GitHub监控消息提醒!!!
更新了:CVE-2025
描述: Proof of concept exploit for CVE-2025-9074 - Unauthenticated Docker Engine API container escape affecting Docker Desktop < 4.44.3 on Windows and macOS (CVSS 9.3)
URL:https://github.com/PtechAmanja/CVE-2025-9074-Docker-Desktop-Container-Escape
标签:#CVE-2025
更新了:CVE-2025
描述: Proof of concept exploit for CVE-2025-9074 - Unauthenticated Docker Engine API container escape affecting Docker Desktop < 4.44.3 on Windows and macOS (CVSS 9.3)
URL:https://github.com/PtechAmanja/CVE-2025-9074-Docker-Desktop-Container-Escape
标签:#CVE-2025
GitHub
GitHub - PtechAmanja/CVE-2025-9074-Docker-Desktop-Container-Escape: Proof of concept exploit for CVE-2025-9074 - Unauthenticated…
Proof of concept exploit for CVE-2025-9074 - Unauthenticated Docker Engine API container escape affecting Docker Desktop < 4.44.3 on Windows and macOS (CVSS 9.3) - PtechAmanja/CVE-2025-9074...
GitHub监控消息提醒!!!
更新了:Red Team
描述:RAIDER is an autonomous AI Red Teaming system that combines Reinforcement Learning (RL) for strategic decision-making with Large Language Models (LLM) for tactical execution.
URL:https://github.com/ayushgayakwad/RAIDER
标签:#Red Team
更新了:Red Team
描述:RAIDER is an autonomous AI Red Teaming system that combines Reinforcement Learning (RL) for strategic decision-making with Large Language Models (LLM) for tactical execution.
URL:https://github.com/ayushgayakwad/RAIDER
标签:#Red Team
GitHub
GitHub - ayushgayakwad/RAIDER: RAIDER is an autonomous AI Red Teaming system that combines Reinforcement Learning (RL) for strategic…
RAIDER is an autonomous AI Red Teaming system that combines Reinforcement Learning (RL) for strategic decision-making with Large Language Models (LLM) for tactical execution. - ayushgayakwad/RAIDER
GitHub监控消息提醒!!!
更新了:内存马
描述:🚧项目处于早期验证阶段,为什么网上的python内存马都没有代理功能,何意味?
URL:https://github.com/BaiMeow/pymemshell2proxy
标签:#内存马
更新了:内存马
描述:🚧项目处于早期验证阶段,为什么网上的python内存马都没有代理功能,何意味?
URL:https://github.com/BaiMeow/pymemshell2proxy
标签:#内存马
GitHub
BaiMeow/pymemshell2proxy
🚧项目处于早期验证阶段,为什么网上的python内存马都没有代理功能,何意味?. Contribute to BaiMeow/pymemshell2proxy development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-66644
URL:https://github.com/Ashwesker/Blackash-CVE-2025-66644
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-66644
URL:https://github.com/Ashwesker/Blackash-CVE-2025-66644
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-66644: CVE-2025-66644
CVE-2025-66644. Contribute to Ashwesker/Blackash-CVE-2025-66644 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for React2Shell (CVE-2025-55182)
URL:https://github.com/kondukto-io/vulnerable-next-js-poc
标签:#CVE-2025
更新了:CVE-2025
描述:POC for React2Shell (CVE-2025-55182)
URL:https://github.com/kondukto-io/vulnerable-next-js-poc
标签:#CVE-2025
GitHub
GitHub - kondukto-io/vulnerable-next-js-poc: POC for React2Shell (CVE-2025-55182)
POC for React2Shell (CVE-2025-55182). Contribute to kondukto-io/vulnerable-next-js-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Test case for CVE-2025-66478
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn
标签:#CVE-2025
更新了:CVE-2025
描述:Test case for CVE-2025-66478
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn
标签:#CVE-2025
GitHub
GitHub - react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn: Test case for CVE-2025-66478
Test case for CVE-2025-66478. Contribute to react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Test case for CVE-2025-55182
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-turbopack
标签:#CVE-2025
更新了:CVE-2025
描述:Test case for CVE-2025-55182
URL:https://github.com/react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-turbopack
标签:#CVE-2025
GitHub
GitHub - react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-turbopack: Test case for CVE-2025-55182
Test case for CVE-2025-55182. Contribute to react2shell-repo-menagerie/CVE-2025-55182-single-nextjs-npm-rsc-turbopack development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Documenting my cybersecurity learning journey | Infantry Officer | Pentesting & Red Team
URL:https://github.com/Rob-Foxtrot/TryHackMe-Writeups
标签:#Red Team
更新了:Red Team
描述:Documenting my cybersecurity learning journey | Infantry Officer | Pentesting & Red Team
URL:https://github.com/Rob-Foxtrot/TryHackMe-Writeups
标签:#Red Team
GitHub
GitHub - Rob-Foxtrot/TryHackMe-Writeups: Documenting my cybersecurity learning journey | Infantry Officer | Pentesting & Red Team
Documenting my cybersecurity learning journey | Infantry Officer | Pentesting & Red Team - Rob-Foxtrot/TryHackMe-Writeups
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC).
URL:https://github.com/shyambhanushali/React2Shell---CVE-2025-55182-CVE-2025-66478
标签:#CVE-2025
更新了:CVE-2025
描述:React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC).
URL:https://github.com/shyambhanushali/React2Shell---CVE-2025-55182-CVE-2025-66478
标签:#CVE-2025
GitHub
GitHub - shyambhanushali/React2Shell: React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and…
React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC). - shyambhanushali...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC, Hunting React2Shell about CVE-2025-55182
URL:https://github.com/Jaycelation/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:PoC, Hunting React2Shell about CVE-2025-55182
URL:https://github.com/Jaycelation/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Jaycelation/CVE-2025-55182: PoC, Hunting React2Shell about CVE-2025-55182
PoC, Hunting React2Shell about CVE-2025-55182. Contribute to Jaycelation/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC).
URL:https://github.com/shyambhanushali/React2Shell
标签:#CVE-2025
更新了:CVE-2025
描述:React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC).
URL:https://github.com/shyambhanushali/React2Shell
标签:#CVE-2025
GitHub
GitHub - shyambhanushali/React2Shell: React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and…
React2Shell is a Python-based proof-of-concept tool designed to exploit CVE-2025-55182 and CVE-2025-66478, both impacting Next.js applications using React Server Components (RSC). - shyambhanushali...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182-advanced-scanner
URL:https://github.com/Ankitspandey07/React2Shell
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182-advanced-scanner
URL:https://github.com/Ankitspandey07/React2Shell
标签:#CVE-2025
GitHub
GitHub - Ankitspandey07/React2Shell: CVE-2025-55182-advanced-scanner
CVE-2025-55182-advanced-scanner. Contribute to Ankitspandey07/React2Shell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/VeilVulp/rscscan
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/VeilVulp/rscscan
标签:#CVE-2025
GitHub
VeilVulp/rscscan
RscScan: Professional cross-platform vulnerability scanner for Next.js Server Actions (CVE-2025-55182). Detects critical RCE flaws with multi-threaded scanning, real-time analytics, and multi-langu...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A critical vulnerability in React Server Components affecting React 19 (CVE-2025-55182) and frameworks that use it like Next.js (CVE-2025-66478).
URL:https://github.com/dr4xp/react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:A critical vulnerability in React Server Components affecting React 19 (CVE-2025-55182) and frameworks that use it like Next.js (CVE-2025-66478).
URL:https://github.com/dr4xp/react2shell
标签:#CVE-2025
GitHub
GitHub - dr4xp/react2shell: A critical vulnerability in React Server Components affecting React 19 (CVE-2025-55182) and frameworks…
A critical vulnerability in React Server Components affecting React 19 (CVE-2025-55182) and frameworks that use it like Next.js (CVE-2025-66478). - GitHub - dr4xp/react2shell: A critical vulnerabi...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A critical vulnerability in React Server Components affecting React 19 (CVE-2025-55182) and frameworks that use it like Next.js (CVE-2025-66478).
URL:https://github.com/trax69/cve-2025-55182-poc
标签:#CVE-2025
更新了:CVE-2025
描述:A critical vulnerability in React Server Components affecting React 19 (CVE-2025-55182) and frameworks that use it like Next.js (CVE-2025-66478).
URL:https://github.com/trax69/cve-2025-55182-poc
标签:#CVE-2025
GitHub
GitHub - trax69/cve-2025-55182-poc: Proof of Concept for CVE-2025-55182 ("React2Shell"). A fully dockerized environment demonstrating…
Proof of Concept for CVE-2025-55182 ("React2Shell"). A fully dockerized environment demonstrating Remote Code Execution (RCE) via insecure deserialization in React Server Componen...
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC for testing if a target is vulnerable to RCE
URL:https://github.com/b1g-b33f/CVE-2020-14882
标签:#RCE
更新了:RCE
描述:PoC for testing if a target is vulnerable to RCE
URL:https://github.com/b1g-b33f/CVE-2020-14882
标签:#RCE
GitHub
GitHub - b1g-b33f/CVE-2020-14882: PoC for testing if a target is vulnerable to RCE
PoC for testing if a target is vulnerable to RCE. Contribute to b1g-b33f/CVE-2020-14882 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65964复现
URL:https://github.com/Syzygy-K/CVE-2025-65964-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65964复现
URL:https://github.com/Syzygy-K/CVE-2025-65964-Exploit
标签:#CVE-2025
GitHub
GitHub - Syzygy-K/CVE-2025-65964-Exploit: CVE-2025-65964复现
CVE-2025-65964复现. Contribute to Syzygy-K/CVE-2025-65964-Exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65964
URL:https://github.com/Geekby/n8n-CVE-2025-65964
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65964
URL:https://github.com/Geekby/n8n-CVE-2025-65964
标签:#CVE-2025
GitHub
GitHub - Geekby/n8n-CVE-2025-65964: CVE-2025-65964
CVE-2025-65964. Contribute to Geekby/n8n-CVE-2025-65964 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:py script proof of concept new CVE-2025-55182 based in lachlan2k script
URL:https://github.com/notkittenn/poc_react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:py script proof of concept new CVE-2025-55182 based in lachlan2k script
URL:https://github.com/notkittenn/poc_react2shell
标签:#CVE-2025
GitHub
notkittenn/poc_react2shell
py script proof of concept new CVE-2025-55182 based in lachlan2k script - notkittenn/poc_react2shell
GitHub监控消息提醒!!!
更新了:bypass av
描述:这里是针对免杀开展的学习课程
URL:https://github.com/Str1veBe1ng/bypassAV-study
标签:#bypass av
更新了:bypass av
描述:这里是针对免杀开展的学习课程
URL:https://github.com/Str1veBe1ng/bypassAV-study
标签:#bypass av
GitHub
GitHub - Str1veBe1ng/bypassAV-study: 这里是针对免杀开展的学习课程
这里是针对免杀开展的学习课程. Contribute to Str1veBe1ng/bypassAV-study development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55449 EXP
URL:https://github.com/xhh1h/CVE-2025-55449
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55449 EXP
URL:https://github.com/xhh1h/CVE-2025-55449
标签:#CVE-2025
GitHub
GitHub - xhh1h/CVE-2025-55449: CVE-2025-55449 EXP
CVE-2025-55449 EXP. Contribute to xhh1h/CVE-2025-55449 development by creating an account on GitHub.