Next.js React Server Components RCE exploit for CVE-2025-55182
☆51Dec 5, 2025Updated 3 months ago
Alternatives and similar repositories for CVE-2025-55182
Users that are interested in CVE-2025-55182 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dos-attacX is a framework designed for educational purposes to simulate a single-machine attack on a target's server. This tool sends con…☆18Oct 16, 2025Updated 5 months ago
- Researching vulnerabilities with iOS Shortcuts.☆15Apr 15, 2025Updated 11 months ago
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆20Mar 9, 2026Updated 2 weeks ago
- WhatsApp Web phishing page for authorized pentesting. Captures international phone numbers + OTP codes with pixel-perfect 2026 UI. Real-t…☆39Mar 6, 2026Updated 3 weeks ago
- This repository contains a guide to completing the Bandit levels in the OverTheWire wargames.☆15May 7, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆36Updated this week
- ☆12Apr 25, 2025Updated 11 months ago
- Track-Ripper is a simple tool that can be used to track someone easily which can be used to track fraudsters or other criminals☆35Dec 8, 2025Updated 3 months ago
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆54Mar 29, 2025Updated 11 months ago
- Automate Maldoc creation☆24Apr 22, 2025Updated 11 months ago
- XSS Worm which steals victim's cookies and some information also spread others. Written in js, php and java.☆10Dec 12, 2017Updated 8 years ago
- this is a bot that will get the correct answers right at least 90% of the time on edgenuity. edgenuity is a common site used for middle s…☆14Jun 28, 2021Updated 4 years ago
- A better netcat for Hackers☆33Dec 1, 2025Updated 3 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆19Jun 25, 2025Updated 9 months ago
- Dynamically deploy containers for CTF challenges.☆22Nov 29, 2025Updated 3 months ago
- Remote administration toolkit for windows, based on Hidden VNC: file manager, keystroke logger, powershell☆41Nov 23, 2025Updated 4 months ago
- 🔗 Source for the Caido plugin store☆16Mar 13, 2026Updated 2 weeks ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- Stealthy Windows backdoor☆13Dec 2, 2020Updated 5 years ago
- Example taskflows to use with the GitHub Security Lab Taskflow Agent (https://github.com/GitHubSecurityLab/seclab-taskflow-agent)☆38Mar 19, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- to find shell backdoor in website☆17Jun 3, 2023Updated 2 years ago
- Mythically inspired, blazing-fast port scanner built in Rust. Fear the divine ports ⚡☆14Nov 30, 2025Updated 3 months ago
- ☆18Apr 3, 2024Updated last year
- DiscourseMap is a comprehensive security testing framework for Discourse forum platforms. Written for security professionals and forum ad…☆23Dec 3, 2025Updated 3 months ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- 将网易云下载的ncm音频文件转换为flac格式方便在播放器上播放☆15Apr 29, 2024Updated last year
- Payload generator to exfiltrate user cookies through the PHP info page bypassing the HttpOnly flag during XSS exploitation.☆20Dec 20, 2023Updated 2 years ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- Modern, cross-platform netcat alternative written in Go with enhanced features for network communication, debugging, and security testing…☆25Dec 16, 2025Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- My course work about basic binary exploitation.🤿☆10Mar 16, 2022Updated 4 years ago
- POC of CVE-2018-9995 written in Rust.☆95Nov 1, 2025Updated 4 months ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆11Oct 11, 2020Updated 5 years ago
- ZoomEye-python: The official Python library and CLI☆26Apr 21, 2025Updated 11 months ago
- S-XIASQL 是一款专业的 Burp Suite SQL注入检测插件,能够自动化检测Web应用中的SQL注入漏洞。通过智能分析HTTP请求响应,快速识别潜在的SQL注入点,大幅提升渗透测试效率。☆64Mar 16, 2026Updated last week
- The Best Linewize Hacks/Mods to Date☆12Apr 30, 2023Updated 2 years ago
- Piglet is an open-source ESP32 wardriving platform that scans and logs Wi-Fi networks with GPS location, saves WiGLE-ready CSVs to SD, an…☆63Mar 19, 2026Updated last week