GitHub监控消息提醒!!!
更新了:渗透测试
描述:一个模型上下文协议(MCP)服务器,将 Kali Linux 安全工具交给 AI使用,用于授权的安全测试和渗透测试。
URL:https://github.com/wooluo/kali-mcp
标签:#渗透测试
更新了:渗透测试
描述:一个模型上下文协议(MCP)服务器,将 Kali Linux 安全工具交给 AI使用,用于授权的安全测试和渗透测试。
URL:https://github.com/wooluo/kali-mcp
标签:#渗透测试
GitHub
GitHub - wooluo/kali-mcp: 一个模型上下文协议(MCP)服务器,将 Kali Linux 安全工具交给 AI使用,用于授权的安全测试和渗透测试。
一个模型上下文协议(MCP)服务器,将 Kali Linux 安全工具交给 AI使用,用于授权的安全测试和渗透测试。 - wooluo/kali-mcp
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:基于Pocsuite3 框架编写的漏洞验证与利用脚本,用于检测 n8n工作流自动化工具中的认证后远程代码执行漏洞(RCE)
URL:https://github.com/secjoker/CVE-2025-68613
标签:#CVE-2025
更新了:CVE-2025
描述:基于Pocsuite3 框架编写的漏洞验证与利用脚本,用于检测 n8n工作流自动化工具中的认证后远程代码执行漏洞(RCE)
URL:https://github.com/secjoker/CVE-2025-68613
标签:#CVE-2025
GitHub
GitHub - secjoker/CVE-2025-68613: 基于Pocsuite3 框架编写的漏洞验证与利用脚本,用于检测 n8n工作流自动化工具中的认证后远程代码执行漏洞(RCE)
基于Pocsuite3 框架编写的漏洞验证与利用脚本,用于检测 n8n工作流自动化工具中的认证后远程代码执行漏洞(RCE) - secjoker/CVE-2025-68613
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Analysis of CVE-2025-68613
URL:https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab
标签:#CVE-2025
更新了:CVE-2025
描述:Analysis of CVE-2025-68613
URL:https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab
标签:#CVE-2025
GitHub
GitHub - r4j3sh-com/CVE-2025-68613-n8n-lab: Analysis of CVE-2025-68613
Analysis of CVE-2025-68613. Contribute to r4j3sh-com/CVE-2025-68613-n8n-lab development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is a lab for reproducing CVE-2025-55182.
URL:https://github.com/bigbluewhale111/CVE-2025-55182-LAB
标签:#CVE-2025
更新了:CVE-2025
描述:This is a lab for reproducing CVE-2025-55182.
URL:https://github.com/bigbluewhale111/CVE-2025-55182-LAB
标签:#CVE-2025
GitHub
GitHub - bigbluewhale111/CVE-2025-55182-LAB: This is a lab for reproducing CVE-2025-55182.
This is a lab for reproducing CVE-2025-55182. Contribute to bigbluewhale111/CVE-2025-55182-LAB development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:🛡️ Explore CVE-2025-55182, a critical RCE vulnerability in React's Flight Protocol, demonstrating exploitation techniques and mitigation strategies.
URL:https://github.com/Farhan9488/CVE-2025-55182-research
标签:#RCE
更新了:RCE
描述:🛡️ Explore CVE-2025-55182, a critical RCE vulnerability in React's Flight Protocol, demonstrating exploitation techniques and mitigation strategies.
URL:https://github.com/Farhan9488/CVE-2025-55182-research
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:GUI Shodan-powered scanner to identify n8n instances exposed to CVE-2025-68613 (version range 0.211.0–1.122.0)
URL:https://github.com/manyaigdtuw/CVE-2025-68613_shodan-scanner_n8n
标签:#CVE-2025
更新了:CVE-2025
描述:GUI Shodan-powered scanner to identify n8n instances exposed to CVE-2025-68613 (version range 0.211.0–1.122.0)
URL:https://github.com/manyaigdtuw/CVE-2025-68613_shodan-scanner_n8n
标签:#CVE-2025
GitHub
GitHub - manyaigdtuw/CVE-2025-68613_shodan-scanner_n8n: GUI Shodan-powered scanner to identify n8n instances exposed to CVE-2025…
GUI Shodan-powered scanner to identify n8n instances exposed to CVE-2025-68613 (version range 0.211.0–1.122.0) - manyaigdtuw/CVE-2025-68613_shodan-scanner_n8n
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing remote code execution without authentication.
URL:https://github.com/Ghost121111/Blackash-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing remote code execution without authentication.
URL:https://github.com/Ghost121111/Blackash-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Ghost121111/Blackash-CVE-2025-55182: 🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing…
🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing remote code execution without authentication. - Ghost121111/Blackash-CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution via prototype chain pollution in `react-server-dom-webpack@19.0.0`.
URL:https://github.com/slreaperking/CVE-2025-55182-poc
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution via prototype chain pollution in `react-server-dom-webpack@19.0.0`.
URL:https://github.com/slreaperking/CVE-2025-55182-poc
标签:#CVE-2025
GitHub
GitHub - slreaperking/CVE-2025-55182-poc: 🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution…
🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution via prototype chain pollution in `react-server-dom-webpack@19.0.0`. - slreaperking/CVE-2025-55182-poc
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit and scan for CVE-2025-55182, a critical React/Next.js vulnerability enabling remote code execution through prototype pollution techniques.
URL:https://github.com/phornnato/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit and scan for CVE-2025-55182, a critical React/Next.js vulnerability enabling remote code execution through prototype pollution techniques.
URL:https://github.com/phornnato/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - phornnato/CVE-2025-55182: 🚨 Exploit and scan for CVE-2025-55182, a critical React/Next.js vulnerability enabling remote…
🚨 Exploit and scan for CVE-2025-55182, a critical React/Next.js vulnerability enabling remote code execution through prototype pollution techniques. - phornnato/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:信息收集
描述:1. (简答题) 要求根据EditText,CheckBox,RadioButton,Spinner,并用这些控件做一个学生信息收集页面。 或者一个注册界面,注册信息包括:学号,姓名,性别(单选),兴趣爱好(多选),界面中由提交按钮和推出按钮。当点提交按钮时,会收集界面中的信息并输出在log中,点击退出 按钮时结束程序。
URL:https://github.com/Dovebggs/BGGS
标签:#信息收集
更新了:信息收集
描述:1. (简答题) 要求根据EditText,CheckBox,RadioButton,Spinner,并用这些控件做一个学生信息收集页面。 或者一个注册界面,注册信息包括:学号,姓名,性别(单选),兴趣爱好(多选),界面中由提交按钮和推出按钮。当点提交按钮时,会收集界面中的信息并输出在log中,点击退出 按钮时结束程序。
URL:https://github.com/Dovebggs/BGGS
标签:#信息收集
GitHub
Dovebggs/BGGS
1. (简答题) 要求根据EditText,CheckBox,RadioButton,Spinner,并用这些控件做一个学生信息收集页面。 或者一个注册界面,注册信息包括:学号,姓名,性别(单选),兴趣爱好(多选),界面中由提交按钮和推出按钮。当点提交按钮时,会收集界面中的信息并输出在log中,点击退出 按钮时结束程序。 - Dovebggs/BGGS
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A evolved version of assetnote CVE-2025-55182 scanner
URL:https://github.com/guiimoraes/react2shell-evolved
标签:#CVE-2025
更新了:CVE-2025
描述:A evolved version of assetnote CVE-2025-55182 scanner
URL:https://github.com/guiimoraes/react2shell-evolved
标签:#CVE-2025
GitHub
GitHub - guiimoraes/react2shell-evolved: A evolved version of assetnote CVE-2025-55182 scanner
A evolved version of assetnote CVE-2025-55182 scanner - guiimoraes/react2shell-evolved
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool that helps detect critical vulnerabilities in your applications.
URL:https://github.com/mayank729/CVE-2025-55182-scanner
标签:#RCE
更新了:RCE
描述:🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool that helps detect critical vulnerabilities in your applications.
URL:https://github.com/mayank729/CVE-2025-55182-scanner
标签:#RCE
GitHub
GitHub - mayank729/CVE-2025-55182-scanner: 🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool…
🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool that helps detect critical vulnerabilities in your applications. - mayank729/CVE-2025-55182-scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A denial-of-service vulnerability in the AuntyFey BLE smart padlock allows unauthenticated connection floods to lock out legitimate users. CVE-2025-34462.
URL:https://github.com/NSM-Barii/CVE-2025-34462
标签:#CVE-2025
更新了:CVE-2025
描述:A denial-of-service vulnerability in the AuntyFey BLE smart padlock allows unauthenticated connection floods to lock out legitimate users. CVE-2025-34462.
URL:https://github.com/NSM-Barii/CVE-2025-34462
标签:#CVE-2025
GitHub
GitHub - NSM-Barii/CVE-2025-34462: Proof‑of‑Concept for unauthenticated BLE DoS on smart lock
Proof‑of‑Concept for unauthenticated BLE DoS on smart lock - NSM-Barii/CVE-2025-34462
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
URL:https://github.com/xgbtxy/Burp-Entropy-Reducer
标签:#渗透测试
更新了:渗透测试
描述:Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
URL:https://github.com/xgbtxy/Burp-Entropy-Reducer
标签:#渗透测试
GitHub
GitHub - xgbtxy/Burp-Entropy-Reducer: Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。 - xgbtxy/Burp-Entropy-Reducer
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/baktistr/cve-2025-59532-poc
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/baktistr/cve-2025-59532-poc
标签:#CVE-2025
GitHub
GitHub - baktistr/cve-2025-59532-poc: A Docker-based research environment for analyzing CVE-2025-59532, a path traversal vulnerability…
A Docker-based research environment for analyzing CVE-2025-59532, a path traversal vulnerability in OpenAI Codex CLI that allows arbitrary file write outside the intended workspace sandbox. Part of...
GitHub监控消息提醒!!!
更新了:RCE
描述:This exploit script is designed to simplify exploitation of the Erlang/OTP SSH vulnerability CVE-2025-32433 in the TryHackMe lab environment.
URL:https://github.com/giriaryan694-a11y/cve-2025-32433_rce_exploit
标签:#RCE
更新了:RCE
描述:This exploit script is designed to simplify exploitation of the Erlang/OTP SSH vulnerability CVE-2025-32433 in the TryHackMe lab environment.
URL:https://github.com/giriaryan694-a11y/cve-2025-32433_rce_exploit
标签:#RCE
GitHub
GitHub - giriaryan694-a11y/cve-2025-32433_rce_exploit: This exploit script is designed to simplify exploitation of the Erlang/OTP…
This exploit script is designed to simplify exploitation of the Erlang/OTP SSH vulnerability CVE-2025-32433 in the TryHackMe lab environment. - giriaryan694-a11y/cve-2025-32433_rce_exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner.
URL:https://github.com/meneim99/react2shell-scanner
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner.
URL:https://github.com/meneim99/react2shell-scanner
标签:#CVE-2025
GitHub
GitHub - meneim99/react2shell-scanner: 🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable…
🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner. - meneim99/react2shell-scanner
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一款轻量级的CTF/渗透测试Fuzz工具,专为URL/输入框的字符模糊测试设计,支持多编码方式、多线程、代理转发等功能,适配CTF竞赛和渗透测试中的字符注入检测场景。
URL:https://github.com/qqstar221/Ryzf
标签:#渗透测试
更新了:渗透测试
描述:一款轻量级的CTF/渗透测试Fuzz工具,专为URL/输入框的字符模糊测试设计,支持多编码方式、多线程、代理转发等功能,适配CTF竞赛和渗透测试中的字符注入检测场景。
URL:https://github.com/qqstar221/Ryzf
标签:#渗透测试
GitHub
GitHub - qqstar221/Ryzf: 一款轻量级的CTF/渗透测试Fuzz工具,专为URL/输入框的字符模糊测试设计,支持多编码方式、多线程、代理转发等功能,适配CTF竞赛和渗透测试中的字符注入检测场景。
一款轻量级的CTF/渗透测试Fuzz工具,专为URL/输入框的字符模糊测试设计,支持多编码方式、多线程、代理转发等功能,适配CTF竞赛和渗透测试中的字符注入检测场景。 - qqstar221/Ryzf
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Remote Code Execution via n8n Workflows (Based on CVE-2025-68613)
URL:https://github.com/AbdulRKB/n8n-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:Remote Code Execution via n8n Workflows (Based on CVE-2025-68613)
URL:https://github.com/AbdulRKB/n8n-RCE
标签:#CVE-2025
GitHub
GitHub - AbdulRKB/n8n-RCE: Remote Code Execution via n8n Workflows (Based on CVE-2025-68613)
Remote Code Execution via n8n Workflows (Based on CVE-2025-68613) - AbdulRKB/n8n-RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from insecure prototype references in Next.js applications.
URL:https://github.com/Mayca369/CVE-2025-55182
标签:#RCE
更新了:RCE
描述:🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from insecure prototype references in Next.js applications.
URL:https://github.com/Mayca369/CVE-2025-55182
标签:#RCE
GitHub
GitHub - Mayca369/CVE-2025-55182: 🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from…
🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from insecure prototype references in Next.js applications. - Mayca369/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated arbitrary code execution.
URL:https://github.com/wiixx44/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated arbitrary code execution.
URL:https://github.com/wiixx44/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - wiixx44/CVE-2025-55182: 🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated…
🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated arbitrary code execution. - wiixx44/CVE-2025-55182