GitHub监控消息提醒!!!
更新了:CVE-2025
描述:[beta] Detection of the React Server Actions Exploit vector – CVE-2025-55182 / CVE-2025-66478
URL:https://github.com/MoisesTapia/http-react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:[beta] Detection of the React Server Actions Exploit vector – CVE-2025-55182 / CVE-2025-66478
URL:https://github.com/MoisesTapia/http-react2shell
标签:#CVE-2025
GitHub
GitHub - MoisesTapia/http-react2shell: Detection of the React Server Actions Exploit vector – CVE-2025-55182 / CVE-2025-66478
Detection of the React Server Actions Exploit vector – CVE-2025-55182 / CVE-2025-66478 - MoisesTapia/http-react2shell
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/from-rookie/P2P_File_Transmission_Tool
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/from-rookie/P2P_File_Transmission_Tool
标签:#护网
GitHub
GitHub - from-rookie/P2P_File_Transmission_Tool: 这是一个基于P2P架构的文件传输系统,支持用户登录、好友管理和点对点文件传输。该系统使用Java开发,具有直观的图形用户界面,能够安全高效地传输各种大小的…
这是一个基于P2P架构的文件传输系统,支持用户登录、好友管理和点对点文件传输。该系统使用Java开发,具有直观的图形用户界面,能够安全高效地传输各种大小的文件。与其他传统局域网文件传输工具不同,本系统创新性地集成了Tailscale虚拟网络技术,突破了传统局域网的地理限制,使用户能够在任何网络环境下实现设备间的直连传输。无论是跨城市的办公协作,还是移动设备与家庭电脑之间的文件共享,都能轻松实...
GitHub监控消息提醒!!!
更新了:红队
描述:通过txcloud API批量化创建cvm实例,在红队中快速实例化需要的vps,并解决ip封禁问题
URL:https://github.com/shinianyunyan/txCloudCVMCract
标签:#红队
更新了:红队
描述:通过txcloud API批量化创建cvm实例,在红队中快速实例化需要的vps,并解决ip封禁问题
URL:https://github.com/shinianyunyan/txCloudCVMCract
标签:#红队
GitHub
GitHub - shinianyunyan/txCloudCVMCract: 通过txcloud API批量化创建cvm实例,在红队中快速实例化需要的vps,并解决ip封禁问题
通过txcloud API批量化创建cvm实例,在红队中快速实例化需要的vps,并解决ip封禁问题. Contribute to shinianyunyan/txCloudCVMCract development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Test case for CVE-2025-66478
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces
标签:#CVE-2025
更新了:CVE-2025
描述:Test case for CVE-2025-66478
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces
标签:#CVE-2025
GitHub
GitHub - react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces: Test case for CVE-2025-66478
Test case for CVE-2025-66478. Contribute to react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC-CVE-2025-55182
URL:https://github.com/DevVaibhav07/POC-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:POC-CVE-2025-55182
URL:https://github.com/DevVaibhav07/POC-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - DevVaibhav07/POC-CVE-2025-55182: POC-CVE-2025-55182
POC-CVE-2025-55182. Contribute to DevVaibhav07/POC-CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC-CVE-2025-55182
URL:https://github.com/liamromanis101/cve-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:POC-CVE-2025-55182
URL:https://github.com/liamromanis101/cve-2025-55182
标签:#CVE-2025
GitHub
GitHub - liamromanis101/cve-2025-55182: Python3 script that can be used to demonstrate **CVE-2025-55182**. It exploits a server…
Python3 script that can be used to demonstrate **CVE-2025-55182**. It exploits a server-side JavaScript injection vulnerability in Next.js/React applications, allowing **remote code execution** via...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65964-poc
URL:https://github.com/Anthony558238/CVE-2025-65964-poc
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65964-poc
URL:https://github.com/Anthony558238/CVE-2025-65964-poc
标签:#CVE-2025
GitHub
GitHub - Anthony558238/CVE-2025-65964-poc: CVE-2025-65964-poc
CVE-2025-65964-poc. Contribute to Anthony558238/CVE-2025-65964-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述: Proof of concept exploit for CVE-2025-9074 - Unauthenticated Docker Engine API container escape affecting Docker Desktop < 4.44.3 on Windows and macOS (CVSS 9.3)
URL:https://github.com/PtechAmanja/CVE-2025-9074-Docker-Desktop-Container-Escape
标签:#CVE-2025
更新了:CVE-2025
描述: Proof of concept exploit for CVE-2025-9074 - Unauthenticated Docker Engine API container escape affecting Docker Desktop < 4.44.3 on Windows and macOS (CVSS 9.3)
URL:https://github.com/PtechAmanja/CVE-2025-9074-Docker-Desktop-Container-Escape
标签:#CVE-2025
GitHub
GitHub - PtechAmanja/CVE-2025-9074-Docker-Desktop-Container-Escape: Proof of concept exploit for CVE-2025-9074 - Unauthenticated…
Proof of concept exploit for CVE-2025-9074 - Unauthenticated Docker Engine API container escape affecting Docker Desktop < 4.44.3 on Windows and macOS (CVSS 9.3) - PtechAmanja/CVE-2025-9074...
GitHub监控消息提醒!!!
更新了:Red Team
描述:RAIDER is an autonomous AI Red Teaming system that combines Reinforcement Learning (RL) for strategic decision-making with Large Language Models (LLM) for tactical execution.
URL:https://github.com/ayushgayakwad/RAIDER
标签:#Red Team
更新了:Red Team
描述:RAIDER is an autonomous AI Red Teaming system that combines Reinforcement Learning (RL) for strategic decision-making with Large Language Models (LLM) for tactical execution.
URL:https://github.com/ayushgayakwad/RAIDER
标签:#Red Team
GitHub
GitHub - ayushgayakwad/RAIDER: RAIDER is an autonomous AI Red Teaming system that combines Reinforcement Learning (RL) for strategic…
RAIDER is an autonomous AI Red Teaming system that combines Reinforcement Learning (RL) for strategic decision-making with Large Language Models (LLM) for tactical execution. - ayushgayakwad/RAIDER
GitHub监控消息提醒!!!
更新了:内存马
描述:🚧项目处于早期验证阶段,为什么网上的python内存马都没有代理功能,何意味?
URL:https://github.com/BaiMeow/pymemshell2proxy
标签:#内存马
更新了:内存马
描述:🚧项目处于早期验证阶段,为什么网上的python内存马都没有代理功能,何意味?
URL:https://github.com/BaiMeow/pymemshell2proxy
标签:#内存马
GitHub
BaiMeow/pymemshell2proxy
🚧项目处于早期验证阶段,为什么网上的python内存马都没有代理功能,何意味?. Contribute to BaiMeow/pymemshell2proxy development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-66644
URL:https://github.com/Ashwesker/Blackash-CVE-2025-66644
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-66644
URL:https://github.com/Ashwesker/Blackash-CVE-2025-66644
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-66644: CVE-2025-66644
CVE-2025-66644. Contribute to Ashwesker/Blackash-CVE-2025-66644 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for React2Shell (CVE-2025-55182)
URL:https://github.com/kondukto-io/vulnerable-next-js-poc
标签:#CVE-2025
更新了:CVE-2025
描述:POC for React2Shell (CVE-2025-55182)
URL:https://github.com/kondukto-io/vulnerable-next-js-poc
标签:#CVE-2025
GitHub
GitHub - kondukto-io/vulnerable-next-js-poc: POC for React2Shell (CVE-2025-55182)
POC for React2Shell (CVE-2025-55182). Contribute to kondukto-io/vulnerable-next-js-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Test case for CVE-2025-66478
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn
标签:#CVE-2025
更新了:CVE-2025
描述:Test case for CVE-2025-66478
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn
标签:#CVE-2025
GitHub
GitHub - react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn: Test case for CVE-2025-66478
Test case for CVE-2025-66478. Contribute to react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Test case for CVE-2025-55182
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-turbopack
标签:#CVE-2025
更新了:CVE-2025
描述:Test case for CVE-2025-55182
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-turbopack
标签:#CVE-2025
GitHub
GitHub - react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-turbopack: Test case for CVE-2025-55182
Test case for CVE-2025-55182. Contribute to react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-turbopack development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Documenting my cybersecurity learning journey | Infantry Officer | Pentesting & Red Team
URL:https://github.com/Rob-Foxtrot/TryHackMe-Writeups
标签:#Red Team
更新了:Red Team
描述:Documenting my cybersecurity learning journey | Infantry Officer | Pentesting & Red Team
URL:https://github.com/Rob-Foxtrot/TryHackMe-Writeups
标签:#Red Team
GitHub
GitHub - Rob-Foxtrot/TryHackMe-Writeups: Documenting my cybersecurity learning journey | Infantry Officer | Pentesting & Red Team
Documenting my cybersecurity learning journey | Infantry Officer | Pentesting & Red Team - Rob-Foxtrot/TryHackMe-Writeups
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC).
URL:https://github.com/shyambhanushali/React2Shell---CVE-2025-55182-CVE-2025-66478
标签:#CVE-2025
更新了:CVE-2025
描述:React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC).
URL:https://github.com/shyambhanushali/React2Shell---CVE-2025-55182-CVE-2025-66478
标签:#CVE-2025
GitHub
GitHub - shyambhanushali/React2Shell: React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and…
React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC). - shyambhanushali...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC, Hunting React2Shell about CVE-2025-55182
URL:https://github.com/Jaycelation/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:PoC, Hunting React2Shell about CVE-2025-55182
URL:https://github.com/Jaycelation/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Jaycelation/CVE-2025-55182: PoC, Hunting React2Shell about CVE-2025-55182
PoC, Hunting React2Shell about CVE-2025-55182. Contribute to Jaycelation/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC).
URL:https://github.com/shyambhanushali/React2Shell
标签:#CVE-2025
更新了:CVE-2025
描述:React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC).
URL:https://github.com/shyambhanushali/React2Shell
标签:#CVE-2025
GitHub
GitHub - shyambhanushali/React2Shell: React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and…
React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC). - shyambhanushali...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182-advanced-scanner
URL:https://github.com/Ankitspandey07/React2Shell
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182-advanced-scanner
URL:https://github.com/Ankitspandey07/React2Shell
标签:#CVE-2025
GitHub
GitHub - Ankitspandey07/React2Shell: CVE-2025-55182-advanced-scanner
CVE-2025-55182-advanced-scanner. Contribute to Ankitspandey07/React2Shell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/VeilVulp/rscscan
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/VeilVulp/rscscan
标签:#CVE-2025
GitHub
VeilVulp/rscscan
RscScan: Professional cross-platform vulnerability scanner for Next.js Server Actions (CVE-2025-55182). Detects critical RCE flaws with multi-threaded scanning, real-time analytics, and multi-langu...