lachlan2k / React2Shell-CVE-2025-55182-original-pocLinks
Original Proof-of-Concepts for React2Shell CVE-2025-55182
☆1,005Updated last month
Alternatives and similar repositories for React2Shell-CVE-2025-55182-original-poc
Users that are interested in React2Shell-CVE-2025-55182-original-poc are comparing it to the libraries listed below
Sorting:
- Explanation and full RCE PoC for CVE-2025-55182☆1,352Updated last month
- CVE-2025-55182 POC☆793Updated last month
- ☆907Updated 3 weeks ago
- High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)☆2,356Updated last month
- CSPBypass.com, a tool designed to help ethical hackers bypass restrictive Content Security Policies (CSP) and exploit XSS (Cross-Site Scr…☆539Updated this week
- CVE-2025-29927 Proof of Concept☆96Updated 9 months ago
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆124Updated last year
- RSC/Next.js RCE Vulnerability Detector & PoC Chrome Extension – CVE-2025-55182 & CVE-2025-66478☆308Updated last month
- A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnera…☆398Updated last month
- Burp Suite extension that mutates ciphers to bypass TLS-fingerprint based bot detection☆451Updated 4 months ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆165Updated last year
- A collection of Server-Side Prototype Pollution gadgets and exploits☆221Updated 11 months ago
- Official writeups for Cyber Apocalypse CTF 2025: Tales from Eldoria☆191Updated 9 months ago
- Local Privilege Escalation to Root via Sudo chroot in Linux☆440Updated 6 months ago
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆742Updated last month
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆304Updated last year
- Extract JavaScript source trees from Sourcemap files☆1,271Updated last year
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆61Updated 6 months ago
- Official writeups for University CTF 2023: Brains & Bytes☆105Updated last year
- ☆123Updated 2 years ago
- ☆31Updated 4 months ago
- This repository is a collection of JavaScript gadgets that can be used to bypass XSS mitigations such as Content Security Policy (CSP) an…☆121Updated 2 months ago
- rep+ — Burp-style HTTP Repeater for Chrome DevTools with built‑in AI to explain requests and suggest attacks☆1,376Updated this week
- ☆151Updated last week
- HTTP/2 Last Frame Synchronization (also known as Single Packet Attack) low Level Library / Tool based on Scapy + Exploit Timing Attacks☆208Updated 7 months ago
- a signal handler race condition in OpenSSH's server (sshd)☆491Updated last year
- PDF Files for Pentesting☆683Updated last year
- ☆946Updated 2 weeks ago
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆232Updated last year
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆181Updated 10 months ago