Next.js React Server Components RCE exploit for CVE-2025-55182
☆59Dec 5, 2025Updated 4 months ago
Alternatives and similar repositories for CVE-2025-55182
Users that are interested in CVE-2025-55182 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dos-attacX is a framework designed for educational purposes to simulate a single-machine attack on a target's server. This tool sends con…☆19Oct 16, 2025Updated 6 months ago
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated last month
- Async Web Server for ESP8266 and ESP32☆15Jul 14, 2023Updated 2 years ago
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- This repository contains a guide to completing the Bandit levels in the OverTheWire wargames.☆16May 7, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆16Dec 27, 2024Updated last year
- ☆13Apr 25, 2025Updated 11 months ago
- Track-Ripper is a simple tool that can be used to track someone easily which can be used to track fraudsters or other criminals☆35Dec 8, 2025Updated 4 months ago
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆54Mar 29, 2025Updated last year
- Automate Maldoc creation☆24Apr 22, 2025Updated 11 months ago
- XSS Worm which steals victim's cookies and some information also spread others. Written in js, php and java.☆10Dec 12, 2017Updated 8 years ago
- A tool to perform DNS cache poisoning against vulnerable server☆34Apr 12, 2024Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24May 6, 2024Updated last year
- ☆19Jun 25, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Dynamically deploy containers for CTF challenges.☆23Nov 29, 2025Updated 4 months ago
- PDFs of awesome cybersecurity info☆27Jan 19, 2026Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- 🔗 Source for the Caido plugin store☆17Apr 8, 2026Updated last week
- Manage a directory of binaries without a package manager☆53Updated this week
- to find shell backdoor in website☆17Jun 3, 2023Updated 2 years ago
- Python google hacking (dorking) script.☆18Jul 15, 2018Updated 7 years ago
- DiscourseMap is a comprehensive security testing framework for Discourse forum platforms. Written for security professionals and forum ad…☆24Dec 3, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Example taskflows to use with the GitHub Security Lab Taskflow Agent (https://github.com/GitHubSecurityLab/seclab-taskflow-agent)☆60Updated this week
- ☆46Jun 1, 2025Updated 10 months ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- ☆12Jan 10, 2024Updated 2 years ago
- My course work about basic binary exploitation.🤿☆10Mar 16, 2022Updated 4 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 7 months ago
- ☆12Oct 24, 2025Updated 5 months ago
- ZoomEye-python: The official Python library and CLI☆26Apr 21, 2025Updated 11 months ago
- The Best Linewize Hacks/Mods to Date☆12Apr 30, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Reconnaissance tool of Penetration test & Bug Bounty☆25Aug 1, 2018Updated 7 years ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆26Dec 24, 2025Updated 3 months ago
- Simple Ransoware to attack Windows 🌟☆26Apr 19, 2023Updated 2 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- A selenium bot for doing the voice surveys at McDonalds☆11Jan 21, 2022Updated 4 years ago
- Command Line telepathy. An Autonomous Al Agent for your Terminal that turns intent into Execution (Windows/Linux/Mac)☆39Feb 7, 2026Updated 2 months ago