Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.
☆24Oct 10, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2020-3452-Exploit
Users that are interested in CVE-2020-3452-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Pentest tool com foco em teste de intrusão em redes wireless para Windows☆12Dec 24, 2019Updated 6 years ago
- Shellcode runner to execute malicious payload and bypass AV☆14Nov 28, 2021Updated 4 years ago
- badUSB ek0ms style with integrated c2☆49Oct 23, 2025Updated 5 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33May 21, 2024Updated last year
- WordPress File Upload RCE Exploit☆17Sep 1, 2025Updated 6 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Fully automated Data Forensics / Recovery bot to recover, undelete, index, and organize as much as possible for any hard drive, and optio…☆13Feb 5, 2024Updated 2 years ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- Some personal exploits/pocs☆56Jun 2, 2020Updated 5 years ago
- C++ wrapper around KLEE and AFL for intelligent, coverage guided fuzzing. Developed while doing research at MWR Infosecurity☆18Aug 1, 2018Updated 7 years ago
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- Steganography-Payload-Hider☆13Jan 8, 2026Updated 2 months ago
- PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection☆10Apr 12, 2022Updated 3 years ago
- Ferramenta para criação de payloads HID (human interface device) para android sem nethunter ou rubber ducky☆18Aug 11, 2018Updated 7 years ago
- A python library for generating different permutations of audible segments from audio files.☆13Jun 13, 2022Updated 3 years ago
- CVE-2022-30780 - lighttpd remote denial of service☆17Mar 16, 2024Updated 2 years ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- ☆17Apr 14, 2022Updated 3 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Install guide for putting Debian GNU/Linux on a PogoPlug Pro☆10Jan 19, 2023Updated 3 years ago
- Come inside, and have a nice cup of tea.☆20Dec 20, 2025Updated 3 months ago
- Dependency lockfiles for reproducible build environments 📦🔒☆48Mar 16, 2026Updated last week
- An Improved Proof of Concept for CVE-2022-1388 w/ an Interactive Shell☆14May 25, 2025Updated 9 months ago
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Oct 18, 2022Updated 3 years ago
- Script to utilize the v2 pwndb onion site to find leaked passwords.☆18Aug 29, 2022Updated 3 years ago
- Exploit, Malware and Vulnerability Scoring Application☆15Oct 5, 2023Updated 2 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆128Sep 16, 2022Updated 3 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- Easily configure a batman-adv mesh with automated IP layer, gateway selection and failover. Supports access points, client mode, and inte…☆19Nov 20, 2025Updated 4 months ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Password list generator for password spraying - prebaked with goodies☆109Feb 21, 2023Updated 3 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago