0xdsm / WSOBLinks
π WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.
β27Updated 2 years ago
Alternatives and similar repositories for WSOB
Users that are interested in WSOB are comparing it to the libraries listed below
Sorting:
- γπͺγLinux Backdoor based on ICMP protocolβ63Updated last year
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 3 years ago
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646β27Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strikeβ52Updated 3 years ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text verβ¦β39Updated 3 years ago
- β29Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.β48Updated 3 years ago
- A script for automatize boolean-based blind SQL injections (MVP).β54Updated 3 years ago
- Exploits targeting vBulletin.β75Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.β49Updated 11 months ago
- π» [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)β24Updated 3 years ago
- CVE-2021-40444β65Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 3 years ago
- OpenSSH 9.1 vulnerability mass scan and exploitβ106Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.β21Updated 2 years ago
- cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50β25Updated 2 years ago
- π¦ Python project to identify and scan for vulnerabilities related to the Joomla CMS project. It scans for common misconfigurations and pβ¦β171Updated last year
- nuclei scanner for proxyshell ( CVE-2021-34473 )β46Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands iβ¦β114Updated 3 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"β29Updated 7 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAVβ27Updated 2 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]β33Updated 4 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.β59Updated last year
- Microsoft Exchange password spray tool with proxy support.β39Updated 4 years ago
- β46Updated 2 months ago
- Open-Source Phishing Toolkitβ19Updated 4 years ago
- Simple recon tool automates your recon processβ16Updated 2 years ago
- Enumerate AWS cloud resources based on provided credentialβ51Updated 3 years ago
- Apache Spark Shell Command Injection Vulnerabilityβ88Updated 3 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ50Updated 2 years ago