监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Lightweight scanner and Nuclei templates for identifying React and Next.js deserialization RCEs (CVE-2025-55182 / CVE-2025-66478).
URL:https://github.com/grp-ops/react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:Lightweight scanner and Nuclei templates for identifying React and Next.js deserialization RCEs (CVE-2025-55182 / CVE-2025-66478).
URL:https://github.com/grp-ops/react2shell
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:RSC/Next.js RCE Vulnerability Detector & PoC Chrome Extension – CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/emredavut/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:RSC/Next.js RCE Vulnerability Detector & PoC Chrome Extension – CVE-2025-55182 & CVE-2025-66478
URL:https://github.com/emredavut/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/5771323ykwkp/vxyuRKqoPbx
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/5771323ykwkp/vxyuRKqoPbx
标签:#护网
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 Exploit
URL:https://github.com/yanoshercohen/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 Exploit
URL:https://github.com/yanoshercohen/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2Shell Ultimate - The most comprehensive CVE-2025-66478 Scanner for Next.js RSC RCE vulnerability. Multi-mode detection, WAF bypass, local scanning.
URL:https://github.com/kOaDT/poc-cve-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:React2Shell Ultimate - The most comprehensive CVE-2025-66478 Scanner for Next.js RSC RCE vulnerability. Multi-mode detection, WAF bypass, local scanning.
URL:https://github.com/kOaDT/poc-cve-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2Shell vulnerability (CVE-2025-55182 / CVE-2025-66478)
URL:https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
标签:#CVE-2025
更新了:CVE-2025
描述:React2Shell vulnerability (CVE-2025-55182 / CVE-2025-66478)
URL:https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:React2Shell Ultimate - The most comprehensive CVE-2025-66478 Scanner for Next.js RSC RCE vulnerability. Multi-mode detection, WAF bypass, local scanning.
URL:https://github.com/hackersatyamrastogi/react2shell-ultimate
标签:#RCE
更新了:RCE
描述:React2Shell Ultimate - The most comprehensive CVE-2025-66478 Scanner for Next.js RSC RCE vulnerability. Multi-mode detection, WAF bypass, local scanning.
URL:https://github.com/hackersatyamrastogi/react2shell-ultimate
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A web-based vulnerability scanner for CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability in React Server Components.
URL:https://github.com/mxm0z/r2s
标签:#CVE-2025
更新了:CVE-2025
描述:A web-based vulnerability scanner for CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability in React Server Components.
URL:https://github.com/mxm0z/r2s
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 React2Shell PoC lab
URL:https://github.com/alsaut1/react2shell-lab
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 React2Shell PoC lab
URL:https://github.com/alsaut1/react2shell-lab
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 Interactive PoC - React Server Components RCE - Educational Security Research
URL:https://github.com/NathanJ60/react2shell-interactive
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 Interactive PoC - React Server Components RCE - Educational Security Research
URL:https://github.com/NathanJ60/react2shell-interactive
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2Shell (CVE-2025-55182) – An intentionally vulnerable Next.js application created for educational and research purposes.
URL:https://github.com/subzer0x0/React2Shell
标签:#CVE-2025
更新了:CVE-2025
描述:React2Shell (CVE-2025-55182) – An intentionally vulnerable Next.js application created for educational and research purposes.
URL:https://github.com/subzer0x0/React2Shell
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Show case CVE-2025-55182 POC in Typrescript/Javascript
URL:https://github.com/zessu/CVE-2025-55182-Typescript
标签:#CVE-2025
更新了:CVE-2025
描述:Show case CVE-2025-55182 POC in Typrescript/Javascript
URL:https://github.com/zessu/CVE-2025-55182-Typescript
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:使用burp自动检测CVE-2025-55182 Next.js RCE 漏洞
URL:https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
标签:#RCE
更新了:RCE
描述:使用burp自动检测CVE-2025-55182 Next.js RCE 漏洞
URL:https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Security scanner for CVE-2025-55182 - Critical RCE vulnerability in React Server Components
URL:https://github.com/f0xyx/CVE-2025-55182-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:Security scanner for CVE-2025-55182 - Critical RCE vulnerability in React Server Components
URL:https://github.com/f0xyx/CVE-2025-55182-Scanner
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2025-55182复现环境及RCE回显poc
URL:https://github.com/zzhorc/CVE-2025-55182
标签:#RCE
更新了:RCE
描述:CVE-2025-55182复现环境及RCE回显poc
URL:https://github.com/zzhorc/CVE-2025-55182
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof-of-Concept RCE pour CVE‑2025‑55182 exploitant le protocole React Flight sur Next.js App Router.
URL:https://github.com/rl0x01/CVE-2025-55182_PoC
标签:#CVE-2025
更新了:CVE-2025
描述:Proof-of-Concept RCE pour CVE‑2025‑55182 exploitant le protocole React Flight sur Next.js App Router.
URL:https://github.com/rl0x01/CVE-2025-55182_PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC for CVE-2025-55182 React2Shell
URL:https://github.com/nomorebreach/POC-CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:POC for CVE-2025-55182 React2Shell
URL:https://github.com/nomorebreach/POC-CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Host-based detection rules for the RCE vulnerability in the React JavaScript framework.
URL:https://github.com/nerium-security/CVE-2025-55182
标签:#RCE
更新了:RCE
描述:Host-based detection rules for the RCE vulnerability in the React JavaScript framework.
URL:https://github.com/nerium-security/CVE-2025-55182
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC: CVE-2025-55182 (React) and CVE-2025-66478 (Next.js)
URL:https://github.com/nehkark/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:PoC: CVE-2025-55182 (React) and CVE-2025-66478 (Next.js)
URL:https://github.com/nehkark/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cooolis-ms is a tool that incorporates the Metasploit Payload Loader, Cobalt Strike External C2 Loader, and Reflective DLL injection.
URL:https://github.com/otuhsgcasg/Cooolis-ms-C2-Loader-Metasploit
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cooolis-ms is a tool that incorporates the Metasploit Payload Loader, Cobalt Strike External C2 Loader, and Reflective DLL injection.
URL:https://github.com/otuhsgcasg/Cooolis-ms-C2-Loader-Metasploit
标签:#Cobalt Strike