$$\ $$\ $$$$$$$\ $$\ $$\ $$$$$$$$\ $$\ $$\ $$$$$$\ $$$$$\
$$$\ $$$ |$$ __$$\ $$$\ $$$ |\__$$ __|$$ | $\ $$ |$$ __$$\ \__$$ |
$$$$\ $$$$ |$$ | $$ | $$$$\ $$$$ | $$ | $$ |$$$\ $$ |$$ / $$ | $$ |
$$\$$\$$ $$ |$$$$$$$ | $$\$$\$$ $$ | $$ | $$ $$ $$\$$ |$$ | $$ | $$ |
$$ \$$$ $$ |$$ __$$< $$ \$$$ $$ | $$ | $$$$ _$$$$ |$$ | $$ |$$\ $$ |
$$ |\$ /$$ |$$ | $$ | $$ |\$ /$$ | $$ | $$$ / \$$$ |$$ | $$ |$$ | $$ |
$$ | \_/ $$ |$$ | $$ |$$\ $$ | \_/ $$ | $$ | $$ / \$$ | $$$$$$ |\$$$$$$ |
\__| \__|\__| \__|\__|\__| \__| \__| \__/ \__| \______/ \______/
Safe IP Structure Checker is an educational and non‑intrusive tool designed to:
- Parse and validate IP addresses
- Support wildcard patterns (
*) - Expand CIDR ranges (
/24,/16, etc.) - Normalize targets into full URLs
- Simulate proxy configuration
- Demonstrate how data flows inside a scanner framework
- Provide information about CVE‑2025‑55182 for academic and research purposes
It is strictly for academic demonstrations, isolated lab research, network analysis, and teaching security concepts.
| Feature | Description |
|---|---|
-ip |
Accepts a single IP / wildcard / CIDR |
-ips |
Load IPs from a file |
-port |
Attach a port to the generated URL |
-proxy |
Simulated proxy routing display |
-about |
Show educational information about CVE‑2025‑55182 |
| Wildcard expansion | e.g., 192.168.1.* |
| CIDR expansion | e.g., 192.168.0.0/24 |
| Hard safety limits | Max 65,536 expanded hosts |
| Non‑exploit tool | No network requests or execution |
git clone https://github.com/github/React2Shell-CVE-2025-55182
cd React2Shell-CVE-2025-55182- Single IP
python3 React2Shell-CVE-2025-55182.py -ip 192.168.1.10- Wildcard
python3 React2Shell-CVE-2025-55182.py -ip 192.168.1.*- CIDR Range
python3 React2Shell-CVE-2025-55182.py -ip 10.0.0.0/24- Add Port
python3 React2Shell-CVE-2025-55182.py -ip 10.0.0.15 -port 8080- Use Proxy (simulation only)
python3 React2Shell-CVE-2025-55182.py -ip 192.168.0.5 -proxy http://127.0.0.1:8080- Load IPs from File
python3 React2Shell-CVE-2025-55182.py -ips targets.txt- About / Educational Info
python3 React2Shell-CVE-2025-55182.py -about192.168.1.10
192.168.1.*
10.0.0.0/30
8.8.8.8[INFO] Processing Target URL: http://192.168.1.10:8080
[✓] Target processed: http://192.168.1.10:8080python3 React2Shell-CVE-2025-55182.py -h