0xAJ2K / CVE-2020-11022-CVE-2020-11023Links
Little thing put together quickly to demonstrate this CVE
☆32Updated 3 years ago
Alternatives and similar repositories for CVE-2020-11022-CVE-2020-11023
Users that are interested in CVE-2020-11022-CVE-2020-11023 are comparing it to the libraries listed below
Sorting:
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆81Updated last year
- Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)☆77Updated last year
- This tool tries to find interesting stuff inside static files; mainly JavaScript and JSON files.☆78Updated 2 years ago
- ☆28Updated 5 years ago
- HTTP verb tampering & methods enumeration☆62Updated 3 months ago
- The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489☆30Updated last year
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆45Updated last year
- CVE Collection of jQuery UI XSS Payloads☆120Updated 2 years ago
- CVE Collection of jQuery XSS Payloads☆75Updated 2 years ago
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Updated 2 years ago
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure☆96Updated last year
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆63Updated 4 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated 2 years ago
- Web cache poisoning vulnerability scanner.☆72Updated 3 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆169Updated 3 years ago
- Execute Trickest workflows right from your terminal☆94Updated this week
- Every Nuclei template that has ever appeared on Github☆34Updated 3 years ago
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆110Updated last year
- LFI to RCE via phpinfo() assistance or via controlled log file☆72Updated 2 years ago
- CVE-2023-22515: Confluence Broken Access Control Exploit☆140Updated last week
- 403-bypass tool to bypass 403 responses.☆123Updated 2 years ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆140Updated 2 years ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆61Updated 2 years ago
- A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an a…☆56Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- POC for CVE-2024-23897 Jenkins File-Read☆34Updated 9 months ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆33Updated 3 years ago
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆84Updated 2 years ago
- ☆45Updated 2 weeks ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆28Updated 3 years ago