GitHub监控消息提醒!!!
更新了:CVE-2025
描述:File upload vulnerability in machsol machpanel 8 allows attacker gain a webshell.
URL:https://github.com/JeanKauffman1305/CVE-2025-62221-Exploit-
标签:#CVE-2025
更新了:CVE-2025
描述:File upload vulnerability in machsol machpanel 8 allows attacker gain a webshell.
URL:https://github.com/JeanKauffman1305/CVE-2025-62221-Exploit-
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389)
URL:https://github.com/itsismarcos/SneeitScanner-CVE-2025-6389
标签:#RCE
更新了:RCE
描述:SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389)
URL:https://github.com/itsismarcos/SneeitScanner-CVE-2025-6389
标签:#RCE
GitHub
GitHub - itsismarcos/SneeitScanner-CVE-2025-6389: SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE…
SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389) - itsismarcos/SneeitScanner-CVE-2025-6389
GitHub监控消息提醒!!!
更新了:RCE
描述:SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389)
URL:https://github.com/CerberusMrX/Cerberus-React2Shell-Scanner-Exploit
标签:#RCE
更新了:RCE
描述:SneeitScanner - PoC & Scanner para RCE não autenticada no Sneeit Framework (CVE-2025-6389)
URL:https://github.com/CerberusMrX/Cerberus-React2Shell-Scanner-Exploit
标签:#RCE
GitHub
GitHub - CerberusMrX/Cerberus-React2Shell-Scanner-Exploit: Elite exploitation toolkit for CVE-2025-55182 (React Server Components…
Elite exploitation toolkit for CVE-2025-55182 (React Server Components RCE). Async polymorphic payloads, advanced WAF/CDN bypass, proxy rotation, Shodan/Censys mass scan, auto-pwn + reverse shells,...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:nmap script to scan react2shell (CVE-2025-55182 and CVE-2025-66478) Vulnerability
URL:https://github.com/Saad-Ayady/react2shellNSE
标签:#CVE-2025
更新了:CVE-2025
描述:nmap script to scan react2shell (CVE-2025-55182 and CVE-2025-66478) Vulnerability
URL:https://github.com/Saad-Ayady/react2shellNSE
标签:#CVE-2025
GitHub
GitHub - Saad-Ayady/react2shellNSE: nmap script to scan react2shell (CVE-2025-55182 and CVE-2025-66478) Vulnerability
nmap script to scan react2shell (CVE-2025-55182 and CVE-2025-66478) Vulnerability - Saad-Ayady/react2shellNSE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A simple toolkit to validate, exploit & gain an interactive shell via the react2Shell Next.js RCE.
URL:https://github.com/J4ck3LSyN-Gen2/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:A simple toolkit to validate, exploit & gain an interactive shell via the react2Shell Next.js RCE.
URL:https://github.com/J4ck3LSyN-Gen2/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - J4ck3LSyN-Gen2/CVE-2025-55182: A simple toolkit to validate, exploit & gain an interactive shell via the react2Shell Next.js…
A simple toolkit to validate, exploit & gain an interactive shell via the react2Shell Next.js RCE. - J4ck3LSyN-Gen2/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A CTF challenge based on CVE-2025-55182 Vulnerability
URL:https://github.com/yz9yt/React2Shell-CTF
标签:#CVE-2025
更新了:CVE-2025
描述:A CTF challenge based on CVE-2025-55182 Vulnerability
URL:https://github.com/yz9yt/React2Shell-CTF
标签:#CVE-2025
GitHub
GitHub - yz9yt/React2Shell-CTF: A CTF challenge based on CVE-2025-55182 Vulnerability
A CTF challenge based on CVE-2025-55182 Vulnerability - yz9yt/React2Shell-CTF
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Working Proof of Concept (PoC) for CVE-2025-55182 (React2Shell) - Unauthenticated Remote Code Execution in Next.js 15.0.0 via React Server Components
URL:https://github.com/pkrasulia/CVE-2025-55182-NextJS-RCE-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Working Proof of Concept (PoC) for CVE-2025-55182 (React2Shell) - Unauthenticated Remote Code Execution in Next.js 15.0.0 via React Server Components
URL:https://github.com/pkrasulia/CVE-2025-55182-NextJS-RCE-PoC
标签:#CVE-2025
GitHub
GitHub - pkrasulia/CVE-2025-55182-NextJS-RCE-PoC: Working Proof of Concept (PoC) for CVE-2025-55182 (React2Shell) - Unauthenticated…
Working Proof of Concept (PoC) for CVE-2025-55182 (React2Shell) - Unauthenticated Remote Code Execution in Next.js 15.0.0 via React Server Components - pkrasulia/CVE-2025-55182-NextJS-RCE-PoC
GitHub监控消息提醒!!!
更新了:RCE
描述:Firefox extension to detect and exploit CVE-2025-55182 - Prototype Pollution RCE in Next.js React Server Actions
URL:https://github.com/oscarmine/R2SAE
标签:#RCE
更新了:RCE
描述:Firefox extension to detect and exploit CVE-2025-55182 - Prototype Pollution RCE in Next.js React Server Actions
URL:https://github.com/oscarmine/R2SAE
标签:#RCE
GitHub
GitHub - oscarmine/R2SAE: Firefox extension to detect and exploit CVE-2025-55182 - Prototype Pollution RCE in Next.js React Server…
Firefox extension to detect and exploit CVE-2025-55182 - Prototype Pollution RCE in Next.js React Server Actions - oscarmine/R2SAE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Sigma Rule for CVE-2025-49666
URL:https://github.com/17patmaks/My-Sigma-Rule-Collection
标签:#CVE-2025
更新了:CVE-2025
描述:Sigma Rule for CVE-2025-49666
URL:https://github.com/17patmaks/My-Sigma-Rule-Collection
标签:#CVE-2025
GitHub
GitHub - 17patmaks/My-Sigma-Rule-Collection: Sigma Rule for CVE-2025-49666
Sigma Rule for CVE-2025-49666. Contribute to 17patmaks/My-Sigma-Rule-Collection development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:游戏盾SDK 支持私有化部署,可提供源码二次开发,可提供完整产品的源码级维护,应急响应。
URL:https://github.com/grayi/youxidun
标签:#应急响应
更新了:应急响应
描述:游戏盾SDK 支持私有化部署,可提供源码二次开发,可提供完整产品的源码级维护,应急响应。
URL:https://github.com/grayi/youxidun
标签:#应急响应
GitHub
GitHub - grayi/youxidun: 游戏盾SDK 支持私有化部署,可提供源码二次开发,可提供完整产品的源码级维护,应急响应。
游戏盾SDK 支持私有化部署,可提供源码二次开发,可提供完整产品的源码级维护,应急响应。. Contribute to grayi/youxidun development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Docker test environment for CVE-2025-34299 - Monsta FTP Pre-Auth RCE vulnerability
URL:https://github.com/KrE80r/CVE-2025-34299-lab
标签:#CVE-2025
更新了:CVE-2025
描述:Docker test environment for CVE-2025-34299 - Monsta FTP Pre-Auth RCE vulnerability
URL:https://github.com/KrE80r/CVE-2025-34299-lab
标签:#CVE-2025
GitHub
GitHub - KrE80r/CVE-2025-34299-lab: Docker test environment for CVE-2025-34299 - Monsta FTP Pre-Auth RCE vulnerability
Docker test environment for CVE-2025-34299 - Monsta FTP Pre-Auth RCE vulnerability - KrE80r/CVE-2025-34299-lab
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/LoKinii/CVE-2025-62221-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
URL:https://github.com/LoKinii/CVE-2025-62221-Exploit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Intentionally vulnerable Next.js app for CVE-2025-55182 security research and CTF challenges
URL:https://github.com/Machine-farmer/PunchingBag-for-React2Shell
标签:#CVE-2025
更新了:CVE-2025
描述:Intentionally vulnerable Next.js app for CVE-2025-55182 security research and CTF challenges
URL:https://github.com/Machine-farmer/PunchingBag-for-React2Shell
标签:#CVE-2025
GitHub
GitHub - Machine-farmer/PunchingBag-for-React2Shell: Intentionally vulnerable Next.js app for CVE-2025-55182 security research…
Intentionally vulnerable Next.js app for CVE-2025-55182 security research and CTF challenges - Machine-farmer/PunchingBag-for-React2Shell
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Next.js-Exploit-Tool 图形化综合利用工具,基于 Go 开发,一款针对 CVE-2025-55182 的独立安全评估工具。
URL:https://github.com/Rsatan/Next.js-Exploit-Tool
标签:#CVE-2025
更新了:CVE-2025
描述:Next.js-Exploit-Tool 图形化综合利用工具,基于 Go 开发,一款针对 CVE-2025-55182 的独立安全评估工具。
URL:https://github.com/Rsatan/Next.js-Exploit-Tool
标签:#CVE-2025
GitHub
GitHub - Rsatan/Next.js-Exploit-Tool: Next.js-Exploit-Tool 图形化综合利用工具,基于 Go 开发,一款针对 CVE-2025-55182 的独立安全评估工具。
Next.js-Exploit-Tool 图形化综合利用工具,基于 Go 开发,一款针对 CVE-2025-55182 的独立安全评估工具。 - Rsatan/Next.js-Exploit-Tool
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-66478 Proof of Concept
URL:https://github.com/wangxso/CVE-2025-66478-POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-66478 Proof of Concept
URL:https://github.com/wangxso/CVE-2025-66478-POC
标签:#CVE-2025
GitHub
GitHub - wangxso/CVE-2025-66478-POC: CVE-2025-66478 Proof of Concept
CVE-2025-66478 Proof of Concept. Contribute to wangxso/CVE-2025-66478-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC SQLi CVE-2025-64516
URL:https://github.com/lem0naids/CVE-2025-64516-POC
标签:#CVE-2025
更新了:CVE-2025
描述:POC SQLi CVE-2025-64516
URL:https://github.com/lem0naids/CVE-2025-64516-POC
标签:#CVE-2025
GitHub
GitHub - lem0naids/CVE-2025-64516-POC: POC SQLi CVE-2025-64516
POC SQLi CVE-2025-64516. Contribute to lem0naids/CVE-2025-64516-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:红队
描述:TL-ICScan 是由天禄实验室开发的一款面向安全研究人员、红队与蓝队的本地化漏洞情报聚合与分析工具。
URL:https://github.com/tianlusec/TL-ICScan
标签:#红队
更新了:红队
描述:TL-ICScan 是由天禄实验室开发的一款面向安全研究人员、红队与蓝队的本地化漏洞情报聚合与分析工具。
URL:https://github.com/tianlusec/TL-ICScan
标签:#红队
GitHub
GitHub - tianlusec/TL-ICScan: TL-ICScan 是由天禄实验室开发的一款面向安全研究人员、红队与蓝队的本地化漏洞情报聚合与分析工具。
TL-ICScan 是由天禄实验室开发的一款面向安全研究人员、红队与蓝队的本地化漏洞情报聚合与分析工具。 - tianlusec/TL-ICScan
GitHub监控消息提醒!!!
更新了:burp
描述:poorsman burp clone for ios without being a proper proxy
URL:https://github.com/gabystdev/myburp
标签:#burp
更新了:burp
描述:poorsman burp clone for ios without being a proper proxy
URL:https://github.com/gabystdev/myburp
标签:#burp
GitHub
GitHub - gabystdev/myburp: poorsman burp clone for ios without being a proper proxy
poorsman burp clone for ios without being a proper proxy - gabystdev/myburp