GitHub监控消息提醒!!!
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/2292402583/VT-d-Bypass-Research-Guide-VT-d-BRG
标签:#绕过
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/2292402583/VT-d-Bypass-Research-Guide-VT-d-BRG
标签:#绕过
GitHub
GitHub - 2292402583/VT-d-Bypass-Research-Guide-VT-d-BRG: This project does not include a complete, ready-to-use bypass tool. It…
This project does not include a complete, ready-to-use bypass tool. It is primarily a collection of research guidelines, conceptual explanations, and development directions, aimed at providing se...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 Burp Passive Extension
URL:https://github.com/Ibonok/CVE-2025-55182-Burp-Passive-Extension
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 Burp Passive Extension
URL:https://github.com/Ibonok/CVE-2025-55182-Burp-Passive-Extension
标签:#CVE-2025
GitHub
GitHub - Ibonok/CVE-2025-55182-Burp-Passive-Extension: CVE-2025-55182 Burp Passive Extension
CVE-2025-55182 Burp Passive Extension. Contribute to Ibonok/CVE-2025-55182-Burp-Passive-Extension development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:info-auto - 子域名自动化信息收集工具,一站式完成子域名解析、IP 识别、端口扫描、HTTP 探测全流程,基于 Excel 表格作为数据载体,支持本地 / 容器化部署。
URL:https://github.com/ander1023/info-auto
标签:#信息收集
更新了:信息收集
描述:info-auto - 子域名自动化信息收集工具,一站式完成子域名解析、IP 识别、端口扫描、HTTP 探测全流程,基于 Excel 表格作为数据载体,支持本地 / 容器化部署。
URL:https://github.com/ander1023/info-auto
标签:#信息收集
GitHub
GitHub - ander1023/info-auto: info-auto - 子域名自动化信息收集工具,一站式完成子域名解析、IP 识别、端口扫描、HTTP 探测全流程,基于 Excel 表格作为数据载体,支持本地 / 容器化部署。
info-auto - 子域名自动化信息收集工具,一站式完成子域名解析、IP 识别、端口扫描、HTTP 探测全流程,基于 Excel 表格作为数据载体,支持本地 / 容器化部署。 - ander1023/info-auto
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 and CVE-2025-66478
URL:https://github.com/FurkanKAYAPINAR/ReactNext2Shell
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 and CVE-2025-66478
URL:https://github.com/FurkanKAYAPINAR/ReactNext2Shell
标签:#CVE-2025
GitHub
GitHub - FurkanKAYAPINAR/ReactNext2Shell: CVE-2025-55182 and CVE-2025-66478
CVE-2025-55182 and CVE-2025-66478. Contribute to FurkanKAYAPINAR/ReactNext2Shell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/rix4uni/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/rix4uni/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - rix4uni/CVE-2025-55182: A command-line tool for detecting CVE-2025-55182 and CVE-2025-66478 in Next.js applications using…
A command-line tool for detecting CVE-2025-55182 and CVE-2025-66478 in Next.js applications using React Server Components. - rix4uni/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A portable Bash script to detect vulnerable versions of React Server DOM and Next.js packages affected by [CVE-2025-55182]
URL:https://github.com/gonaumov/cve-2025-55182-checker
标签:#CVE-2025
更新了:CVE-2025
描述:A portable Bash script to detect vulnerable versions of React Server DOM and Next.js packages affected by [CVE-2025-55182]
URL:https://github.com/gonaumov/cve-2025-55182-checker
标签:#CVE-2025
GitHub
GitHub - gonaumov/cve-2025-55182-checker: A portable Bash script to detect vulnerable versions of React Server DOM and Next.js…
A portable Bash script to detect vulnerable versions of React Server DOM and Next.js packages affected by [CVE-2025-55182] - gonaumov/cve-2025-55182-checker
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/wumingkj/hi3861_proj
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/wumingkj/hi3861_proj
标签:#护网
GitHub
GitHub - wumingkj/hi3861_proj: 本项目基于鸿蒙原生内核与Hi3861硬件,构建了一个面向智能家居的分布式边缘计算系统。系统通过国密级NFC实现安全身份认证与门禁审计,依托多传感器融合进行环境感知与本地能效调控,并借助鸿蒙分…
本项目基于鸿蒙原生内核与Hi3861硬件,构建了一个面向智能家居的分布式边缘计算系统。系统通过国密级NFC实现安全身份认证与门禁审计,依托多传感器融合进行环境感知与本地能效调控,并借助鸿蒙分布式软总线实现端云协同。在异常事件发生时,支持本地实时响应与云端安全预警,形成“端‑边‑云”联动的安全防护与能源管理闭环,实现了从感知、通信到决策的全链路技术验证,体现了国产嵌入式平台在物联网安全与能效协...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65964
URL:https://github.com/Ashwesker/Blackash-CVE-2025-65964
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65964
URL:https://github.com/Ashwesker/Blackash-CVE-2025-65964
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-65964: CVE-2025-65964
CVE-2025-65964. Contribute to Ashwesker/Blackash-CVE-2025-65964 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:攻防
描述:12574_基于springboot的基于云平台的信息安全攻防实训平台
URL:https://github.com/retreytryhrtyrujyyj/12574
标签:#攻防
更新了:攻防
描述:12574_基于springboot的基于云平台的信息安全攻防实训平台
URL:https://github.com/retreytryhrtyrujyyj/12574
标签:#攻防
GitHub
GitHub - retreytryhrtyrujyyj/12574: 12574_基于springboot的基于云平台的信息安全攻防实训平台
12574_基于springboot的基于云平台的信息安全攻防实训平台. Contribute to retreytryhrtyrujyyj/12574 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-64113
URL:https://github.com/Ashwesker/Blackash-CVE-2025-64113
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-64113
URL:https://github.com/Ashwesker/Blackash-CVE-2025-64113
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-64113: CVE-2025-64113
CVE-2025-64113. Contribute to Ashwesker/Blackash-CVE-2025-64113 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Advisory for CVE-2025-65742 — Newgen OmniDocs LDAP Admin BFLA
URL:https://github.com/CBx216/CVE-2025-65742-Newgen-OmniDocs-LDAP-BFLA
标签:#CVE-2025
更新了:CVE-2025
描述:Advisory for CVE-2025-65742 — Newgen OmniDocs LDAP Admin BFLA
URL:https://github.com/CBx216/CVE-2025-65742-Newgen-OmniDocs-LDAP-BFLA
标签:#CVE-2025
GitHub
GitHub - CBx216/CVE-2025-65742-Newgen-OmniDocs-LDAP-BFLA: Advisory for CVE-2025-65742 — Newgen OmniDocs LDAP Admin BFLA
Advisory for CVE-2025-65742 — Newgen OmniDocs LDAP Admin BFLA - CBx216/CVE-2025-65742-Newgen-OmniDocs-LDAP-BFLA
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/VeilVulp/RscScan
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/VeilVulp/RscScan
标签:#CVE-2025
GitHub
GitHub - VeilVulp/RscScan: RscScan: Professional cross-platform vulnerability scanner for Next.js Server Actions (CVE-2025-55182).…
RscScan: Professional cross-platform vulnerability scanner for Next.js Server Actions (CVE-2025-55182). Detects critical RCE flaws with multi-threaded scanning, real-time analytics, and multi-langu...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Nmap NSE script for scanning React2Shell (CVE-2025-55182)
URL:https://github.com/JahazielLem/NSE_CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Nmap NSE script for scanning React2Shell (CVE-2025-55182)
URL:https://github.com/JahazielLem/NSE_CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - JahazielLem/NSE_CVE-2025-55182: Nmap NSE script for scanning React2Shell (CVE-2025-55182)
Nmap NSE script for scanning React2Shell (CVE-2025-55182) - JahazielLem/NSE_CVE-2025-55182
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/webspoilt/vulnforge-academy
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/webspoilt/vulnforge-academy
标签:#RCE
GitHub
GitHub - webspoilt/vulnforge-academy: 🔓 VulnForge Academy - A deliberately vulnerable web application for security training. 20…
🔓 VulnForge Academy - A deliberately vulnerable web application for security training. 20 levels (Beginner→Nightmare) covering OWASP Top 10, SQLi, XSS, IDOR, SSRF, RCE & more. CTF-style fla...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:File upload vulnerability in machsol machpanel 8 allows attacker gain a webshell.
URL:https://github.com/JeanKauffman1305/CVE-2025-62221-Exploit-
标签:#CVE-2025
更新了:CVE-2025
描述:File upload vulnerability in machsol machpanel 8 allows attacker gain a webshell.
URL:https://github.com/JeanKauffman1305/CVE-2025-62221-Exploit-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389)
URL:https://github.com/itsismarcos/SneeitScanner-CVE-2025-6389
标签:#RCE
更新了:RCE
描述:SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389)
URL:https://github.com/itsismarcos/SneeitScanner-CVE-2025-6389
标签:#RCE
GitHub
GitHub - itsismarcos/SneeitScanner-CVE-2025-6389: SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE…
SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389) - itsismarcos/SneeitScanner-CVE-2025-6389
GitHub监控消息提醒!!!
更新了:RCE
描述:SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389)
URL:https://github.com/CerberusMrX/Cerberus-React2Shell-Scanner-Exploit
标签:#RCE
更新了:RCE
描述:SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389)
URL:https://github.com/CerberusMrX/Cerberus-React2Shell-Scanner-Exploit
标签:#RCE
GitHub
GitHub - CerberusMrX/Cerberus-React2Shell-Scanner-Exploit: Elite exploitation toolkit for CVE-2025-55182 (React Server Components…
Elite exploitation toolkit for CVE-2025-55182 (React Server Components RCE). Async polymorphic payloads, advanced WAF/CDN bypass, proxy rotation, Shodan/Censys mass scan, auto-pwn + reverse shells,...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:nmap script to scan react2shell (CVE-2025-55182 and CVE-2025-66478) Vulnerability
URL:https://github.com/Saad-Ayady/react2shellNSE
标签:#CVE-2025
更新了:CVE-2025
描述:nmap script to scan react2shell (CVE-2025-55182 and CVE-2025-66478) Vulnerability
URL:https://github.com/Saad-Ayady/react2shellNSE
标签:#CVE-2025
GitHub
GitHub - Saad-Ayady/react2shellNSE: nmap script to scan react2shell (CVE-2025-55182 and CVE-2025-66478) Vulnerability
nmap script to scan react2shell (CVE-2025-55182 and CVE-2025-66478) Vulnerability - Saad-Ayady/react2shellNSE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A simple toolkit to validate, exploit & gain an interactive shell via the react2Shell Next.js RCE.
URL:https://github.com/J4ck3LSyN-Gen2/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:A simple toolkit to validate, exploit & gain an interactive shell via the react2Shell Next.js RCE.
URL:https://github.com/J4ck3LSyN-Gen2/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - J4ck3LSyN-Gen2/CVE-2025-55182: A simple toolkit to validate, exploit & gain an interactive shell via the react2Shell Next.js…
A simple toolkit to validate, exploit & gain an interactive shell via the react2Shell Next.js RCE. - J4ck3LSyN-Gen2/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A CTF challenge based on CVE-2025-55182 Vulnerability
URL:https://github.com/yz9yt/React2Shell-CTF
标签:#CVE-2025
更新了:CVE-2025
描述:A CTF challenge based on CVE-2025-55182 Vulnerability
URL:https://github.com/yz9yt/React2Shell-CTF
标签:#CVE-2025
GitHub
GitHub - yz9yt/React2Shell-CTF: A CTF challenge based on CVE-2025-55182 Vulnerability
A CTF challenge based on CVE-2025-55182 Vulnerability - yz9yt/React2Shell-CTF
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Working Proof of Concept (PoC) for CVE-2025-55182 (React2Shell) - Unauthenticated Remote Code Execution in Next.js 15.0.0 via React Server Components
URL:https://github.com/pkrasulia/CVE-2025-55182-NextJS-RCE-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Working Proof of Concept (PoC) for CVE-2025-55182 (React2Shell) - Unauthenticated Remote Code Execution in Next.js 15.0.0 via React Server Components
URL:https://github.com/pkrasulia/CVE-2025-55182-NextJS-RCE-PoC
标签:#CVE-2025
GitHub
GitHub - pkrasulia/CVE-2025-55182-NextJS-RCE-PoC: Working Proof of Concept (PoC) for CVE-2025-55182 (React2Shell) - Unauthenticated…
Working Proof of Concept (PoC) for CVE-2025-55182 (React2Shell) - Unauthenticated Remote Code Execution in Next.js 15.0.0 via React Server Components - pkrasulia/CVE-2025-55182-NextJS-RCE-PoC