GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploitation script for CVE-2025-55182. This is modified only for my personal use. If you are facing any problem fix it yourself.
URL:https://github.com/0xROI/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Exploitation script for CVE-2025-55182. This is modified only for my personal use. If you are facing any problem fix it yourself.
URL:https://github.com/0xROI/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - 0xROI/CVE-2025-55182: Exploitation script for CVE-2025-55182. This is modified only for my personal use. If you are facing…
Exploitation script for CVE-2025-55182. This is modified only for my personal use. If you are facing any problem fix it yourself. - 0xROI/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-68613 (n8n) Critical RCE analysis + defensive recommendations (patch validation, detection ideas, and hardening tips)
URL:https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-68613 (n8n) Critical RCE analysis + defensive recommendations (patch validation, detection ideas, and hardening tips)
URL:https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis
标签:#CVE-2025
GitHub
GitHub - Ak-cybe/CVE-2025-68613-n8n-rce-analysis: CVE-2025-68613 (n8n) Critical RCE analysis + defensive recommendations (patch…
CVE-2025-68613 (n8n) Critical RCE analysis + defensive recommendations (patch validation, detection ideas, and hardening tips) - Ak-cybe/CVE-2025-68613-n8n-rce-analysis
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-54322 - XSpeeder SXZOS Pre-Auth RCE 0day Finder Quick
URL:https://github.com/Sachinart/CVE-2025-54322
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-54322 - XSpeeder SXZOS Pre-Auth RCE 0day Finder Quick
URL:https://github.com/Sachinart/CVE-2025-54322
标签:#CVE-2025
GitHub
GitHub - Sachinart/CVE-2025-54322: CVE-2025-54322 - XSpeeder SXZOS Pre-Auth RCE 0day Finder Quick
CVE-2025-54322 - XSpeeder SXZOS Pre-Auth RCE 0day Finder Quick - Sachinart/CVE-2025-54322
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:⚡ Discover and exploit CVE-2025-55182 with this PoC, offering reliable remote code execution tests for React Server Components in Next.js.
URL:https://github.com/9988700/CVE-2025-55182-POC-NEXTJS
标签:#CVE-2025
更新了:CVE-2025
描述:⚡ Discover and exploit CVE-2025-55182 with this PoC, offering reliable remote code execution tests for React Server Components in Next.js.
URL:https://github.com/9988700/CVE-2025-55182-POC-NEXTJS
标签:#CVE-2025
GitHub
GitHub - 9988700/CVE-2025-55182-POC-NEXTJS: ⚡ Discover and exploit CVE-2025-55182 with this PoC, offering reliable remote code…
⚡ Discover and exploit CVE-2025-55182 with this PoC, offering reliable remote code execution tests for React Server Components in Next.js. - 9988700/CVE-2025-55182-POC-NEXTJS
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This laboratory provides a controlled environment to analyze and reproduce CVE-2025-68613 in a vulnerable n8n instance.
URL:https://github.com/LingerANR/n8n-CVE-2025-68613
标签:#CVE-2025
更新了:CVE-2025
描述:This laboratory provides a controlled environment to analyze and reproduce CVE-2025-68613 in a vulnerable n8n instance.
URL:https://github.com/LingerANR/n8n-CVE-2025-68613
标签:#CVE-2025
GitHub
GitHub - LingerANR/n8n-CVE-2025-68613: This laboratory provides a controlled environment to analyze and reproduce CVE-2025-68613…
This laboratory provides a controlled environment to analyze and reproduce CVE-2025-68613 in a vulnerable n8n instance. - LingerANR/n8n-CVE-2025-68613
GitHub监控消息提醒!!!
更新了:RCE
描述:⚠️ Explore a vulnerable environment to test security scanners against the CVE-2025-55182 RCE flaw in React Server Components and Next.js applications.
URL:https://github.com/ahmed-dev-op/CVE-2025-55182
标签:#RCE
更新了:RCE
描述:⚠️ Explore a vulnerable environment to test security scanners against the CVE-2025-55182 RCE flaw in React Server Components and Next.js applications.
URL:https://github.com/ahmed-dev-op/CVE-2025-55182
标签:#RCE
GitHub
GitHub - ahmed-dev-op/CVE-2025-55182: ⚠️ Explore a vulnerable environment to test security scanners against the CVE-2025-55182…
⚠️ Explore a vulnerable environment to test security scanners against the CVE-2025-55182 RCE flaw in React Server Components and Next.js applications. - ahmed-dev-op/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:RCE
描述:🚨 Exploit CVE-2025-55182, a critical RCE vulnerability in React Server Components for Next.js apps; enables testing for prototype pollution risks.
URL:https://github.com/iksanwkk/CVE-2025-55182-exp
标签:#RCE
更新了:RCE
描述:🚨 Exploit CVE-2025-55182, a critical RCE vulnerability in React Server Components for Next.js apps; enables testing for prototype pollution risks.
URL:https://github.com/iksanwkk/CVE-2025-55182-exp
标签:#RCE
GitHub
GitHub - iksanwkk/CVE-2025-55182-exp: 🚨 Exploit CVE-2025-55182, a critical RCE vulnerability in React Server Components for Next.js…
🚨 Exploit CVE-2025-55182, a critical RCE vulnerability in React Server Components for Next.js apps; enables testing for prototype pollution risks. - iksanwkk/CVE-2025-55182-exp
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
URL:https://github.com/xgbtxy/Entropy
标签:#渗透测试
更新了:渗透测试
描述:Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
URL:https://github.com/xgbtxy/Entropy
标签:#渗透测试
GitHub
GitHub - xgbtxy/Entropy: Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。 - xgbtxy/Entropy
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
URL:https://github.com/xgbtxy/Negentropy-Collective
标签:#渗透测试
更新了:渗透测试
描述:Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
URL:https://github.com/xgbtxy/Negentropy-Collective
标签:#渗透测试
GitHub
GitHub - xgbtxy/Negentropy-Collective: Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。
Turn raw traffic into structured intelligence. 渗透测试流量的负熵实现与 AI 预处理组件。 - xgbtxy/Negentropy-Collective
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC para determinar si Fortinet es vulnerable a CVE-2025-59718 / CVE-2025-59719
URL:https://github.com/moften/CVE-2025-59718-Fortinet-Poc
标签:#CVE-2025
更新了:CVE-2025
描述:PoC para determinar si Fortinet es vulnerable a CVE-2025-59718 / CVE-2025-59719
URL:https://github.com/moften/CVE-2025-59718-Fortinet-Poc
标签:#CVE-2025
GitHub
GitHub - moften/CVE-2025-59718-Fortinet-Poc: PoC para determinar si Fortinet es vulnerable a CVE-2025-59718 / CVE-2025-59719
PoC para determinar si Fortinet es vulnerable a CVE-2025-59718 / CVE-2025-59719 - moften/CVE-2025-59718-Fortinet-Poc
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔍 Detect and demonstrate RCE vulnerabilities in React Server Components and Next.js with this comprehensive security research toolkit.
URL:https://github.com/ahmedtouzani/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:🔍 Detect and demonstrate RCE vulnerabilities in React Server Components and Next.js with this comprehensive security research toolkit.
URL:https://github.com/ahmedtouzani/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - ahmedtouzani/CVE-2025-55182: 🔍 Detect and demonstrate RCE vulnerabilities in React Server Components and Next.js with…
🔍 Detect and demonstrate RCE vulnerabilities in React Server Components and Next.js with this comprehensive security research toolkit. - ahmedtouzani/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Herimnx/Exe-To-Base64-ShellCode-Convert
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
URL:https://github.com/Herimnx/Exe-To-Base64-ShellCode-Convert
标签:#bypass AntiVirus
GitHub
GitHub - Herimnx/Exe-To-Base64-ShellCode-Convert: Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid…
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution with...
GitHub监控消息提醒!!!
更新了:护网
描述:本系统是一款基于Python的Web漏洞挖掘平台,采用Django框架和MySQL数据库构建。主要用途是对网站进行自动化漏洞扫描,核心功能包括SQL注入等漏洞扫描,以及漏洞报告生成,旨在帮助用户快速发现并解决网站安全漏洞,提升网络安全防护能力。
URL:https://github.com/kevinyang11102/crCwkVBzWa
标签:#护网
更新了:护网
描述:本系统是一款基于Python的Web漏洞挖掘平台,采用Django框架和MySQL数据库构建。主要用途是对网站进行自动化漏洞扫描,核心功能包括SQL注入等漏洞扫描,以及漏洞报告生成,旨在帮助用户快速发现并解决网站安全漏洞,提升网络安全防护能力。
URL:https://github.com/kevinyang11102/crCwkVBzWa
标签:#护网
GitHub
GitHub - kevinyang11102/crCwkVBzWa: 本系统是一款基于Python的Web漏洞挖掘平台,采用Django框架和MySQL数据库构建。主要用途是对网站进行自动化漏洞扫描,核心功能包括SQL注入等漏洞扫描,以及漏洞报告生成…
本系统是一款基于Python的Web漏洞挖掘平台,采用Django框架和MySQL数据库构建。主要用途是对网站进行自动化漏洞扫描,核心功能包括SQL注入等漏洞扫描,以及漏洞报告生成,旨在帮助用户快速发现并解决网站安全漏洞,提升网络安全防护能力。 - kevinyang11102/crCwkVBzWa
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Fix vulnerable versions in Next.js and React RSC apps with one command to secure against CVE-2025-66478. Improve your app's safety effortlessly.
URL:https://github.com/Saied25/fix-react2shell-next
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Fix vulnerable versions in Next.js and React RSC apps with one command to secure against CVE-2025-66478. Improve your app's safety effortlessly.
URL:https://github.com/Saied25/fix-react2shell-next
标签:#CVE-2025
GitHub
GitHub - Saied25/fix-react2shell-next: 🔧 Fix vulnerable versions in Next.js and React RSC apps with one command to secure against…
🔧 Fix vulnerable versions in Next.js and React RSC apps with one command to secure against CVE-2025-66478. Improve your app's safety effortlessly. - Saied25/fix-react2shell-next
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛠️ Detect and exploit CVE-2025-55182 vulnerabilities in Next.js applications with this easy-to-use command-line scanner.
URL:https://github.com/haftomgu/CVE-2025-55182-advanced-scanner-
标签:#CVE-2025
更新了:CVE-2025
描述:🛠️ Detect and exploit CVE-2025-55182 vulnerabilities in Next.js applications with this easy-to-use command-line scanner.
URL:https://github.com/haftomgu/CVE-2025-55182-advanced-scanner-
标签:#CVE-2025
GitHub
GitHub - haftomgu/CVE-2025-55182-advanced-scanner-: 🛠️ Detect and exploit CVE-2025-55182 vulnerabilities in Next.js applications…
🛠️ Detect and exploit CVE-2025-55182 vulnerabilities in Next.js applications with this easy-to-use command-line scanner. - haftomgu/CVE-2025-55182-advanced-scanner-
GitHub监控消息提醒!!!
更新了:内存马
描述:哥斯拉Godzilla定制化插件,接收恶意类Base64编码与恶意类类名进行实例化,达到注入任意类型内存马的目的。
URL:https://github.com/KaGty1/CustomMemShellInjector
标签:#内存马
更新了:内存马
描述:哥斯拉Godzilla定制化插件,接收恶意类Base64编码与恶意类类名进行实例化,达到注入任意类型内存马的目的。
URL:https://github.com/KaGty1/CustomMemShellInjector
标签:#内存马
GitHub
GitHub - KaGty1/CustomMemShellInjector: 哥斯拉Godzilla定制化插件,接收恶意类Base64编码与恶意类类名进行实例化,达到注入任意类型内存马的目的。
哥斯拉Godzilla定制化插件,接收恶意类Base64编码与恶意类类名进行实例化,达到注入任意类型内存马的目的。 - KaGty1/CustomMemShellInjector
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2023-5360 PoC: Unauthenticated arbitrary file upload leading to RCE in Royal Elementor Addons (≤ 1.3.78), written in pure Python.
URL:https://github.com/LaviruDilshan/CVE-2023-5360-exploit-with-native-libraries
标签:#RCE
更新了:RCE
描述:CVE-2023-5360 PoC: Unauthenticated arbitrary file upload leading to RCE in Royal Elementor Addons (≤ 1.3.78), written in pure Python.
URL:https://github.com/LaviruDilshan/CVE-2023-5360-exploit-with-native-libraries
标签:#RCE
GitHub
GitHub - LaviruDilshan/CVE-2023-5360-exploit-with-native-libraries: CVE-2023-5360 PoC: Unauthenticated arbitrary file upload leading…
CVE-2023-5360 PoC: Unauthenticated arbitrary file upload leading to RCE in Royal Elementor Addons (≤ 1.3.78), written in pure Python. - LaviruDilshan/CVE-2023-5360-exploit-with-native-libraries
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/linlinya520/termux-zh
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/linlinya520/termux-zh
标签:#护网
GitHub
GitHub - linlinya520/termux-zh: ⚠️ 免责声明 本项目由 AI 自动生成,作者本人不维护,也不保证长期可用或兼容性。 仅供娱乐和学习参考,使用风险自负。 作用与功能: 为 Termux 用户提供一个中文命令层,让常用命令可以用中文输入…
⚠️ 免责声明 本项目由 AI 自动生成,作者本人不维护,也不保证长期可用或兼容性。 仅供娱乐和学习参考,使用风险自负。 作用与功能: 为 Termux 用户提供一个中文命令层,让常用命令可以用中文输入 支持文件操作、系统管理、网络操作、Python/Node/Git 包管理、文本处理、进程管理等 中文命令全局可用,用户态安装,不覆盖系统命令 提供安装/卸载脚本和自动生成中英对...
GitHub监控消息提醒!!!
更新了:RCE
描述:Repo containing pyarrow 14.0.0, vulnerable to RCE - CVE-2023-47248
URL:https://github.com/Prodigysec/pyarrow-CVE-2023-47248
标签:#RCE
更新了:RCE
描述:Repo containing pyarrow 14.0.0, vulnerable to RCE - CVE-2023-47248
URL:https://github.com/Prodigysec/pyarrow-CVE-2023-47248
标签:#RCE
GitHub
GitHub - Prodigysec/pyarrow-CVE-2023-47248: Repo containing pyarrow 14.0.0, vulnerable to RCE - CVE-2023-47248
Repo containing pyarrow 14.0.0, vulnerable to RCE - CVE-2023-47248 - Prodigysec/pyarrow-CVE-2023-47248
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-14847
URL:https://github.com/Ashwesker/Blackash-CVE-2025-14847
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-14847
URL:https://github.com/Ashwesker/Blackash-CVE-2025-14847
标签:#CVE-2025
GitHub
GitHub - Ashwesker/Blackash-CVE-2025-14847: CVE-2025-14847
CVE-2025-14847 . Contribute to Ashwesker/Blackash-CVE-2025-14847 development by creating an account on GitHub.