监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/TheStingR/ReactOOPS-WriteUp
标签:#CVE-2025
更新了:CVE-2025
描述:This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
URL:https://github.com/TheStingR/ReactOOPS-WriteUp
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🛡️ Audit your Next.js & React Server Components stack for critical vulnerabilities (CVE-2025-66478, CVE-2025-55184). Detects risks & generates fix commands. 100% Client-side.
URL:https://github.com/abdozkaya/rsc-security-auditor
标签:#CVE-2025
更新了:CVE-2025
描述:🛡️ Audit your Next.js & React Server Components stack for critical vulnerabilities (CVE-2025-66478, CVE-2025-55184). Detects risks & generates fix commands. 100% Client-side.
URL:https://github.com/abdozkaya/rsc-security-auditor
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Security testing toolkit for CVE-2025-55182 - React Server Components RCE via prototype pollution. Includes CLI scanner, Chrome extension, Nuclei templates, and Docker lab with CTF flags.
URL:https://github.com/sho-luv/React2Shell
标签:#CVE-2025
更新了:CVE-2025
描述:Security testing toolkit for CVE-2025-55182 - React Server Components RCE via prototype pollution. Includes CLI scanner, Chrome extension, Nuclei templates, and Docker lab with CTF flags.
URL:https://github.com/sho-luv/React2Shell
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Sigma detection rules for Windows threats, including WinRAR CVE-2025-6218 exploitation techniques, designed for SOC and CTI use.
URL:https://github.com/eaizy/react2hulud-scan
标签:#CVE-2025
更新了:CVE-2025
描述:Sigma detection rules for Windows threats, including WinRAR CVE-2025-6218 exploitation techniques, designed for SOC and CTI use.
URL:https://github.com/eaizy/react2hulud-scan
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Sigma detection rules for Windows threats, including WinRAR CVE-2025-6218 exploitation techniques, designed for SOC and CTI use.
URL:https://github.com/hatchepsoout/sigma-rules
标签:#CVE-2025
更新了:CVE-2025
描述:Sigma detection rules for Windows threats, including WinRAR CVE-2025-6218 exploitation techniques, designed for SOC and CTI use.
URL:https://github.com/hatchepsoout/sigma-rules
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Skills Exhibition
URL:https://github.com/Chetanproduction23/company-interview-evaluator
标签:#Red Team
更新了:Red Team
描述:Red Team Skills Exhibition
URL:https://github.com/Chetanproduction23/company-interview-evaluator
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-43426 (video + report)
URL:https://github.com/csrXamfi/CVE-2025-43426
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-43426 (video + report)
URL:https://github.com/csrXamfi/CVE-2025-43426
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 - React2Shell Educational Tool
URL:https://github.com/0xLutfifakee/CVE-2025-55182-React2Shell
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 - React2Shell Educational Tool
URL:https://github.com/0xLutfifakee/CVE-2025-55182-React2Shell
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for Next.js RCE Vulnerability CVE-2025-66478
URL:https://github.com/viperh/poc-cve-next
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for Next.js RCE Vulnerability CVE-2025-66478
URL:https://github.com/viperh/poc-cve-next
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Testing for RCE using GitHub workflow
URL:https://github.com/Sarthak77777/actions-rce-lab
标签:#RCE
更新了:RCE
描述:Testing for RCE using GitHub workflow
URL:https://github.com/Sarthak77777/actions-rce-lab
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:simple Proof-of-Concept (PoC) exploit for CVE-2025-55182
URL:https://github.com/raivenLockdown/RCE_React2Shell_ButCooler-SomeUselessUsefulThingsLMAO-
标签:#RCE
更新了:RCE
描述:simple Proof-of-Concept (PoC) exploit for CVE-2025-55182
URL:https://github.com/raivenLockdown/RCE_React2Shell_ButCooler-SomeUselessUsefulThingsLMAO-
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Proof-of-Concept for CVE-2025-64512 using a polyglot file.
URL:https://github.com/luigigubello/CVE-2025-64512-Polyglot-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:A Proof-of-Concept for CVE-2025-64512 using a polyglot file.
URL:https://github.com/luigigubello/CVE-2025-64512-Polyglot-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:POC React2Shell - CVE-2025-55184 - CVE-2025-55184
URL:https://github.com/caohungphu/react2shell
标签:#CVE-2025
更新了:CVE-2025
描述:POC React2Shell - CVE-2025-55184 - CVE-2025-55184
URL:https://github.com/caohungphu/react2shell
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Advanced Exploitation Toolkit for Next.js Server Actions (CVE-2025-55182)
URL:https://github.com/xalgord/React2Shell
标签:#RCE
更新了:RCE
描述:Advanced Exploitation Toolkit for Next.js Server Actions (CVE-2025-55182)
URL:https://github.com/xalgord/React2Shell
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-55182 の検証用
URL:https://github.com/oguri-souhei/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-55182 の検証用
URL:https://github.com/oguri-souhei/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/gpt5mirrors/gemini3prochinese
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/gpt5mirrors/gemini3prochinese
标签:#护网
GitHub监控消息提醒!!!
更新了:绕过
描述:接入DeepSeek,自动输入iwrite作文需求,自动生成作文,并且可绕过复制粘贴禁用
URL:https://github.com/FengZi1221/iwrite-deepseek
标签:#绕过
更新了:绕过
描述:接入DeepSeek,自动输入iwrite作文需求,自动生成作文,并且可绕过复制粘贴禁用
URL:https://github.com/FengZi1221/iwrite-deepseek
标签:#绕过