GitHub监控消息提醒!!!
更新了:Red Team
描述:🛡 Automate reconnaissance and analysis with RedTeam Scanner v2, featuring essential tools for efficient pentesting and Red Team operations.
URL:https://github.com/mallahashok9239/Red-Team-Scaner-V2
标签:#Red Team
更新了:Red Team
描述:🛡 Automate reconnaissance and analysis with RedTeam Scanner v2, featuring essential tools for efficient pentesting and Red Team operations.
URL:https://github.com/mallahashok9239/Red-Team-Scaner-V2
标签:#Red Team
GitHub
GitHub - mallahashok9239/Red-Team-Scaner-V2: 🛡 Automate reconnaissance and analysis with RedTeam Scanner v2, featuring essential…
🛡 Automate reconnaissance and analysis with RedTeam Scanner v2, featuring essential tools for efficient pentesting and Red Team operations. - mallahashok9239/Red-Team-Scaner-V2
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:企业资产漏洞扫描与资产管理平台,集成了多个知名安全工具,子域名爆破,端口扫描,站点发现,目录扫描,爬虫,漏洞扫描
URL:https://github.com/yyhuni/xingrin
标签:#漏洞扫描
更新了:漏洞扫描
描述:企业资产漏洞扫描与资产管理平台,集成了多个知名安全工具,子域名爆破,端口扫描,站点发现,目录扫描,爬虫,漏洞扫描
URL:https://github.com/yyhuni/xingrin
标签:#漏洞扫描
GitHub
GitHub - yyhuni/xingrin: Open-source attack surface management and authorized security automation platform for asset discovery…
Open-source attack surface management and authorized security automation platform for asset discovery, service probing, scan orchestration, and security result management. - yyhuni/xingrin
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A CLI tool to exploit prototype pollution vulnerabilities in React Server Components / Server Actions (CVE-2025-55182 & CVE-2025-66478), enabling remote code execution (RCE) on vulnerable servers.
URL:https://github.com/mantvmass/react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:A CLI tool to exploit prototype pollution vulnerabilities in React Server Components / Server Actions (CVE-2025-55182 & CVE-2025-66478), enabling remote code execution (RCE) on vulnerable servers.
URL:https://github.com/mantvmass/react2shell
标签:#CVE-2025
GitHub
GitHub - mantvmass/react2shell: A CLI tool that exploits vulnerabilities in React Server Components and Server Actions (CVE-2025…
A CLI tool that exploits vulnerabilities in React Server Components and Server Actions (CVE-2025-55182, CVE-2025-66478) to achieve remote code execution (RCE) on vulnerable servers. - mantvmass/rea...
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/kevin5771323/6xM2kGx7nd
标签:#应急响应
更新了:应急响应
描述:本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。
URL:https://github.com/kevin5771323/6xM2kGx7nd
标签:#应急响应
GitHub
GitHub - kevin5771323/6xM2kGx7nd: 本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建…
本系统为基于Springboot+vue的应急物资管理系统,采用前后端分离架构,实现了物资信息管理、供应协调等核心功能。通过MVC设计模式,结合Spring、Mybatis等技术,构建了简洁易用的Web操作界面,满足应急情况下物资的高效管理需求。系统基于MySQL数据库,确保数据稳定存储,为应急响应提供可靠支持。 - kevin5771323/6xM2kGx7nd
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A CVE-2025-55182(React2Shell) Toolbox Application
URL:https://github.com/MoLeft/React2Shell-Toolbox
标签:#CVE-2025
更新了:CVE-2025
描述:A CVE-2025-55182(React2Shell) Toolbox Application
URL:https://github.com/MoLeft/React2Shell-Toolbox
标签:#CVE-2025
GitHub
GitHub - MoLeft/React2Shell-Toolbox: A CVE-2025-55182(React2Shell) Toolbox Application
A CVE-2025-55182(React2Shell) Toolbox Application. Contribute to MoLeft/React2Shell-Toolbox development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A research report on CVE-2025-55182 (React2Shell).
URL:https://github.com/Kugelbyte/React2Shell-Analysis
标签:#CVE-2025
更新了:CVE-2025
描述:A research report on CVE-2025-55182 (React2Shell).
URL:https://github.com/Kugelbyte/React2Shell-Analysis
标签:#CVE-2025
GitHub
GitHub - Kugelbyte/React2Shell-Analysis: A research report on CVE-2025-55182 (React2Shell).
A research report on CVE-2025-55182 (React2Shell). - Kugelbyte/React2Shell-Analysis
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A hands-on lab for understanding and exploiting CVE-2025-55182 (React2Shell) - Remote Code Execution in React Server Components
URL:https://github.com/dhananjayakumarn/CVE-2025-55182-Lab
标签:#CVE-2025
更新了:CVE-2025
描述:A hands-on lab for understanding and exploiting CVE-2025-55182 (React2Shell) - Remote Code Execution in React Server Components
URL:https://github.com/dhananjayakumarn/CVE-2025-55182-Lab
标签:#CVE-2025
GitHub
GitHub - dhananjayakumarn/CVE-2025-55182-Lab: A hands-on lab for understanding and exploiting CVE-2025-55182 (React2Shell) - Remote…
A hands-on lab for understanding and exploiting CVE-2025-55182 (React2Shell) - Remote Code Execution in React Server Components - dhananjayakumarn/CVE-2025-55182-Lab
GitHub监控消息提醒!!!
更新了:RCE
描述:High-performance Go implementation for detecting React Server Components RCE vulnerabilities (CVE-2025-55182 & CVE-2025-66478).
URL:https://github.com/h0tak88r/next88
标签:#RCE
更新了:RCE
描述:High-performance Go implementation for detecting React Server Components RCE vulnerabilities (CVE-2025-55182 & CVE-2025-66478).
URL:https://github.com/h0tak88r/next88
标签:#RCE
GitHub
GitHub - h0tak88r/next88: High-performance Go implementation for detecting React Server Components RCE vulnerabilities (CVE-2025…
High-performance Go implementation for detecting React Server Components RCE vulnerabilities (CVE-2025-55182 & CVE-2025-66478). - h0tak88r/next88
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC for Microsoft Amplifier CLI RCE vulnerability via malicious project configuration
URL:https://github.com/nebariai/MicrosoftAmplifierPoC
标签:#RCE
更新了:RCE
描述:PoC for Microsoft Amplifier CLI RCE vulnerability via malicious project configuration
URL:https://github.com/nebariai/MicrosoftAmplifierPoC
标签:#RCE
GitHub
GitHub - nebariai/MicrosoftAmplifierPoC: PoC for Microsoft Amplifier CLI RCE vulnerability via malicious project configuration
PoC for Microsoft Amplifier CLI RCE vulnerability via malicious project configuration - nebariai/MicrosoftAmplifierPoC
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:NodeJS-based exploit script and scanner for the React Server Components \"React2Shell\" vulnerability (CVE-2025-55182).
URL:https://github.com/sangleshubham/React-Security-CVE-2025-55182-Exploit
标签:#CVE-2025
更新了:CVE-2025
描述:NodeJS-based exploit script and scanner for the React Server Components \"React2Shell\" vulnerability (CVE-2025-55182).
URL:https://github.com/sangleshubham/React-Security-CVE-2025-55182-Exploit
标签:#CVE-2025
GitHub
GitHub - sangleshubham/React-Security-CVE-2025-55182-Exploit: NodeJS-based exploit script and scanner for the React Server Components…
NodeJS-based exploit script and scanner for the React Server Components "React2Shell" vulnerability (CVE-2025-55182). - sangleshubham/React-Security-CVE-2025-55182-Exploit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A hybrid security scanner for detecting CVE-2025-55182 in Next.js and Waku applications. Features combined static code analysis and safe dynamic verification for DevSecOps workflows.
URL:https://github.com/TrixSec/CVE-2025-55182-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:A hybrid security scanner for detecting CVE-2025-55182 in Next.js and Waku applications. Features combined static code analysis and safe dynamic verification for DevSecOps workflows.
URL:https://github.com/TrixSec/CVE-2025-55182-Scanner
标签:#CVE-2025
GitHub
GitHub - TrixSec/CVE-2025-55182-Scanner: A hybrid security scanner for detecting CVE-2025-55182 in Next.js and Waku applications.…
A hybrid security scanner for detecting CVE-2025-55182 in Next.js and Waku applications. Features combined static code analysis and safe dynamic verification for DevSecOps workflows. - TrixSec/CVE-...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/cyberleelawat/CVE-2025-55184
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/cyberleelawat/CVE-2025-55184
标签:#CVE-2025
GitHub
GitHub - cyberleelawat/CVE-2025-55184: React Server Components 19.0.0 to 19.2.1 including react-server-dom-parcel, react-server…
React Server Components 19.0.0 to 19.2.1 including react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack contain an insecure deserialization vulnerability caused by unsa...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Python script for Testing CVE-2025-55184
URL:https://github.com/Kajal5414/CVE-2025-55184_Testing
标签:#CVE-2025
更新了:CVE-2025
描述:Python script for Testing CVE-2025-55184
URL:https://github.com/Kajal5414/CVE-2025-55184_Testing
标签:#CVE-2025
GitHub
GitHub - Kajal5414/CVE-2025-55184_Testing: Python script for Testing CVE-2025-55184
Python script for Testing CVE-2025-55184 . Contribute to Kajal5414/CVE-2025-55184_Testing development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Check if your server is affected by CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478
标签:#CVE-2025
更新了:CVE-2025
描述:Check if your server is affected by CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478
标签:#CVE-2025
GitHub
GitHub - mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478: Check if your server is affected by CVE-2025-55182 & CVE-2025-66478
Check if your server is affected by CVE-2025-55182 & CVE-2025-66478 - mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478
GitHub监控消息提醒!!!
更新了:RCE
描述:TCP/UDP server & client, potential file transfer program, maybe RCE or Trojan malware
URL:https://github.com/win4er/messenger
标签:#RCE
更新了:RCE
描述:TCP/UDP server & client, potential file transfer program, maybe RCE or Trojan malware
URL:https://github.com/win4er/messenger
标签:#RCE
GitHub
GitHub - win4er/messenger: TCP/UDP server & client, potential file transfer program, maybe RCE or Trojan malware
TCP/UDP server & client, potential file transfer program, maybe RCE or Trojan malware - win4er/messenger
GitHub监控消息提醒!!!
更新了:代码审计
描述:开源的代码审计平台 - 支持项目级/文件级/片段级审计,支持 10+ LLM、自定义规则集(内置OWASP Top 10 规则集)、自定义提示词模板、可解释分析、PDF 报告导出。支持ollama私有部署模型,代码可不出内网。
URL:https://github.com/shus-s/java-web-
标签:#代码审计
更新了:代码审计
描述:开源的代码审计平台 - 支持项目级/文件级/片段级审计,支持 10+ LLM、自定义规则集(内置OWASP Top 10 规则集)、自定义提示词模板、可解释分析、PDF 报告导出。支持ollama私有部署模型,代码可不出内网。
URL:https://github.com/shus-s/java-web-
标签:#代码审计
GitHub
GitHub - shus-s/javaweb-Study-Room-Reservation-System: 该自习室预约系统基于 Java Web 技术栈(Servlet+JSP+MySQL)实现,采用 MVC 架构分离数据、视图和控制逻辑,功能涵盖…
该自习室预约系统基于 Java Web 技术栈(Servlet+JSP+MySQL)实现,采用 MVC 架构分离数据、视图和控制逻辑,功能涵盖用户管理、自习室管理和预约管理。系统通过分层设计(DAO+Service+Controller)保证代码可维护性,前端使用 CSS 网格布局和 JS 表单验证提升用户体验。整体满足小型自习室的预约需求,可进一步扩展权限管理(如管理员审批)和统计功能(如...
GitHub监控消息提醒!!!
更新了:代码审计
描述:开源的代码审计平台 - 支持项目级/文件级/片段级审计,支持 10+ LLM、自定义规则集(内置OWASP Top 10 规则集)、自定义提示词模板、可解释分析、PDF 报告导出。支持ollama私有部署模型,代码可不出内网。
URL:https://github.com/shus-s/javaweb-Study-Room-Reservation-System
标签:#代码审计
更新了:代码审计
描述:开源的代码审计平台 - 支持项目级/文件级/片段级审计,支持 10+ LLM、自定义规则集(内置OWASP Top 10 规则集)、自定义提示词模板、可解释分析、PDF 报告导出。支持ollama私有部署模型,代码可不出内网。
URL:https://github.com/shus-s/javaweb-Study-Room-Reservation-System
标签:#代码审计
GitHub
GitHub - shus-s/javaweb-Study-Room-Reservation-System: 该自习室预约系统基于 Java Web 技术栈(Servlet+JSP+MySQL)实现,采用 MVC 架构分离数据、视图和控制逻辑,功能涵盖…
该自习室预约系统基于 Java Web 技术栈(Servlet+JSP+MySQL)实现,采用 MVC 架构分离数据、视图和控制逻辑,功能涵盖用户管理、自习室管理和预约管理。系统通过分层设计(DAO+Service+Controller)保证代码可维护性,前端使用 CSS 网格布局和 JS 表单验证提升用户体验。整体满足小型自习室的预约需求,可进一步扩展权限管理(如管理员审批)和统计功能(如...
GitHub监控消息提醒!!!
更新了:RCE
描述:💥Extension Tool para Auditoría y Explotación avanzada RCE/Source Leak/Dos (CVE-2025-55182/83/84) para entornos Next.js y React Server Components (RSC) directamente desde tu navegador ❌
URL:https://github.com/MammaniNelsonD/React2P4IM0Nshell
标签:#RCE
更新了:RCE
描述:💥Extension Tool para Auditoría y Explotación avanzada RCE/Source Leak/Dos (CVE-2025-55182/83/84) para entornos Next.js y React Server Components (RSC) directamente desde tu navegador ❌
URL:https://github.com/MammaniNelsonD/React2P4IM0Nshell
标签:#RCE
GitHub
GitHub - MammaniNelsonD/React2P4IM0Nshell: 💥Extension Tool para Auditoría y Explotación avanzada RCE/Source Leak/Dos (CVE-2025…
💥Extension Tool para Auditoría y Explotación avanzada RCE/Source Leak/Dos (CVE-2025-55182/83/84) para entornos Next.js y React Server Components (RSC) directamente desde tu navegador + Laboratorio ...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC). It also includes a realistic \"Lab Environment\" to safely test and understand the vulnerability.
URL:https://github.com/BimBoxH4/CVE-2025-66039_CVE-2025-61675_CVE-2025-61678_reePBX
标签:#CVE-2025
更新了:CVE-2025
描述:a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC). It also includes a realistic \"Lab Environment\" to safely test and understand the vulnerability.
URL:https://github.com/BimBoxH4/CVE-2025-66039_CVE-2025-61675_CVE-2025-61678_reePBX
标签:#CVE-2025
GitHub
GitHub - BimBoxH4/CVE-2025-66039_CVE-2025-61675_CVE-2025-61678_reePBX: This vulnerability allows both authenticated and unauthenticated…
This vulnerability allows both authenticated and unauthenticated remote attackers to execute remote code on vulnerable FreePBX instances. These issues have been fixed in FreePBX versions 16.0.42, 1...