GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A critical vulnerability in React Server Components affecting React 19 (CVE-2025-55182) and frameworks that use it like Next.js (CVE-2025-66478).
URL:https://github.com/trax69/cve-2025-55182-poc
标签:#CVE-2025
更新了:CVE-2025
描述:A critical vulnerability in React Server Components affecting React 19 (CVE-2025-55182) and frameworks that use it like Next.js (CVE-2025-66478).
URL:https://github.com/trax69/cve-2025-55182-poc
标签:#CVE-2025
GitHub
GitHub - trax69/cve-2025-55182-poc: Proof of Concept for CVE-2025-55182 ("React2Shell"). A fully dockerized environment demonstrating…
Proof of Concept for CVE-2025-55182 ("React2Shell"). A fully dockerized environment demonstrating Remote Code Execution (RCE) via insecure deserialization in React Server Componen...
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC for testing if a target is vulnerable to RCE
URL:https://github.com/b1g-b33f/CVE-2020-14882
标签:#RCE
更新了:RCE
描述:PoC for testing if a target is vulnerable to RCE
URL:https://github.com/b1g-b33f/CVE-2020-14882
标签:#RCE
GitHub
GitHub - b1g-b33f/CVE-2020-14882: PoC for testing if a target is vulnerable to RCE
PoC for testing if a target is vulnerable to RCE. Contribute to b1g-b33f/CVE-2020-14882 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65964复现
URL:https://github.com/Syzygy-K/CVE-2025-65964-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65964复现
URL:https://github.com/Syzygy-K/CVE-2025-65964-Exploit
标签:#CVE-2025
GitHub
GitHub - Syzygy-K/CVE-2025-65964-Exploit: CVE-2025-65964复现
CVE-2025-65964复现. Contribute to Syzygy-K/CVE-2025-65964-Exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65964
URL:https://github.com/Geekby/n8n-CVE-2025-65964
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65964
URL:https://github.com/Geekby/n8n-CVE-2025-65964
标签:#CVE-2025
GitHub
GitHub - Geekby/n8n-CVE-2025-65964: CVE-2025-65964
CVE-2025-65964. Contribute to Geekby/n8n-CVE-2025-65964 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:py script proof of concept new CVE-2025-55182 based in lachlan2k script
URL:https://github.com/notkittenn/poc_react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:py script proof of concept new CVE-2025-55182 based in lachlan2k script
URL:https://github.com/notkittenn/poc_react2shell
标签:#CVE-2025
GitHub
notkittenn/poc_react2shell
py script proof of concept new CVE-2025-55182 based in lachlan2k script - notkittenn/poc_react2shell
GitHub监控消息提醒!!!
更新了:bypass av
描述:这里是针对免杀开展的学习课程
URL:https://github.com/Str1veBe1ng/bypassAV-study
标签:#bypass av
更新了:bypass av
描述:这里是针对免杀开展的学习课程
URL:https://github.com/Str1veBe1ng/bypassAV-study
标签:#bypass av
GitHub
GitHub - Str1veBe1ng/bypassAV-study: 这里是针对免杀开展的学习课程
这里是针对免杀开展的学习课程. Contribute to Str1veBe1ng/bypassAV-study development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55449 EXP
URL:https://github.com/xhh1h/CVE-2025-55449
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55449 EXP
URL:https://github.com/xhh1h/CVE-2025-55449
标签:#CVE-2025
GitHub
GitHub - xhh1h/CVE-2025-55449: CVE-2025-55449 EXP
CVE-2025-55449 EXP. Contribute to xhh1h/CVE-2025-55449 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Iddygodwin/CVE-2025-33073
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Iddygodwin/CVE-2025-33073
标签:#CVE-2025
GitHub
GitHub - Iddygodwin/CVE-2025-33073: 🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling…
🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques. - Iddygodwin/CVE-2025-33073
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:ReactGuard provides framework- and vulnerability-detection tooling for CVE-2025-55182 (React2Shell)
URL:https://github.com/theori-io/reactguard
标签:#CVE-2025
更新了:CVE-2025
描述:ReactGuard provides framework- and vulnerability-detection tooling for CVE-2025-55182 (React2Shell)
URL:https://github.com/theori-io/reactguard
标签:#CVE-2025
GitHub
GitHub - theori-io/reactguard: ReactGuard provides framework- and vulnerability-detection tooling for CVE-2025-55182 (React2Shell)
ReactGuard provides framework- and vulnerability-detection tooling for CVE-2025-55182 (React2Shell) - theori-io/reactguard
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/BakhodiribnYashinibnMansur/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/BakhodiribnYashinibnMansur/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - BakhodiribnYashinibnMansur/CVE-2025-55182: CVE-2025-55182
CVE-2025-55182 . Contribute to BakhodiribnYashinibnMansur/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/Pantheon-Security/medusa
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/Pantheon-Security/medusa
标签:#CVE-2025
GitHub
GitHub - Pantheon-Security/medusa: Multi-language security scanner with 64 analyzers + AI Agent Security. NEW: React2Shell CVE…
Multi-language security scanner with 64 analyzers + AI Agent Security. NEW: React2Shell CVE-2025-55182 detection (CVSS 10.0). Scan Python, JS, Go, Rust, Docker, Terraform, MCP & more. 11,50...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 React RCE Test Server
URL:https://github.com/theman001/CVE-2025-55182_PoC-Test-Server
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 React RCE Test Server
URL:https://github.com/theman001/CVE-2025-55182_PoC-Test-Server
标签:#CVE-2025
GitHub
GitHub - theman001/CVE-2025-55182_PoC-Test-Server: CVE-2025-55182 React RCE Test Server
CVE-2025-55182 React RCE Test Server. Contribute to theman001/CVE-2025-55182_PoC-Test-Server development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Next.js RCE via React Server Functions
URL:https://github.com/gunyakit/CVE-2025-55182-PoC-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Next.js RCE via React Server Functions
URL:https://github.com/gunyakit/CVE-2025-55182-PoC-exploit
标签:#CVE-2025
GitHub
GitHub - gunyakit/CVE-2025-55182-PoC-exploit: Next.js RCE via React Server Functions
Next.js RCE via React Server Functions. Contribute to gunyakit/CVE-2025-55182-PoC-exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/GreenHand0001/java241
标签:#应急响应
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/GreenHand0001/java241
标签:#应急响应
GitHub
GitHub - GreenHand0001/java241: 本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简…
本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。 - GreenHand0001/java241
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 React RCE Test Server
URL:https://github.com/VeilVulp/Rscscan
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 React RCE Test Server
URL:https://github.com/VeilVulp/Rscscan
标签:#CVE-2025
GitHub
GitHub - VeilVulp/RscScan-cve-2025-55182: RscScan: Professional cross-platform vulnerability scanner for Next.js Server Actions…
RscScan: Professional cross-platform vulnerability scanner for Next.js Server Actions (CVE-2025-55182). Detects critical RCE flaws with multi-threaded scanning, real-time analytics, and multi-langu...
GitHub监控消息提醒!!!
更新了:RCE
描述:Kubernetes Ingress-nginx RCE (IngressNightmare)
URL:https://github.com/gunyakit/CVE-2025-1974-PoC-exploit
标签:#RCE
更新了:RCE
描述:Kubernetes Ingress-nginx RCE (IngressNightmare)
URL:https://github.com/gunyakit/CVE-2025-1974-PoC-exploit
标签:#RCE
GitHub
GitHub - gunyakit/CVE-2025-1974-PoC-exploit: Kubernetes Ingress-nginx RCE (IngressNightmare)
Kubernetes Ingress-nginx RCE (IngressNightmare). Contribute to gunyakit/CVE-2025-1974-PoC-exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/2292402583/VT-d-Bypass-Research-Guide-VT-d-BRG
标签:#绕过
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/2292402583/VT-d-Bypass-Research-Guide-VT-d-BRG
标签:#绕过
GitHub
GitHub - 2292402583/VT-d-Bypass-Research-Guide-VT-d-BRG: This project does not include a complete, ready-to-use bypass tool. It…
This project does not include a complete, ready-to-use bypass tool. It is primarily a collection of research guidelines, conceptual explanations, and development directions, aimed at providing se...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 Burp Passive Extension
URL:https://github.com/Ibonok/CVE-2025-55182-Burp-Passive-Extension
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 Burp Passive Extension
URL:https://github.com/Ibonok/CVE-2025-55182-Burp-Passive-Extension
标签:#CVE-2025
GitHub
GitHub - Ibonok/CVE-2025-55182-Burp-Passive-Extension: CVE-2025-55182 Burp Passive Extension
CVE-2025-55182 Burp Passive Extension. Contribute to Ibonok/CVE-2025-55182-Burp-Passive-Extension development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:info-auto - 子域名自动化信息收集工具,一站式完成子域名解析、IP 识别、端口扫描、HTTP 探测全流程,基于 Excel 表格作为数据载体,支持本地 / 容器化部署。
URL:https://github.com/ander1023/info-auto
标签:#信息收集
更新了:信息收集
描述:info-auto - 子域名自动化信息收集工具,一站式完成子域名解析、IP 识别、端口扫描、HTTP 探测全流程,基于 Excel 表格作为数据载体,支持本地 / 容器化部署。
URL:https://github.com/ander1023/info-auto
标签:#信息收集
GitHub
GitHub - ander1023/info-auto: info-auto - 子域名自动化信息收集工具,一站式完成子域名解析、IP 识别、端口扫描、HTTP 探测全流程,基于 Excel 表格作为数据载体,支持本地 / 容器化部署。
info-auto - 子域名自动化信息收集工具,一站式完成子域名解析、IP 识别、端口扫描、HTTP 探测全流程,基于 Excel 表格作为数据载体,支持本地 / 容器化部署。 - ander1023/info-auto