GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A portable Bash script to detect vulnerable versions of React Server DOM and Next.js packages affected by [CVE-2025-55182]
URL:https://github.com/gonaumov/cve-2025-55182-checker
标签:#CVE-2025
更新了:CVE-2025
描述:A portable Bash script to detect vulnerable versions of React Server DOM and Next.js packages affected by [CVE-2025-55182]
URL:https://github.com/gonaumov/cve-2025-55182-checker
标签:#CVE-2025
GitHub
GitHub - gonaumov/cve-2025-55182-checker: A portable Bash script to detect vulnerable versions of React Server DOM and Next.js…
A portable Bash script to detect vulnerable versions of React Server DOM and Next.js packages affected by [CVE-2025-55182] - gonaumov/cve-2025-55182-checker
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/wumingkj/hi3861_proj
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/wumingkj/hi3861_proj
标签:#护网
GitHub
GitHub - wumingkj/hi3861_proj: 本项目基于鸿蒙原生内核与Hi3861硬件,构建了一个面向智能家居的分布式边缘计算系统。系统通过国密级NFC实现安全身份认证与门禁审计,依托多传感器融合进行环境感知与本地能效调控,并借助鸿蒙分…
本项目基于鸿蒙原生内核与Hi3861硬件,构建了一个面向智能家居的分布式边缘计算系统。系统通过国密级NFC实现安全身份认证与门禁审计,依托多传感器融合进行环境感知与本地能效调控,并借助鸿蒙分布式软总线实现端云协同。在异常事件发生时,支持本地实时响应与云端安全预警,形成“端‑边‑云”联动的安全防护与能源管理闭环,实现了从感知、通信到决策的全链路技术验证,体现了国产嵌入式平台在物联网安全与能效协...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-65964
URL:https://github.com/Ashwesker/Blackash-CVE-2025-65964
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-65964
URL:https://github.com/Ashwesker/Blackash-CVE-2025-65964
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-65964: CVE-2025-65964
CVE-2025-65964. Contribute to Ashwesker/Blackash-CVE-2025-65964 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:攻防
描述:12574_基于springboot的基于云平台的信息安全攻防实训平台
URL:https://github.com/retreytryhrtyrujyyj/12574
标签:#攻防
更新了:攻防
描述:12574_基于springboot的基于云平台的信息安全攻防实训平台
URL:https://github.com/retreytryhrtyrujyyj/12574
标签:#攻防
GitHub
GitHub - retreytryhrtyrujyyj/12574: 12574_基于springboot的基于云平台的信息安全攻防实训平台
12574_基于springboot的基于云平台的信息安全攻防实训平台. Contribute to retreytryhrtyrujyyj/12574 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-64113
URL:https://github.com/Ashwesker/Blackash-CVE-2025-64113
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-64113
URL:https://github.com/Ashwesker/Blackash-CVE-2025-64113
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-64113: CVE-2025-64113
CVE-2025-64113. Contribute to Ashwesker/Blackash-CVE-2025-64113 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Advisory for CVE-2025-65742 — Newgen OmniDocs LDAP Admin BFLA
URL:https://github.com/CBx216/CVE-2025-65742-Newgen-OmniDocs-LDAP-BFLA
标签:#CVE-2025
更新了:CVE-2025
描述:Advisory for CVE-2025-65742 — Newgen OmniDocs LDAP Admin BFLA
URL:https://github.com/CBx216/CVE-2025-65742-Newgen-OmniDocs-LDAP-BFLA
标签:#CVE-2025
GitHub
GitHub - CBx216/CVE-2025-65742-Newgen-OmniDocs-LDAP-BFLA: Advisory for CVE-2025-65742 — Newgen OmniDocs LDAP Admin BFLA
Advisory for CVE-2025-65742 — Newgen OmniDocs LDAP Admin BFLA - CBx216/CVE-2025-65742-Newgen-OmniDocs-LDAP-BFLA
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/VeilVulp/RscScan
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/VeilVulp/RscScan
标签:#CVE-2025
GitHub
GitHub - VeilVulp/RscScan: RscScan: Professional cross-platform vulnerability scanner for Next.js Server Actions (CVE-2025-55182).…
RscScan: Professional cross-platform vulnerability scanner for Next.js Server Actions (CVE-2025-55182). Detects critical RCE flaws with multi-threaded scanning, real-time analytics, and multi-langu...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Nmap NSE script for scanning React2Shell (CVE-2025-55182)
URL:https://github.com/JahazielLem/NSE_CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Nmap NSE script for scanning React2Shell (CVE-2025-55182)
URL:https://github.com/JahazielLem/NSE_CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - JahazielLem/NSE_CVE-2025-55182: Nmap NSE script for scanning React2Shell (CVE-2025-55182)
Nmap NSE script for scanning React2Shell (CVE-2025-55182) - JahazielLem/NSE_CVE-2025-55182
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/webspoilt/vulnforge-academy
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/webspoilt/vulnforge-academy
标签:#RCE
GitHub
GitHub - webspoilt/vulnforge-academy: 🔓 VulnForge Academy - A deliberately vulnerable web application for security training. 20…
🔓 VulnForge Academy - A deliberately vulnerable web application for security training. 20 levels (Beginner→Nightmare) covering OWASP Top 10, SQLi, XSS, IDOR, SSRF, RCE & more. CTF-style fla...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:File upload vulnerability in machsol machpanel 8 allows attacker gain a webshell.
URL:https://github.com/JeanKauffman1305/CVE-2025-62221-Exploit-
标签:#CVE-2025
更新了:CVE-2025
描述:File upload vulnerability in machsol machpanel 8 allows attacker gain a webshell.
URL:https://github.com/JeanKauffman1305/CVE-2025-62221-Exploit-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389)
URL:https://github.com/itsismarcos/SneeitScanner-CVE-2025-6389
标签:#RCE
更新了:RCE
描述:SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389)
URL:https://github.com/itsismarcos/SneeitScanner-CVE-2025-6389
标签:#RCE
GitHub
GitHub - itsismarcos/SneeitScanner-CVE-2025-6389: SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE…
SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389) - itsismarcos/SneeitScanner-CVE-2025-6389
GitHub监控消息提醒!!!
更新了:RCE
描述:SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389)
URL:https://github.com/CerberusMrX/Cerberus-React2Shell-Scanner-Exploit
标签:#RCE
更新了:RCE
描述:SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389)
URL:https://github.com/CerberusMrX/Cerberus-React2Shell-Scanner-Exploit
标签:#RCE
GitHub
GitHub - CerberusMrX/Cerberus-React2Shell-Scanner-Exploit: Elite exploitation toolkit for CVE-2025-55182 (React Server Components…
Elite exploitation toolkit for CVE-2025-55182 (React Server Components RCE). Async polymorphic payloads, advanced WAF/CDN bypass, proxy rotation, Shodan/Censys mass scan, auto-pwn + reverse shells,...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:nmap script to scan react2shell (CVE-2025-55182 and CVE-2025-66478) Vulnerability
URL:https://github.com/Saad-Ayady/react2shellNSE
标签:#CVE-2025
更新了:CVE-2025
描述:nmap script to scan react2shell (CVE-2025-55182 and CVE-2025-66478) Vulnerability
URL:https://github.com/Saad-Ayady/react2shellNSE
标签:#CVE-2025
GitHub
GitHub - Saad-Ayady/react2shellNSE: nmap script to scan react2shell (CVE-2025-55182 and CVE-2025-66478) Vulnerability
nmap script to scan react2shell (CVE-2025-55182 and CVE-2025-66478) Vulnerability - Saad-Ayady/react2shellNSE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A simple toolkit to validate, exploit & gain an interactive shell via the react2Shell Next.js RCE.
URL:https://github.com/J4ck3LSyN-Gen2/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:A simple toolkit to validate, exploit & gain an interactive shell via the react2Shell Next.js RCE.
URL:https://github.com/J4ck3LSyN-Gen2/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - J4ck3LSyN-Gen2/CVE-2025-55182: A simple toolkit to validate, exploit & gain an interactive shell via the react2Shell Next.js…
A simple toolkit to validate, exploit & gain an interactive shell via the react2Shell Next.js RCE. - J4ck3LSyN-Gen2/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A CTF challenge based on CVE-2025-55182 Vulnerability
URL:https://github.com/yz9yt/React2Shell-CTF
标签:#CVE-2025
更新了:CVE-2025
描述:A CTF challenge based on CVE-2025-55182 Vulnerability
URL:https://github.com/yz9yt/React2Shell-CTF
标签:#CVE-2025
GitHub
GitHub - yz9yt/React2Shell-CTF: A CTF challenge based on CVE-2025-55182 Vulnerability
A CTF challenge based on CVE-2025-55182 Vulnerability - yz9yt/React2Shell-CTF
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Working Proof of Concept (PoC) for CVE-2025-55182 (React2Shell) - Unauthenticated Remote Code Execution in Next.js 15.0.0 via React Server Components
URL:https://github.com/pkrasulia/CVE-2025-55182-NextJS-RCE-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Working Proof of Concept (PoC) for CVE-2025-55182 (React2Shell) - Unauthenticated Remote Code Execution in Next.js 15.0.0 via React Server Components
URL:https://github.com/pkrasulia/CVE-2025-55182-NextJS-RCE-PoC
标签:#CVE-2025
GitHub
GitHub - pkrasulia/CVE-2025-55182-NextJS-RCE-PoC: Working Proof of Concept (PoC) for CVE-2025-55182 (React2Shell) - Unauthenticated…
Working Proof of Concept (PoC) for CVE-2025-55182 (React2Shell) - Unauthenticated Remote Code Execution in Next.js 15.0.0 via React Server Components - pkrasulia/CVE-2025-55182-NextJS-RCE-PoC
GitHub监控消息提醒!!!
更新了:RCE
描述:Firefox extension to detect and exploit CVE-2025-55182 - Prototype Pollution RCE in Next.js React Server Actions
URL:https://github.com/oscarmine/R2SAE
标签:#RCE
更新了:RCE
描述:Firefox extension to detect and exploit CVE-2025-55182 - Prototype Pollution RCE in Next.js React Server Actions
URL:https://github.com/oscarmine/R2SAE
标签:#RCE
GitHub
GitHub - oscarmine/R2SAE: Firefox extension to detect and exploit CVE-2025-55182 - Prototype Pollution RCE in Next.js React Server…
Firefox extension to detect and exploit CVE-2025-55182 - Prototype Pollution RCE in Next.js React Server Actions - oscarmine/R2SAE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Sigma Rule for CVE-2025-49666
URL:https://github.com/17patmaks/My-Sigma-Rule-Collection
标签:#CVE-2025
更新了:CVE-2025
描述:Sigma Rule for CVE-2025-49666
URL:https://github.com/17patmaks/My-Sigma-Rule-Collection
标签:#CVE-2025
GitHub
GitHub - 17patmaks/My-Sigma-Rule-Collection: Sigma Rule for CVE-2025-49666
Sigma Rule for CVE-2025-49666. Contribute to 17patmaks/My-Sigma-Rule-Collection development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:游戏盾SDK 支持私有化部署,可提供源码二次开发,可提供完整产品的源码级维护,应急响应。
URL:https://github.com/grayi/youxidun
标签:#应急响应
更新了:应急响应
描述:游戏盾SDK 支持私有化部署,可提供源码二次开发,可提供完整产品的源码级维护,应急响应。
URL:https://github.com/grayi/youxidun
标签:#应急响应
GitHub
GitHub - grayi/youxidun: 游戏盾SDK 支持私有化部署,可提供源码二次开发,可提供完整产品的源码级维护,应急响应。
游戏盾SDK 支持私有化部署,可提供源码二次开发,可提供完整产品的源码级维护,应急响应。. Contribute to grayi/youxidun development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Docker test environment for CVE-2025-34299 - Monsta FTP Pre-Auth RCE vulnerability
URL:https://github.com/KrE80r/CVE-2025-34299-lab
标签:#CVE-2025
更新了:CVE-2025
描述:Docker test environment for CVE-2025-34299 - Monsta FTP Pre-Auth RCE vulnerability
URL:https://github.com/KrE80r/CVE-2025-34299-lab
标签:#CVE-2025
GitHub
GitHub - KrE80r/CVE-2025-34299-lab: Docker test environment for CVE-2025-34299 - Monsta FTP Pre-Auth RCE vulnerability
Docker test environment for CVE-2025-34299 - Monsta FTP Pre-Auth RCE vulnerability - KrE80r/CVE-2025-34299-lab
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/LoKinii/CVE-2025-62221-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/LoKinii/CVE-2025-62221-Exploit
标签:#CVE-2025