GitHub监控消息提醒!!!
更新了:CVE-2025
描述:py script proof of concept new CVE-2025-55182 based in lachlan2k script
URL:https://github.com/notkittenn/poc_react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:py script proof of concept new CVE-2025-55182 based in lachlan2k script
URL:https://github.com/notkittenn/poc_react2shell
标签:#CVE-2025
GitHub
notkittenn/poc_react2shell
py script proof of concept new CVE-2025-55182 based in lachlan2k script - notkittenn/poc_react2shell
GitHub监控消息提醒!!!
更新了:bypass av
描述:这里是针对免杀开展的学习课程
URL:https://github.com/Str1veBe1ng/bypassAV-study
标签:#bypass av
更新了:bypass av
描述:这里是针对免杀开展的学习课程
URL:https://github.com/Str1veBe1ng/bypassAV-study
标签:#bypass av
GitHub
GitHub - Str1veBe1ng/bypassAV-study: 这里是针对免杀开展的学习课程
这里是针对免杀开展的学习课程. Contribute to Str1veBe1ng/bypassAV-study development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55449 EXP
URL:https://github.com/xhh1h/CVE-2025-55449
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55449 EXP
URL:https://github.com/xhh1h/CVE-2025-55449
标签:#CVE-2025
GitHub
GitHub - xhh1h/CVE-2025-55449: CVE-2025-55449 EXP
CVE-2025-55449 EXP. Contribute to xhh1h/CVE-2025-55449 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Iddygodwin/CVE-2025-33073
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Iddygodwin/CVE-2025-33073
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:ReactGuard provides framework- and vulnerability-detection tooling for CVE-2025-55182 (React2Shell)
URL:https://github.com/theori-io/reactguard
标签:#CVE-2025
更新了:CVE-2025
描述:ReactGuard provides framework- and vulnerability-detection tooling for CVE-2025-55182 (React2Shell)
URL:https://github.com/theori-io/reactguard
标签:#CVE-2025
GitHub
GitHub - theori-io/reactguard: ReactGuard provides framework- and vulnerability-detection tooling for CVE-2025-55182 (React2Shell)
ReactGuard provides framework- and vulnerability-detection tooling for CVE-2025-55182 (React2Shell) - theori-io/reactguard
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/BakhodiribnYashinibnMansur/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/BakhodiribnYashinibnMansur/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - BakhodiribnYashinibnMansur/CVE-2025-55182
Contribute to BakhodiribnYashinibnMansur/CVE-2025-55182 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/Pantheon-Security/medusa
标签:#CVE-2025
更新了:CVE-2025
描述:🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.
URL:https://github.com/Pantheon-Security/medusa
标签:#CVE-2025
GitHub
GitHub - Pantheon-Security/medusa: AI-first security scanner with 76 analyzers, 9,600+ detection rules, and repo poisoning detection…
AI-first security scanner with 76 analyzers, 9,600+ detection rules, and repo poisoning detection for AI/ML, LLM agents, and MCP servers. Scan any GitHub repo with: medusa scan --git user/repo - Pa...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 React RCE Test Server
URL:https://github.com/theman001/CVE-2025-55182_PoC-Test-Server
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 React RCE Test Server
URL:https://github.com/theman001/CVE-2025-55182_PoC-Test-Server
标签:#CVE-2025
GitHub
GitHub - theman001/CVE-2025-55182_PoC-Test-Server: CVE-2025-55182 React RCE Test Server
CVE-2025-55182 React RCE Test Server. Contribute to theman001/CVE-2025-55182_PoC-Test-Server development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Next.js RCE via React Server Functions
URL:https://github.com/gunyakit/CVE-2025-55182-PoC-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:Next.js RCE via React Server Functions
URL:https://github.com/gunyakit/CVE-2025-55182-PoC-exploit
标签:#CVE-2025
GitHub
GitHub - gunyakit/CVE-2025-55182-PoC-exploit: Next.js RCE via React Server Functions
Next.js RCE via React Server Functions. Contribute to gunyakit/CVE-2025-55182-PoC-exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/GreenHand0001/java241
标签:#应急响应
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/GreenHand0001/java241
标签:#应急响应
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 React RCE Test Server
URL:https://github.com/VeilVulp/Rscscan
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 React RCE Test Server
URL:https://github.com/VeilVulp/Rscscan
标签:#CVE-2025
GitHub
GitHub - VeilVulp/RscScan-cve-2025-55182: RscScan: Professional cross-platform vulnerability scanner for Next.js Server Actions…
RscScan: Professional cross-platform vulnerability scanner for Next.js Server Actions (CVE-2025-55182). Detects critical RCE flaws with multi-threaded scanning, real-time analytics, and multi-langu...
GitHub监控消息提醒!!!
更新了:RCE
描述:Kubernetes Ingress-nginx RCE (IngressNightmare)
URL:https://github.com/gunyakit/CVE-2025-1974-PoC-exploit
标签:#RCE
更新了:RCE
描述:Kubernetes Ingress-nginx RCE (IngressNightmare)
URL:https://github.com/gunyakit/CVE-2025-1974-PoC-exploit
标签:#RCE
GitHub
GitHub - gunyakit/CVE-2025-1974-PoC-exploit: Kubernetes Ingress-nginx RCE (IngressNightmare)
Kubernetes Ingress-nginx RCE (IngressNightmare). Contribute to gunyakit/CVE-2025-1974-PoC-exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:Sa-Token的反序列化问题
URL:https://github.com/Yohane-Mashiro/Sa-Token-cve
标签:#反序列化
更新了:反序列化
描述:Sa-Token的反序列化问题
URL:https://github.com/Yohane-Mashiro/Sa-Token-cve
标签:#反序列化
GitHub监控消息提醒!!!
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/2292402583/VT-d-Bypass-Research-Guide-VT-d-BRG
标签:#绕过
更新了:绕过
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/2292402583/VT-d-Bypass-Research-Guide-VT-d-BRG
标签:#绕过
GitHub
GitHub - 2292402583/VT-d-Bypass-Research-Guide-VT-d-BRG: This project does not include a complete, ready-to-use bypass tool. It…
This project does not include a complete, ready-to-use bypass tool. It is primarily a collection of research guidelines, conceptual explanations, and development directions, aimed at providing se...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 Burp Passive Extension
URL:https://github.com/Ibonok/CVE-2025-55182-Burp-Passive-Extension
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 Burp Passive Extension
URL:https://github.com/Ibonok/CVE-2025-55182-Burp-Passive-Extension
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:信息收集
描述:info-auto - 子域名自动化信息收集工具,一站式完成子域名解析、IP 识别、端口扫描、HTTP 探测全流程,基于 Excel 表格作为数据载体,支持本地 / 容器化部署。
URL:https://github.com/ander1023/info-auto
标签:#信息收集
更新了:信息收集
描述:info-auto - 子域名自动化信息收集工具,一站式完成子域名解析、IP 识别、端口扫描、HTTP 探测全流程,基于 Excel 表格作为数据载体,支持本地 / 容器化部署。
URL:https://github.com/ander1023/info-auto
标签:#信息收集
GitHub
GitHub - ander1023/info-auto: info-auto - 子域名自动化信息收集工具,一站式完成子域名解析、IP 识别、端口扫描、HTTP 探测全流程,基于 Excel 表格作为数据载体,支持本地 / 容器化部署。
info-auto - 子域名自动化信息收集工具,一站式完成子域名解析、IP 识别、端口扫描、HTTP 探测全流程,基于 Excel 表格作为数据载体,支持本地 / 容器化部署。 - ander1023/info-auto
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 and CVE-2025-66478
URL:https://github.com/FurkanKAYAPINAR/ReactNext2Shell
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 and CVE-2025-66478
URL:https://github.com/FurkanKAYAPINAR/ReactNext2Shell
标签:#CVE-2025
GitHub
GitHub - FurkanKAYAPINAR/ReactNext2Shell: CVE-2025-55182 and CVE-2025-66478
CVE-2025-55182 and CVE-2025-66478. Contribute to FurkanKAYAPINAR/ReactNext2Shell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/rix4uni/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182
URL:https://github.com/rix4uni/CVE-2025-55182
标签:#CVE-2025
GitHub
GitHub - rix4uni/CVE-2025-55182: A command-line tool for detecting CVE-2025-55182 and CVE-2025-66478 in Next.js applications using…
A command-line tool for detecting CVE-2025-55182 and CVE-2025-66478 in Next.js applications using React Server Components. - rix4uni/CVE-2025-55182
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A portable Bash script to detect vulnerable versions of React Server DOM and Next.js packages affected by [CVE-2025-55182]
URL:https://github.com/gonaumov/cve-2025-55182-checker
标签:#CVE-2025
更新了:CVE-2025
描述:A portable Bash script to detect vulnerable versions of React Server DOM and Next.js packages affected by [CVE-2025-55182]
URL:https://github.com/gonaumov/cve-2025-55182-checker
标签:#CVE-2025
GitHub
GitHub - gonaumov/cve-2025-55182-checker: A portable Bash script to detect vulnerable versions of React Server DOM and Next.js…
A portable Bash script to detect vulnerable versions of React Server DOM and Next.js packages affected by [CVE-2025-55182] - gonaumov/cve-2025-55182-checker