assetnote / react2shell-scannerLinks
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)
☆2,314Updated 3 weeks ago
Alternatives and similar repositories for react2shell-scanner
Users that are interested in react2shell-scanner are comparing it to the libraries listed below
Sorting:
- Original Proof-of-Concepts for React2Shell CVE-2025-55182☆971Updated 3 weeks ago
- rep+ — Burp-style HTTP Repeater for Chrome DevTools with built‑in AI to explain requests and suggest attacks☆1,274Updated this week
- Explanation and full RCE PoC for CVE-2025-55182☆1,287Updated 3 weeks ago
- A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnera…☆381Updated 2 weeks ago
- CVE-2025-55182 POC☆785Updated 3 weeks ago
- Supports RSC fingerprinting and exploitation of the React component vulnerability CVE-2025-55182.☆509Updated 3 weeks ago
- ☆269Updated 3 weeks ago
- ☆151Updated this week
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,393Updated 5 months ago
- Fully autonomous AI hacker to find actual exploits in your web apps. Shannon has achieved a 96.15% success rate on the hint-free, source-…☆3,200Updated last week
- React Shell & Next.js RSC Exploit Tool (CVE-2025-55182)☆173Updated 2 weeks ago
- React2Shell Ultimate - The most comprehensive CVE-2025-66478 Scanner for Next.js RSC RCE vulnerability. Multi-mode detection, WAF bypass,…☆120Updated 3 weeks ago
- Header Exploitation HTTP☆695Updated last month
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆303Updated last week
- Burp Suite extension that mutates ciphers to bypass TLS-fingerprint based bot detection☆445Updated 3 months ago
- RSC/Next.js RCE Vulnerability Detector & PoC Chrome Extension – CVE-2025-55182 & CVE-2025-66478☆301Updated 3 weeks ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆819Updated 2 weeks ago
- Autoswagger by Intruder - detect API auth weaknesses☆1,784Updated 4 months ago
- A fast WordPress plugin enumeration tool☆748Updated this week
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆467Updated this week
- Local Privilege Escalation to Root via Sudo chroot in Linux☆429Updated 5 months ago
- CVE-2025-29927 Proof of Concept☆93Updated 9 months ago
- Latest CVEs with their Proof of Concept exploits.☆1,053Updated this week
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆303Updated last year
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.☆820Updated this week
- CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicat…☆1,754Updated 6 months ago
- MCP Server for Burp☆411Updated last month
- Android security insights in full spectrum.☆942Updated 5 months ago
- MCP configuration to connect AI agent to a Linux machine.☆416Updated last month
- One command to fix CVE-2025-66478 (React 2 Shell RCE) in your Next.js / React RSC app.☆380Updated 2 weeks ago