GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Sigma detection rules for Windows threats, including WinRAR CVE-2025-6218 exploitation techniques, designed for SOC and CTI use.
URL:https://github.com/eaizy/react2hulud-scan
标签:#CVE-2025
更新了:CVE-2025
描述:Sigma detection rules for Windows threats, including WinRAR CVE-2025-6218 exploitation techniques, designed for SOC and CTI use.
URL:https://github.com/eaizy/react2hulud-scan
标签:#CVE-2025
GitHub
GitHub - eaizy/react2hulud-scan: AI agent-ready prompt to scan Node.js/React/Next.js projects for Shai-Hulud 2.0 (npm worm) and…
AI agent-ready prompt to scan Node.js/React/Next.js projects for Shai-Hulud 2.0 (npm worm) and React2Shell (CVE-2025-55182 RCE). Guides AI agents (Claude, Gemini, Grok, etc.) to check dependencies,...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Security testing toolkit for CVE-2025-55182 - React Server Components RCE via prototype pollution. Includes CLI scanner, Chrome extension, Nuclei templates, and Docker lab with CTF flags.
URL:https://github.com/sho-luv/React2Shell
标签:#CVE-2025
更新了:CVE-2025
描述:Security testing toolkit for CVE-2025-55182 - React Server Components RCE via prototype pollution. Includes CLI scanner, Chrome extension, Nuclei templates, and Docker lab with CTF flags.
URL:https://github.com/sho-luv/React2Shell
标签:#CVE-2025
GitHub
GitHub - sho-luv/React2Shell: CVE-2025-55182 security test kit: CLI scanner + Chrome extension + Nuclei templates + Docker lab.
CVE-2025-55182 security test kit: CLI scanner + Chrome extension + Nuclei templates + Docker lab. - sho-luv/React2Shell
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ Audit your Next.js & React Server Components stack for critical vulnerabilities (CVE-2025-66478, CVE-2025-55184). Detects risks & generates fix commands. 100% Client-side.
URL:https://github.com/abdozkaya/rsc-security-auditor
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ Audit your Next.js & React Server Components stack for critical vulnerabilities (CVE-2025-66478, CVE-2025-55184). Detects risks & generates fix commands. 100% Client-side.
URL:https://github.com/abdozkaya/rsc-security-auditor
标签:#CVE-2025
GitHub
GitHub - abdozkaya/rsc-security-auditor: 🛡️ Audit your Next.js & React Server Components stack for critical vulnerabilities (CVE…
🛡️ Audit your Next.js & React Server Components stack for critical vulnerabilities (CVE-2025-66478, CVE-2025-55184). Detects risks & generates fix commands. 100% Client-side. - abdo...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/TheStingR/ReactOOPS-WriteUp
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/TheStingR/ReactOOPS-WriteUp
标签:#CVE-2025
GitHub
GitHub - TheStingR/ReactOOPS-WriteUp: Hack The Box Writeup for Retired Challenge ReactOOPS - Complete solution and educational…
Hack The Box Writeup for Retired Challenge ReactOOPS - Complete solution and educational guide to CVE-2025-55182/CVE-2025-66478 (React2Shell RCE). Includes detailed vulnerability analysis, exploita...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:SQL Injection in krishanmuraiji SMS v1.0 (CVE-2025-66947)
URL:https://github.com/kabir0104k/CVE-2025-66947
标签:#CVE-2025
更新了:CVE-2025
描述:SQL Injection in krishanmuraiji SMS v1.0 (CVE-2025-66947)
URL:https://github.com/kabir0104k/CVE-2025-66947
标签:#CVE-2025
GitHub
GitHub - kabir0104k/CVE-2025-66947: SQL Injection in krishanmuraiji SMS v1.0 (CVE-2025-66947)
SQL Injection in krishanmuraiji SMS v1.0 (CVE-2025-66947) - kabir0104k/CVE-2025-66947
👍1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/ThemeHackers/CVE-2025-54100
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/ThemeHackers/CVE-2025-54100
标签:#CVE-2025
GitHub
GitHub - ThemeHackers/CVE-2025-54100: CVE-2025-54100 (CVSS 7.8 High) is a command injection vulnerability in the Invoke-WebRequest…
CVE-2025-54100 (CVSS 7.8 High) is a command injection vulnerability in the Invoke-WebRequest cmdlet of Windows PowerShell 5.1. It arises from improper neutralization of special elements during the ...
GitHub监控消息提醒!!!
更新了:Red Team
描述:🛡 Automate reconnaissance and analysis with RedTeam Scanner v2, featuring essential tools for efficient pentesting and Red Team operations.
URL:https://github.com/mallahashok9239/Red-Team-Scaner-V2
标签:#Red Team
更新了:Red Team
描述:🛡 Automate reconnaissance and analysis with RedTeam Scanner v2, featuring essential tools for efficient pentesting and Red Team operations.
URL:https://github.com/mallahashok9239/Red-Team-Scaner-V2
标签:#Red Team
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:企业资产漏洞扫描与资产管理平台,集成了多个知名安全工具,子域名爆破,端口扫描,站点发现,目录扫描,爬虫,漏洞扫描
URL:https://github.com/yyhuni/xingrin
标签:#漏洞扫描
更新了:漏洞扫描
描述:企业资产漏洞扫描与资产管理平台,集成了多个知名安全工具,子域名爆破,端口扫描,站点发现,目录扫描,爬虫,漏洞扫描
URL:https://github.com/yyhuni/xingrin
标签:#漏洞扫描
GitHub
GitHub - yyhuni/xingrin: src资产管理漏洞扫描平台,子域名爆破,端口扫描,站点发现,目录扫描,爬虫,漏洞扫描
src资产管理漏洞扫描平台,子域名爆破,端口扫描,站点发现,目录扫描,爬虫,漏洞扫描. Contribute to yyhuni/xingrin development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A CLI tool to exploit prototype pollution vulnerabilities in React Server Components / Server Actions (CVE-2025-55182 & CVE-2025-66478), enabling remote code execution (RCE) on vulnerable servers.
URL:https://github.com/mantvmass/react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:A CLI tool to exploit prototype pollution vulnerabilities in React Server Components / Server Actions (CVE-2025-55182 & CVE-2025-66478), enabling remote code execution (RCE) on vulnerable servers.
URL:https://github.com/mantvmass/react2shell
标签:#CVE-2025
GitHub
GitHub - mantvmass/react2shell: A CLI tool that exploits vulnerabilities in React Server Components and Server Actions (CVE-2025…
A CLI tool that exploits vulnerabilities in React Server Components and Server Actions (CVE-2025-55182, CVE-2025-66478) to achieve remote code execution (RCE) on vulnerable servers. - mantvmass/rea...
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/kevin5771323/6xM2kGx7nd
标签:#应急响应
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/kevin5771323/6xM2kGx7nd
标签:#应急响应
GitHub
GitHub - kevin5771323/6xM2kGx7nd: 本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建…
本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。 - kevin5771323/6xM2kGx7nd
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A CVE-2025-55182(React2Shell) Toolbox Application
URL:https://github.com/MoLeft/React2Shell-Toolbox
标签:#CVE-2025
更新了:CVE-2025
描述:A CVE-2025-55182(React2Shell) Toolbox Application
URL:https://github.com/MoLeft/React2Shell-Toolbox
标签:#CVE-2025
GitHub
GitHub - MoLeft/React2Shell-Toolbox: A CVE-2025-55182(React2Shell) Toolbox Application
A CVE-2025-55182(React2Shell) Toolbox Application. Contribute to MoLeft/React2Shell-Toolbox development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A research report on CVE-2025-55182 (React2Shell).
URL:https://github.com/Kugelbyte/React2Shell-Analysis
标签:#CVE-2025
更新了:CVE-2025
描述:A research report on CVE-2025-55182 (React2Shell).
URL:https://github.com/Kugelbyte/React2Shell-Analysis
标签:#CVE-2025
GitHub
GitHub - Kugelbyte/React2Shell-Analysis: A research report on CVE-2025-55182 (React2Shell).
A research report on CVE-2025-55182 (React2Shell). - GitHub - Kugelbyte/React2Shell-Analysis: A research report on CVE-2025-55182 (React2Shell).
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A hands-on lab for understanding and exploiting CVE-2025-55182 (React2Shell) - Remote Code Execution in React Server Components
URL:https://github.com/dhananjayakumarn/CVE-2025-55182-Lab
标签:#CVE-2025
更新了:CVE-2025
描述:A hands-on lab for understanding and exploiting CVE-2025-55182 (React2Shell) - Remote Code Execution in React Server Components
URL:https://github.com/dhananjayakumarn/CVE-2025-55182-Lab
标签:#CVE-2025
GitHub
GitHub - dhananjayakumarn/CVE-2025-55182-Lab: A hands-on lab for understanding and exploiting CVE-2025-55182 (React2Shell) - Remote…
A hands-on lab for understanding and exploiting CVE-2025-55182 (React2Shell) - Remote Code Execution in React Server Components - dhananjayakumarn/CVE-2025-55182-Lab
GitHub监控消息提醒!!!
更新了:RCE
描述:High-performance Go implementation for detecting React Server Components RCE vulnerabilities (CVE-2025-55182 & CVE-2025-66478).
URL:https://github.com/h0tak88r/next88
标签:#RCE
更新了:RCE
描述:High-performance Go implementation for detecting React Server Components RCE vulnerabilities (CVE-2025-55182 & CVE-2025-66478).
URL:https://github.com/h0tak88r/next88
标签:#RCE
GitHub
GitHub - h0tak88r/next88: High-performance Go implementation for detecting React Server Components RCE vulnerabilities (CVE-2025…
High-performance Go implementation for detecting React Server Components RCE vulnerabilities (CVE-2025-55182 & CVE-2025-66478). - h0tak88r/next88
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC for Microsoft Amplifier CLI RCE vulnerability via malicious project configuration
URL:https://github.com/nebariai/MicrosoftAmplifierPoC
标签:#RCE
更新了:RCE
描述:PoC for Microsoft Amplifier CLI RCE vulnerability via malicious project configuration
URL:https://github.com/nebariai/MicrosoftAmplifierPoC
标签:#RCE
GitHub
GitHub - nebariai/MicrosoftAmplifierPoC: PoC for Microsoft Amplifier CLI RCE vulnerability via malicious project configuration
PoC for Microsoft Amplifier CLI RCE vulnerability via malicious project configuration - nebariai/MicrosoftAmplifierPoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:NodeJS-based exploit script and scanner for the React Server Components \"React2Shell\" vulnerability (CVE-2025-55182).
URL:https://github.com/sangleshubham/React-Security-CVE-2025-55182-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:NodeJS-based exploit script and scanner for the React Server Components \"React2Shell\" vulnerability (CVE-2025-55182).
URL:https://github.com/sangleshubham/React-Security-CVE-2025-55182-Exploit
标签:#CVE-2025
GitHub
GitHub - sangleshubham/React-Security-CVE-2025-55182-Exploit: NodeJS-based exploit script and scanner for the React Server Components…
NodeJS-based exploit script and scanner for the React Server Components "React2Shell" vulnerability (CVE-2025-55182). - sangleshubham/React-Security-CVE-2025-55182-Exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A hybrid security scanner for detecting CVE-2025-55182 in Next.js and Waku applications. Features combined static code analysis and safe dynamic verification for DevSecOps workflows.
URL:https://github.com/TrixSec/CVE-2025-55182-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:A hybrid security scanner for detecting CVE-2025-55182 in Next.js and Waku applications. Features combined static code analysis and safe dynamic verification for DevSecOps workflows.
URL:https://github.com/TrixSec/CVE-2025-55182-Scanner
标签:#CVE-2025
GitHub
GitHub - TrixSec/CVE-2025-55182-Scanner: A hybrid security scanner for detecting CVE-2025-55182 in Next.js and Waku applications.…
A hybrid security scanner for detecting CVE-2025-55182 in Next.js and Waku applications. Features combined static code analysis and safe dynamic verification for DevSecOps workflows. - TrixSec/CVE-...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/cyberleelawat/CVE-2025-55184
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/cyberleelawat/CVE-2025-55184
标签:#CVE-2025
GitHub
GitHub - cyberleelawat/CVE-2025-55184: React Server Components 19.0.0 to 19.2.1 including react-server-dom-parcel, react-server…
React Server Components 19.0.0 to 19.2.1 including react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack contain an insecure deserialization vulnerability caused by unsa...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Python script for Testing CVE-2025-55184
URL:https://github.com/Kajal5414/CVE-2025-55184_Testing
标签:#CVE-2025
更新了:CVE-2025
描述:Python script for Testing CVE-2025-55184
URL:https://github.com/Kajal5414/CVE-2025-55184_Testing
标签:#CVE-2025
GitHub
GitHub - Kajal5414/CVE-2025-55184_Testing: Python script for Testing CVE-2025-55184
Python script for Testing CVE-2025-55184 . Contribute to Kajal5414/CVE-2025-55184_Testing development by creating an account on GitHub.