图形用户界面,能够安全高效地传输各种大小的…
这是一个基于P2P架构的文件传输系统,支持用户登录、好友管理和点对点文件传输。该系统使用Java开发,具有直观的图形用户界面,能够安全高效地传输各种大小的文件。与其他传统局域网文件传输工具不同,本系统创新性地集成了Tailscale虚拟网络技术,突破了传统局域网的地理限制,使用户能够在任何网络环境下实现设备间的直连传输。无论是跨城市的办公协作,还是移动设备与家庭电脑之间的文件共享,都能轻松实...
GitHub监控消息提醒!!!
更新了:红队
描述:通过txcloud API批量化创建cvm实例,在红队中快速实例化需要的vps,并解决ip封禁问题
URL:https://github.com/shinianyunyan/txCloudCVMCract
标签:#红队
更新了:红队
描述:通过txcloud API批量化创建cvm实例,在红队中快速实例化需要的vps,并解决ip封禁问题
URL:https://github.com/shinianyunyan/txCloudCVMCract
标签:#红队
GitHub
GitHub - shinianyunyan/txCloudCVMCract: 通过txcloud API批量化创建cvm实例,在红队中快速实例化需要的vps,并解决ip封禁问题
通过txcloud API批量化创建cvm实例,在红队中快速实例化需要的vps,并解决ip封禁问题. Contribute to shinianyunyan/txCloudCVMCract development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Test case for CVE-2025-66478
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces
标签:#CVE-2025
更新了:CVE-2025
描述:Test case for CVE-2025-66478
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces
标签:#CVE-2025
GitHub
GitHub - react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces: Test case for CVE-2025-66478
Test case for CVE-2025-66478. Contribute to react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces development by creating an account on GitHub.