Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.
☆24Oct 10, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2020-3452-Exploit
Users that are interested in CVE-2020-3452-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Shellcode runner to execute malicious payload and bypass AV☆14Nov 28, 2021Updated 4 years ago
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- Modular C2 server to tame your pack of wolves☆26Mar 14, 2026Updated last month
- A repo containing some stagers and setup scripts for configuring Salt Stack to be a "bad"-ass C2☆18Jan 3, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- WordPress File Upload RCE Exploit☆17Sep 1, 2025Updated 7 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Fully automated Data Forensics / Recovery bot to recover, undelete, index, and organize as much as possible for any hard drive, and optio…☆13Feb 5, 2024Updated 2 years ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- Some personal exploits/pocs☆56Jun 2, 2020Updated 5 years ago
- C++ wrapper around KLEE and AFL for intelligent, coverage guided fuzzing. Developed while doing research at MWR Infosecurity☆18Aug 1, 2018Updated 7 years ago
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- A fork of TorGhost, a little utilitly used to route all traffic through TOR.☆52Feb 9, 2020Updated 6 years ago
- PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection☆10Apr 12, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- IP/FQDN data structure helper with randomization of hosts and ports based on masscan internal logic☆69Jul 7, 2024Updated last year
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆16Feb 13, 2024Updated 2 years ago
- CVE-2022-30780 - lighttpd remote denial of service☆17Mar 16, 2024Updated 2 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- top usernames from azure survey 2025☆16Apr 25, 2025Updated 11 months ago
- An Improved Proof of Concept for CVE-2022-1388 w/ an Interactive Shell☆14May 25, 2025Updated 10 months ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Oct 18, 2022Updated 3 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆128Sep 16, 2022Updated 3 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 6 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.3☆12Jan 23, 2020Updated 6 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago
- POC for CVE-2022-1388☆231May 9, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Jun 7, 2022Updated 3 years ago
- Easily configure a batman-adv mesh with automated IP layer, gateway selection and failover. Supports access points, client mode, and inte…☆21Nov 20, 2025Updated 4 months ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆56Oct 6, 2020Updated 5 years ago
- Privacy, security, ad blocking, and VPN tunneling, end to end, free, in your control, and made easy.☆19Sep 24, 2022Updated 3 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Opengraph-Compatible JSON Generator for BloodHound☆28Mar 30, 2026Updated 2 weeks ago
- Windows 10/11 unsigned kernel driver load/debugging☆19Feb 17, 2023Updated 3 years ago