GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/andrei2308/react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/andrei2308/react2shell
标签:#CVE-2025
GitHub
GitHub - andrei2308/react2shell: CVE-2025-55182
CVE-2025-55182. Contribute to andrei2308/react2shell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Out-Of-Tree Llama Stack Eval Provider for Red Teaming LLM Systems with Garak
URL:https://github.com/trustyai-explainability/llama-stack-provider-trustyai-garak
标签:#Red Team
更新了:Red Team
描述:Out-Of-Tree Llama Stack Eval Provider for Red Teaming LLM Systems with Garak
URL:https://github.com/trustyai-explainability/llama-stack-provider-trustyai-garak
标签:#Red Team
GitHub
GitHub - trustyai-explainability/llama-stack-provider-trustyai-garak: Out-Of-Tree Llama Stack Eval Provider for Red Teaming LLM…
Out-Of-Tree Llama Stack Eval Provider for Red Teaming LLM Systems with Garak - trustyai-explainability/llama-stack-provider-trustyai-garak
GitHub监控消息提醒!!!
更新了:RCE
描述:Interactive visualization explaining React Server Components, Flight Protocol, and the React2Shell (CVE-2025-55182) RCE vulnerability.
URL:https://github.com/VolksRat71/react2shellexploitvisualized
标签:#RCE
更新了:RCE
描述:Interactive visualization explaining React Server Components, Flight Protocol, and the React2Shell (CVE-2025-55182) RCE vulnerability.
URL:https://github.com/VolksRat71/react2shellexploitvisualized
标签:#RCE
GitHub
GitHub - VolksRat71/react2shellexploitvisualized: Interactive visualization of the React2Shell (CVE-2025-55182) RCE vulnerability…
Interactive visualization of the React2Shell (CVE-2025-55182) RCE vulnerability with narrated animations for three audiences: Expert, Practitioner, and Stakeholder. Audio synced via ElevenLabs + W...
GitHub监控消息提醒!!!
更新了:RCE
描述:Modified ruby script for RCE
URL:https://github.com/7s26simon/CVE-2013-0156
标签:#RCE
更新了:RCE
描述:Modified ruby script for RCE
URL:https://github.com/7s26simon/CVE-2013-0156
标签:#RCE
GitHub
GitHub - 7s26simon/CVE-2013-0156: Modified ruby script for RCE
Modified ruby script for RCE. Contribute to 7s26simon/CVE-2013-0156 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/j0lt-github/react2shell-burp
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/j0lt-github/react2shell-burp
标签:#CVE-2025
GitHub
GitHub - j0lt-github/react2shell-burp: Burp Suite extension for identifying the React Server Components unsafe deserialization…
Burp Suite extension for identifying the React Server Components unsafe deserialization vulnerability (React2Shell / CVE-2025-55182). It provides a focused UI tab, context-menu actions, active-scan...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A CVE-2025-55183 secret miner
URL:https://github.com/Saturate/CVE-2025-55183
标签:#CVE-2025
更新了:CVE-2025
描述:A CVE-2025-55183 secret miner
URL:https://github.com/Saturate/CVE-2025-55183
标签:#CVE-2025
GitHub
GitHub - Saturate/CVE-2025-55183: A CVE-2025-55183 secret miner
A CVE-2025-55183 secret miner. Contribute to Saturate/CVE-2025-55183 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 payload
URL:https://github.com/IrsyadSEC/CVE-2025-55182-MassPayloadAttack
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 payload
URL:https://github.com/IrsyadSEC/CVE-2025-55182-MassPayloadAttack
标签:#CVE-2025
GitHub
GitHub - IrsyadSEC/CVE-2025-55182-MassPayloadAttack: CVE-2025-55182 payload
CVE-2025-55182 payload. Contribute to IrsyadSEC/CVE-2025-55182-MassPayloadAttack development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/securityforge/RemoteMouse-3.008-Exploit
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/securityforge/RemoteMouse-3.008-Exploit
标签:#RCE
GitHub
GitHub - securityforge/RemoteMouse-3.008-Exploit: This repository documents a security research analysis of the RemoteMouse 3.008…
This repository documents a security research analysis of the RemoteMouse 3.008 vulnerability, which allowed remote code execution (RCE) on systems running the affected version of the RemoteMouse d...
GitHub监控消息提醒!!!
更新了:漏洞挖掘
描述:Personal Blog/主记录漏洞挖掘相关研究(文章位于issues)
URL:https://github.com/xinali/articles
标签:#漏洞挖掘
更新了:漏洞挖掘
描述:Personal Blog/主记录漏洞挖掘相关研究(文章位于issues)
URL:https://github.com/xinali/articles
标签:#漏洞挖掘
GitHub
GitHub - xinali/articles: Personal Blog/主记录漏洞挖掘相关研究(文章位于issues)
Personal Blog/主记录漏洞挖掘相关研究(文章位于issues). Contribute to xinali/articles development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Checks if your JS vulnerable to React2Shell (CVE-2025-55182) or not.
URL:https://github.com/shyam-chauhan/react2shell_check
标签:#CVE-2025
更新了:CVE-2025
描述:Checks if your JS vulnerable to React2Shell (CVE-2025-55182) or not.
URL:https://github.com/shyam-chauhan/react2shell_check
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Batch upgrade all your Next.js apps to patched versions - fight back against CVE-2025-55183/55184/67779
URL:https://github.com/williavs/nextjs-security-update
标签:#CVE-2025
更新了:CVE-2025
描述:Batch upgrade all your Next.js apps to patched versions - fight back against CVE-2025-55183/55184/67779
URL:https://github.com/williavs/nextjs-security-update
标签:#CVE-2025
GitHub
GitHub - williavs/nextjs-security-update: Batch upgrade all your Next.js apps to patched versions - fight back against CVE-2025…
Batch upgrade all your Next.js apps to patched versions - fight back against CVE-2025-55183/55184/67779 - williavs/nextjs-security-update
GitHub监控消息提醒!!!
更新了:渗透测试
描述:TL-NodeJsShell 是一个为安全专业人员和渗透测试人员设计的综合性 WebShell 管理平台。它提供了一个现代化的 Web 界面,用于管理基于 Node.js 的 Shell,具有内存马注入、命令执行、文件管理和代理支持等高级功能。
URL:https://github.com/tianlusec/TL-NodeJsShell
标签:#渗透测试
更新了:渗透测试
描述:TL-NodeJsShell 是一个为安全专业人员和渗透测试人员设计的综合性 WebShell 管理平台。它提供了一个现代化的 Web 界面,用于管理基于 Node.js 的 Shell,具有内存马注入、命令执行、文件管理和代理支持等高级功能。
URL:https://github.com/tianlusec/TL-NodeJsShell
标签:#渗透测试
GitHub
GitHub - tianlusec/TL-NodeJsShell: TL-NodeJsShell 是一个为安全专业人员和渗透测试人员设计的综合性 WebShell 管理平台。它提供了一个现代化的 Web 界面,用于管理基于 Node.js 的 She…
TL-NodeJsShell 是一个为安全专业人员和渗透测试人员设计的综合性 WebShell 管理平台。它提供了一个现代化的 Web 界面,用于管理基于 Node.js 的 Shell,具有内存马注入、命令执行、文件管理和代理支持等高级功能。 - tianlusec/TL-NodeJsShell
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Passive detection for CVE-2025-58360
URL:https://github.com/rxerium/CVE-2025-58360
标签:#CVE-2025
更新了:CVE-2025
描述:Passive detection for CVE-2025-58360
URL:https://github.com/rxerium/CVE-2025-58360
标签:#CVE-2025
GitHub
GitHub - rxerium/CVE-2025-58360: Passive detection for CVE-2025-58360
Passive detection for CVE-2025-58360. Contribute to rxerium/CVE-2025-58360 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55183 POC
URL:https://github.com/X-Cotang/CVE-2025-55183_POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55183 POC
URL:https://github.com/X-Cotang/CVE-2025-55183_POC
标签:#CVE-2025
GitHub
GitHub - X-Cotang/CVE-2025-55183_POC: CVE-2025-55183 POC
CVE-2025-55183 POC. Contribute to X-Cotang/CVE-2025-55183_POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-13780
URL:https://github.com/meenakshisl/PoC-CVE-2025-13780
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-13780
URL:https://github.com/meenakshisl/PoC-CVE-2025-13780
标签:#CVE-2025
GitHub
GitHub - meenakshisl/PoC-CVE-2025-13780: PoC for CVE-2025-13780
PoC for CVE-2025-13780. Contribute to meenakshisl/PoC-CVE-2025-13780 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24367 - Cacti Authenticated Graph Template RCE
URL:https://github.com/r0tn3x/CVE-2025-24367
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24367 - Cacti Authenticated Graph Template RCE
URL:https://github.com/r0tn3x/CVE-2025-24367
标签:#CVE-2025
GitHub
GitHub - r0tn3x/CVE-2025-24367: CVE-2025-24367 - Cacti Authenticated Graph Template RCE
CVE-2025-24367 - Cacti Authenticated Graph Template RCE - r0tn3x/CVE-2025-24367
GitHub监控消息提醒!!!
更新了:绕过
描述:接入DeepSeek,自动输入iwrite作文需求,自动生成作文,并且可绕过复制粘贴禁用
URL:https://github.com/FengZi1221/iwrite-deepseek
标签:#绕过
更新了:绕过
描述:接入DeepSeek,自动输入iwrite作文需求,自动生成作文,并且可绕过复制粘贴禁用
URL:https://github.com/FengZi1221/iwrite-deepseek
标签:#绕过
GitHub
GitHub - FengZi1221/iwrite-deepseek: 接入DeepSeek,自动输入iwrite作文需求,自动生成作文,并且可绕过复制粘贴禁用
接入DeepSeek,自动输入iwrite作文需求,自动生成作文,并且可绕过复制粘贴禁用. Contribute to FengZi1221/iwrite-deepseek development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/gpt5mirrors/gemini3prochinese
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/gpt5mirrors/gemini3prochinese
标签:#护网
GitHub
GitHub - gpt5mirrors/gemini3prochinese: 国内 AI 爱好者必备!解锁谷歌 Gemini 3 Pro/Nano 及 GPT-5 等顶尖模型 厌倦了复杂的科学上网步骤?还在为无法体验 谷歌 Gemini 3 Pro 等国际顶级…
国内 AI 爱好者必备!解锁谷歌 Gemini 3 Pro/Nano 及 GPT-5 等顶尖模型 厌倦了复杂的科学上网步骤?还在为无法体验 谷歌 Gemini 3 Pro 等国际顶级 AI 模型而苦恼吗?我们为您带来了全网最新、最稳定的 Gemini 中文版镜像网站 国内使用入口!本站提供由“大可AI”团队维护的高速、免费体验平台,一键直达 Gemini 3 Pro、Gemini Nano,...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 の検証用
URL:https://github.com/oguri-souhei/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 の検証用
URL:https://github.com/oguri-souhei/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - oguri-souhei/CVE-2025-55182: CVE-2025-55182 の検証用
CVE-2025-55182 の検証用. Contribute to oguri-souhei/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Advanced Exploitation Toolkit for Next.js Server Actions (CVE-2025-55182)
URL:https://github.com/xalgord/React2Shell
标签:#RCE
更新了:RCE
描述:Advanced Exploitation Toolkit for Next.js Server Actions (CVE-2025-55182)
URL:https://github.com/xalgord/React2Shell
标签:#RCE
GitHub
GitHub - xalgord/React2Shell: Advanced Exploitation Toolkit for Next.js Server Actions (CVE-2025-55182)
Advanced Exploitation Toolkit for Next.js Server Actions (CVE-2025-55182) - xalgord/React2Shell