GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Analysis of CVE-2025-68613
URL:https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab
标签:#CVE-2025
更新了:CVE-2025
描述:Analysis of CVE-2025-68613
URL:https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab
标签:#CVE-2025
GitHub
GitHub - r4j3sh-com/CVE-2025-68613-n8n-lab: Analysis of CVE-2025-68613
Analysis of CVE-2025-68613. Contribute to r4j3sh-com/CVE-2025-68613-n8n-lab development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This is a lab for reproducing CVE-2025-55182.
URL:https://github.com/bigbluewhale111/CVE-2025-55182-LAB
标签:#CVE-2025
更新了:CVE-2025
描述:This is a lab for reproducing CVE-2025-55182.
URL:https://github.com/bigbluewhale111/CVE-2025-55182-LAB
标签:#CVE-2025
GitHub
GitHub - bigbluewhale111/CVE-2025-55182-LAB: This is a lab for reproducing CVE-2025-55182.
This is a lab for reproducing CVE-2025-55182. Contribute to bigbluewhale111/CVE-2025-55182-LAB development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:🛡️ Explore CVE-2025-55182, a critical RCE vulnerability in React's Flight Protocol, demonstrating exploitation techniques and mitigation strategies.
URL:https://github.com/Farhan9488/CVE-2025-55182-research
标签:#RCE
更新了:RCE
描述:🛡️ Explore CVE-2025-55182, a critical RCE vulnerability in React's Flight Protocol, demonstrating exploitation techniques and mitigation strategies.
URL:https://github.com/Farhan9488/CVE-2025-55182-research
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:GUI Shodan-powered scanner to identify n8n instances exposed to CVE-2025-68613 (version range 0.211.0–1.122.0)
URL:https://github.com/manyaigdtuw/CVE-2025-68613_shodan-scanner_n8n
标签:#CVE-2025
更新了:CVE-2025
描述:GUI Shodan-powered scanner to identify n8n instances exposed to CVE-2025-68613 (version range 0.211.0–1.122.0)
URL:https://github.com/manyaigdtuw/CVE-2025-68613_shodan-scanner_n8n
标签:#CVE-2025
GitHub
GitHub - manyaigdtuw/CVE-2025-68613_shodan-scanner_n8n: GUI Shodan-powered scanner to identify n8n instances exposed to CVE-2025…
GUI Shodan-powered scanner to identify n8n instances exposed to CVE-2025-68613 (version range 0.211.0–1.122.0) - manyaigdtuw/CVE-2025-68613_shodan-scanner_n8n
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing remote code execution without authentication.
URL:https://github.com/Ghost121111/Blackash-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing remote code execution without authentication.
URL:https://github.com/Ghost121111/Blackash-CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - Ghost121111/Blackash-CVE-2025-55182: 🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing…
🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing remote code execution without authentication. - Ghost121111/Blackash-CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution via prototype chain pollution in `react-server-dom-webpack@19.0.0`.
URL:https://github.com/slreaperking/CVE-2025-55182-poc
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution via prototype chain pollution in `react-server-dom-webpack@19.0.0`.
URL:https://github.com/slreaperking/CVE-2025-55182-poc
标签:#CVE-2025
GitHub
GitHub - slreaperking/CVE-2025-55182-poc: 🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution…
🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution via prototype chain pollution in `react-server-dom-webpack@19.0.0`. - slreaperking/CVE-2025-55182-poc
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit and scan for CVE-2025-55182, a critical React/Next.js vulnerability enabling remote code execution through prototype pollution techniques.
URL:https://github.com/phornnato/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit and scan for CVE-2025-55182, a critical React/Next.js vulnerability enabling remote code execution through prototype pollution techniques.
URL:https://github.com/phornnato/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - phornnato/CVE-2025-55182: 🚨 Exploit and scan for CVE-2025-55182, a critical React/Next.js vulnerability enabling remote…
🚨 Exploit and scan for CVE-2025-55182, a critical React/Next.js vulnerability enabling remote code execution through prototype pollution techniques. - phornnato/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:信息收集
描述:1. (简答题) 要求根据EditText,CheckBox,RadioButton,Spinner,并用这些控件做一个学生信息收集页面。 或者一个注册界面,注册信息包括:学号,姓名,性别(单选),兴趣爱好(多选),界面中由提交按钮和推出按钮。当点提交按钮时,会收集界面中的信息并输出在log中,点击退出 按钮时结束程序。
URL:https://github.com/Dovebggs/BGGS
标签:#信息收集
更新了:信息收集
描述:1. (简答题) 要求根据EditText,CheckBox,RadioButton,Spinner,并用这些控件做一个学生信息收集页面。 或者一个注册界面,注册信息包括:学号,姓名,性别(单选),兴趣爱好(多选),界面中由提交按钮和推出按钮。当点提交按钮时,会收集界面中的信息并输出在log中,点击退出 按钮时结束程序。
URL:https://github.com/Dovebggs/BGGS
标签:#信息收集
GitHub
Dovebggs/BGGS
1. (简答题) 要求根据EditText,CheckBox,RadioButton,Spinner,并用这些控件做一个学生信息收集页面。 或者一个注册界面,注册信息包括:学号,姓名,性别(单选),兴趣爱好(多选),界面中由提交按钮和推出按钮。当点提交按钮时,会收集界面中的信息并输出在log中,点击退出 按钮时结束程序。 - Dovebggs/BGGS
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A evolved version of assetnote CVE-2025-55182 scanner
URL:https://github.com/guiimoraes/react2shell-evolved
标签:#CVE-2025
更新了:CVE-2025
描述:A evolved version of assetnote CVE-2025-55182 scanner
URL:https://github.com/guiimoraes/react2shell-evolved
标签:#CVE-2025
GitHub
GitHub - guiimoraes/react2shell-evolved: A evolved version of assetnote CVE-2025-55182 scanner
A evolved version of assetnote CVE-2025-55182 scanner - guiimoraes/react2shell-evolved
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool that helps detect critical vulnerabilities in your applications.
URL:https://github.com/mayank729/CVE-2025-55182-scanner
标签:#RCE
更新了:RCE
描述:🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool that helps detect critical vulnerabilities in your applications.
URL:https://github.com/mayank729/CVE-2025-55182-scanner
标签:#RCE
GitHub
GitHub - mayank729/CVE-2025-55182-scanner: 🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool…
🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool that helps detect critical vulnerabilities in your applications. - mayank729/CVE-2025-55182-scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A denial-of-service vulnerability in the AuntyFey BLE smart padlock allows unauthenticated connection floods to lock out legitimate users. CVE-2025-34462.
URL:https://github.com/NSM-Barii/CVE-2025-34462
标签:#CVE-2025
更新了:CVE-2025
描述:A denial-of-service vulnerability in the AuntyFey BLE smart padlock allows unauthenticated connection floods to lock out legitimate users. CVE-2025-34462.
URL:https://github.com/NSM-Barii/CVE-2025-34462
标签:#CVE-2025
GitHub
GitHub - NSM-Barii/CVE-2025-34462: Proof‑of‑Concept for unauthenticated BLE DoS on smart lock
Proof‑of‑Concept for unauthenticated BLE DoS on smart lock - NSM-Barii/CVE-2025-34462
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
URL:https://github.com/xgbtxy/Burp-Entropy-Reducer
标签:#渗透测试
更新了:渗透测试
描述:Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
URL:https://github.com/xgbtxy/Burp-Entropy-Reducer
标签:#渗透测试
GitHub
GitHub - xgbtxy/Burp-Entropy-Reducer: Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。 - xgbtxy/Burp-Entropy-Reducer
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/baktistr/cve-2025-59532-poc
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments.
URL:https://github.com/baktistr/cve-2025-59532-poc
标签:#CVE-2025
GitHub
GitHub - baktistr/cve-2025-59532-poc: A Docker-based research environment for analyzing CVE-2025-59532, a path traversal vulnerability…
A Docker-based research environment for analyzing CVE-2025-59532, a path traversal vulnerability in OpenAI Codex CLI that allows arbitrary file write outside the intended workspace sandbox. Part of...
GitHub监控消息提醒!!!
更新了:RCE
描述:This exploit script is designed to simplify exploitation of the Erlang/OTP SSH vulnerability CVE-2025-32433 in the TryHackMe lab environment.
URL:https://github.com/giriaryan694-a11y/cve-2025-32433_rce_exploit
标签:#RCE
更新了:RCE
描述:This exploit script is designed to simplify exploitation of the Erlang/OTP SSH vulnerability CVE-2025-32433 in the TryHackMe lab environment.
URL:https://github.com/giriaryan694-a11y/cve-2025-32433_rce_exploit
标签:#RCE
GitHub
GitHub - giriaryan694-a11y/cve-2025-32433_rce_exploit: This exploit script is designed to simplify exploitation of the Erlang/OTP…
This exploit script is designed to simplify exploitation of the Erlang/OTP SSH vulnerability CVE-2025-32433 in the TryHackMe lab environment. - giriaryan694-a11y/cve-2025-32433_rce_exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner.
URL:https://github.com/meneim99/react2shell-scanner
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner.
URL:https://github.com/meneim99/react2shell-scanner
标签:#CVE-2025
GitHub
GitHub - meneim99/react2shell-scanner: 🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable…
🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner. - meneim99/react2shell-scanner
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一款轻量级的CTF/渗透测试Fuzz工具,专为URL/输入框的字符模糊测试设计,支持多编码方式、多线程、代理转发等功能,适配CTF竞赛和渗透测试中的字符注入检测场景。
URL:https://github.com/qqstar221/Ryzf
标签:#渗透测试
更新了:渗透测试
描述:一款轻量级的CTF/渗透测试Fuzz工具,专为URL/输入框的字符模糊测试设计,支持多编码方式、多线程、代理转发等功能,适配CTF竞赛和渗透测试中的字符注入检测场景。
URL:https://github.com/qqstar221/Ryzf
标签:#渗透测试
GitHub
GitHub - qqstar221/Ryzf: 一款轻量级的CTF/渗透测试Fuzz工具,专为URL/输入框的字符模糊测试设计,支持多编码方式、多线程、代理转发等功能,适配CTF竞赛和渗透测试中的字符注入检测场景。
一款轻量级的CTF/渗透测试Fuzz工具,专为URL/输入框的字符模糊测试设计,支持多编码方式、多线程、代理转发等功能,适配CTF竞赛和渗透测试中的字符注入检测场景。 - qqstar221/Ryzf
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Remote Code Execution via n8n Workflows (Based on CVE-2025-68613)
URL:https://github.com/AbdulRKB/n8n-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:Remote Code Execution via n8n Workflows (Based on CVE-2025-68613)
URL:https://github.com/AbdulRKB/n8n-RCE
标签:#CVE-2025
GitHub
GitHub - AbdulRKB/n8n-RCE: Remote Code Execution via n8n Workflows (Based on CVE-2025-68613)
Remote Code Execution via n8n Workflows (Based on CVE-2025-68613) - AbdulRKB/n8n-RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from insecure prototype references in Next.js applications.
URL:https://github.com/Mayca369/CVE-2025-55182
标签:#RCE
更新了:RCE
描述:🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from insecure prototype references in Next.js applications.
URL:https://github.com/Mayca369/CVE-2025-55182
标签:#RCE
GitHub
GitHub - Mayca369/CVE-2025-55182: 🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from…
🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from insecure prototype references in Next.js applications. - Mayca369/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated arbitrary code execution.
URL:https://github.com/wiixx44/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated arbitrary code execution.
URL:https://github.com/wiixx44/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - wiixx44/CVE-2025-55182: 🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated…
🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated arbitrary code execution. - wiixx44/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:本项目是一个开源的威胁情报源(Threat Intelligence Feed),数据来源于真实互联网环境部署的高交互蜜罐系统(HFish)。 该系统实时捕获并分析针对 SSH、HTTP、MySQL、Redis 等服务的恶意扫描、暴力破解及漏洞利用行为。经过自动化脚本清洗和白名单过滤后,生成高保真(High Fidelity)的恶意 IP 列表。
URL:https://github.com/yuexuan521/honeypot-blocklist
标签:#漏洞利用
更新了:漏洞利用
描述:本项目是一个开源的威胁情报源(Threat Intelligence Feed),数据来源于真实互联网环境部署的高交互蜜罐系统(HFish)。 该系统实时捕获并分析针对 SSH、HTTP、MySQL、Redis 等服务的恶意扫描、暴力破解及漏洞利用行为。经过自动化脚本清洗和白名单过滤后,生成高保真(High Fidelity)的恶意 IP 列表。
URL:https://github.com/yuexuan521/honeypot-blocklist
标签:#漏洞利用
GitHub
GitHub - yuexuan521/honeypot-blocklist: 本项目是一个开源的威胁情报源(Threat Intelligence Feed),数据来源于真实互联网环境部署的高交互蜜罐系统(HFish)。 该系统实时捕获并分析针对 …
本项目是一个开源的威胁情报源(Threat Intelligence Feed),数据来源于真实互联网环境部署的高交互蜜罐系统(HFish)。 该系统实时捕获并分析针对 SSH、HTTP、MySQL、Redis 等服务的恶意扫描、暴力破解及漏洞利用行为。经过自动化脚本清洗和白名单过滤后,生成高保真(High Fidelity)的恶意 IP 列表。 - yuexuan521/honeypot...
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/small-bears/gyming
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/small-bears/gyming
标签:#护网
GitHub
GitHub - small-bears/gyming: (协同过滤推荐算法)健身房管理系统 java springboot vue ssm mysql python Django vue 健身网站系统(源代码+数据库+配套论文+ppt) 角色:管理员、会员、教练…
(协同过滤推荐算法)健身房管理系统 java springboot vue ssm mysql python Django vue 健身网站系统(源代码+数据库+配套论文+ppt) 角色:管理员、会员、教练 管理员:对系统首页、我的信息、会员管理、教练管理、预约教练管理、器材分类管理、健身器材管理、预约器材管理、器材维护管理、课程分类管理、课程信息管理、报名课程管理、健身指导管理、商品分...