GitHub监控消息提醒!!!
更新了:RCE
描述:A vulnerable Python Web IDE environment for RCE analysis and SOC monitoring training.
URL:https://github.com/alperen0707x/RCE-Simulation-Lab
标签:#RCE
更新了:RCE
描述:A vulnerable Python Web IDE environment for RCE analysis and SOC monitoring training.
URL:https://github.com/alperen0707x/RCE-Simulation-Lab
标签:#RCE
GitHub
alperen0707x/RCE-Simulation-Lab
A vulnerable Python Web IDE environment for RCE analysis and SOC monitoring training. - alperen0707x/RCE-Simulation-Lab
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/ejpir/CVE-2025-55182-bypass
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/ejpir/CVE-2025-55182-bypass
标签:#RCE
GitHub
GitHub - ejpir/CVE-2025-55182-bypass: Header bypass for CVE-2025-55182 (React Server Components RCE).
Header bypass for CVE-2025-55182 (React Server Components RCE). - GitHub - ejpir/CVE-2025-55182-bypass: Header bypass for CVE-2025-55182 (React Server Components RCE).
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Scanner to detect the presence of CVE-2025-55182 & CVE-2025-66478 on targeted web services.
URL:https://github.com/Shield-Cyber/react2shell-scanner
标签:#CVE-2025
更新了:CVE-2025
描述:Scanner to detect the presence of CVE-2025-55182 & CVE-2025-66478 on targeted web services.
URL:https://github.com/Shield-Cyber/react2shell-scanner
标签:#CVE-2025
GitHub
GitHub - Shield-Cyber/react2shell-scanner: Scanner to detect the presence of CVE-2025-55182 & CVE-2025-66478 on targeted web services.
Scanner to detect the presence of CVE-2025-55182 & CVE-2025-66478 on targeted web services. - Shield-Cyber/react2shell-scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:VulnCheck CVE-2025-55182 react2shell
URL:https://github.com/vulncheck-oss/cve-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:VulnCheck CVE-2025-55182 react2shell
URL:https://github.com/vulncheck-oss/cve-2025-55182
标签:#CVE-2025
GitHub
GitHub - vulncheck-oss/cve-2025-55182: VulnCheck CVE-2025-55182 react2shell
VulnCheck CVE-2025-55182 react2shell. Contribute to vulncheck-oss/cve-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: CVE-2025-55182 React2Shell PoC
URL:https://github.com/lowercasenumbers/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述: CVE-2025-55182 React2Shell PoC
URL:https://github.com/lowercasenumbers/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - lowercasenumbers/CVE-2025-55182: CVE-2025-55182 React2Shell PoC
CVE-2025-55182 React2Shell PoC. Contribute to lowercasenumbers/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/iami317/Defense-Tool
标签:#应急响应
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/iami317/Defense-Tool
标签:#应急响应
GitHub
GitHub - iami317/Defense-Tool: 本项目集成了全网优秀的开源攻防武器项目,包含信息收集工具(自动化利用工具、资产发现工具、目录扫描工具、子域名收集工具、指纹识别工具、端口扫描工具、各种插件....etc...),漏洞利用工具…
本项目集成了全网优秀的开源攻防武器项目,包含信息收集工具(自动化利用工具、资产发现工具、目录扫描工具、子域名收集工具、指纹识别工具、端口扫描工具、各种插件....etc...),漏洞利用工具(各大CMS、OA利用工具、中间件利用工具、反序列化利用工具、数据库利用工具等项目........),内网渗透工具(隧道代理、密码提取、木马免杀、域渗透.....)、应急响应工具、甲方运维工具、等其他安全...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 检测方式和攻击利用
URL:https://github.com/sun977/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 检测方式和攻击利用
URL:https://github.com/sun977/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - sun977/CVE-2025-55182: CVE-2025-55182 检测方式和攻击利用
CVE-2025-55182 检测方式和攻击利用. Contribute to sun977/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detect CVE-2025-55182 & CVE-2025-66478 in Next.js/RSC applications (Rust)
URL:https://github.com/ancs21/react2shell-scanner-rust
标签:#CVE-2025
更新了:CVE-2025
描述:Detect CVE-2025-55182 & CVE-2025-66478 in Next.js/RSC applications (Rust)
URL:https://github.com/ancs21/react2shell-scanner-rust
标签:#CVE-2025
GitHub
GitHub - ancs21/react2shell-scanner-rust: Detect CVE-2025-55182 & CVE-2025-66478 in Next.js/RSC applications (Rust)
Detect CVE-2025-55182 & CVE-2025-66478 in Next.js/RSC applications (Rust) - ancs21/react2shell-scanner-rust
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC-react2shell-CVE-2025-55182
URL:https://github.com/garux-sec/PoC-react2shell-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:PoC-react2shell-CVE-2025-55182
URL:https://github.com/garux-sec/PoC-react2shell-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - garux-sec/PoC-react2shell-CVE-2025-55182: PoC-react2shell-CVE-2025-55182
PoC-react2shell-CVE-2025-55182. Contribute to garux-sec/PoC-react2shell-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Test case for CVE-2025-66478
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm
标签:#CVE-2025
更新了:CVE-2025
描述:Test case for CVE-2025-66478
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm
标签:#CVE-2025
GitHub
GitHub - react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm: Test case for CVE-2025-66478
Test case for CVE-2025-66478. Contribute to react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:[beta] Detection of the React Server Actions Exploit vector – CVE-2025-55182 / CVE-2025-66478
URL:https://github.com/MoisesTapia/http-react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:[beta] Detection of the React Server Actions Exploit vector – CVE-2025-55182 / CVE-2025-66478
URL:https://github.com/MoisesTapia/http-react2shell
标签:#CVE-2025
GitHub
GitHub - MoisesTapia/http-react2shell: Detection of the React Server Actions Exploit vector – CVE-2025-55182 / CVE-2025-66478
Detection of the React Server Actions Exploit vector – CVE-2025-55182 / CVE-2025-66478 - MoisesTapia/http-react2shell
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/from-rookie/P2P_File_Transmission_Tool
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/from-rookie/P2P_File_Transmission_Tool
标签:#护网
GitHub
GitHub - from-rookie/P2P_File_Transmission_Tool: 这是一个基于P2P架构的文件传输系统,支持用户登录、好友管理和点对点文件传输。该系统使用Java开发,具有直观的图形用户界面,能够安全高效地传输各种大小的…
这是一个基于P2P架构的文件传输系统,支持用户登录、好友管理和点对点文件传输。该系统使用Java开发,具有直观的图形用户界面,能够安全高效地传输各种大小的文件。与其他传统局域网文件传输工具不同,本系统创新性地集成了Tailscale虚拟网络技术,突破了传统局域网的地理限制,使用户能够在任何网络环境下实现设备间的直连传输。无论是跨城市的办公协作,还是移动设备与家庭电脑之间的文件共享,都能轻松实...
GitHub监控消息提醒!!!
更新了:红队
描述:通过txcloud API批量化创建cvm实例,在红队中快速实例化需要的vps,并解决ip封禁问题
URL:https://github.com/shinianyunyan/txCloudCVMCract
标签:#红队
更新了:红队
描述:通过txcloud API批量化创建cvm实例,在红队中快速实例化需要的vps,并解决ip封禁问题
URL:https://github.com/shinianyunyan/txCloudCVMCract
标签:#红队
GitHub
GitHub - shinianyunyan/txCloudCVMCract: 通过txcloud API批量化创建cvm实例,在红队中快速实例化需要的vps,并解决ip封禁问题
通过txcloud API批量化创建cvm实例,在红队中快速实例化需要的vps,并解决ip封禁问题. Contribute to shinianyunyan/txCloudCVMCract development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Test case for CVE-2025-66478
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces
标签:#CVE-2025
更新了:CVE-2025
描述:Test case for CVE-2025-66478
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces
标签:#CVE-2025
GitHub
GitHub - react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces: Test case for CVE-2025-66478
Test case for CVE-2025-66478. Contribute to react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC-CVE-2025-55182
URL:https://github.com/DevVaibhav07/POC-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:POC-CVE-2025-55182
URL:https://github.com/DevVaibhav07/POC-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - DevVaibhav07/POC-CVE-2025-55182: POC-CVE-2025-55182
POC-CVE-2025-55182. Contribute to DevVaibhav07/POC-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC-CVE-2025-55182
URL:https://github.com/liamromanis101/cve-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:POC-CVE-2025-55182
URL:https://github.com/liamromanis101/cve-2025-55182
标签:#CVE-2025
GitHub
GitHub - liamromanis101/cve-2025-55182: Python3 script that can be used to demonstrate **CVE-2025-55182**. It exploits a server…
Python3 script that can be used to demonstrate **CVE-2025-55182**. It exploits a server-side JavaScript injection vulnerability in Next.js/React applications, allowing **remote code execution** via...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65964-poc
URL:https://github.com/Anthony558238/CVE-2025-65964-poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65964-poc
URL:https://github.com/Anthony558238/CVE-2025-65964-poc
标签:#CVE-2025
GitHub
GitHub - Anthony558238/CVE-2025-65964-poc: CVE-2025-65964-poc
CVE-2025-65964-poc. Contribute to Anthony558238/CVE-2025-65964-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: Proof of concept exploit for CVE-2025-9074 - Unauthenticated Docker Engine API container escape affecting Docker Desktop < 4.44.3 on Windows and macOS (CVSS 9.3)
URL:https://github.com/PtechAmanja/CVE-2025-9074-Docker-Desktop-Container-Escape
标签:#CVE-2025
更新了:CVE-2025
描述: Proof of concept exploit for CVE-2025-9074 - Unauthenticated Docker Engine API container escape affecting Docker Desktop < 4.44.3 on Windows and macOS (CVSS 9.3)
URL:https://github.com/PtechAmanja/CVE-2025-9074-Docker-Desktop-Container-Escape
标签:#CVE-2025
GitHub
GitHub - PtechAmanja/CVE-2025-9074-Docker-Desktop-Container-Escape: Proof of concept exploit for CVE-2025-9074 - Unauthenticated…
Proof of concept exploit for CVE-2025-9074 - Unauthenticated Docker Engine API container escape affecting Docker Desktop < 4.44.3 on Windows and macOS (CVSS 9.3) - PtechAmanja/CVE-2025-9074...
GitHub监控消息提醒!!!
更新了:Red Team
描述:RAIDER is an autonomous AI Red Teaming system that combines Reinforcement Learning (RL) for strategic decision-making with Large Language Models (LLM) for tactical execution.
URL:https://github.com/ayushgayakwad/RAIDER
标签:#Red Team
更新了:Red Team
描述:RAIDER is an autonomous AI Red Teaming system that combines Reinforcement Learning (RL) for strategic decision-making with Large Language Models (LLM) for tactical execution.
URL:https://github.com/ayushgayakwad/RAIDER
标签:#Red Team
GitHub
GitHub - ayushgayakwad/RAIDER: RAIDER is an autonomous AI Red Teaming system that combines Reinforcement Learning (RL) for strategic…
RAIDER is an autonomous AI Red Teaming system that combines Reinforcement Learning (RL) for strategic decision-making with Large Language Models (LLM) for tactical execution. - ayushgayakwad/RAIDER