A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
There are two ways you could use this. If your on <128 use the instructions, I will tell you what the second way is for users >133 later in this readme ...