XXE techniques
☆14Oct 10, 2021Updated 4 years ago
Alternatives and similar repositories for XXE-Notes
Users that are interested in XXE-Notes are comparing it to the libraries listed below
Sorting:
- Authenticated Remote Code Execution in Icinga Web 2 <2.8.6, <2.9.6, <2.10☆16Apr 27, 2023Updated 2 years ago
- ☆48Jul 30, 2025Updated 7 months ago
- An Ecomm app built on PHP & MySQL☆10Oct 27, 2022Updated 3 years ago
- Inspired by the Tryhackme.com Room "Python for Pentesters"☆10Jun 9, 2024Updated last year
- CraftCMS RCE Checker (CVE-2025-32432)☆10Apr 27, 2025Updated 10 months ago
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆41Sep 8, 2021Updated 4 years ago
- It automatically picks OTP from sms. I implemented this without using any Flutter plugin.☆14Nov 15, 2022Updated 3 years ago
- CS426 - Mobile Device Application Development☆19Sep 23, 2025Updated 5 months ago
- ☆14Sep 1, 2024Updated last year
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- Keep Your Sandbox Tight! – Actually just a collection of my own tight sandbox configurations.☆16Jan 22, 2025Updated last year
- ☆12Mar 7, 2025Updated 11 months ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- Our Management System is developed for the Schools to ensure all academic processes or management in an organized manner. The basic objec…☆11Jan 9, 2024Updated 2 years ago
- Unofficial micro-architecture optimized hardened_malloc package☆13Nov 25, 2025Updated 3 months ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 6 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 4 years ago
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- A tool to show only printable characters of a file☆11Oct 2, 2023Updated 2 years ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- Active Directory Enumeration and Exploitation☆13Feb 3, 2026Updated last month
- ☆15Sep 24, 2024Updated last year
- ☆11Oct 30, 2024Updated last year
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- API for Asset Service☆15Aug 15, 2024Updated last year
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- 23–24 мая 2020 ⋅ Юниорские соревнования по информационной безопасности☆10Jun 14, 2020Updated 5 years ago
- This repository houses diverse files and challenges centered around Just Mobile Security. With practical exercises and resources aimed at…☆13Apr 15, 2024Updated last year
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 6 years ago
- Everything related to YARA☆16Feb 19, 2026Updated last week
- Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10☆13Mar 27, 2023Updated 2 years ago
- A cross-platform tool to work with Security Identifiers (SID) formats.☆15Jun 21, 2025Updated 8 months ago
- ☆16Oct 30, 2022Updated 3 years ago
- Hello Hackers ! , Shigaraki tool is all in one for finding specially admin panels , login panels from all subdomains .☆15Jul 1, 2025Updated 8 months ago
- Docker Compose to deploy AmneziaWG services☆16Aug 15, 2024Updated last year
- ☆12Nov 8, 2024Updated last year
- CVE-2023-22894☆13Apr 24, 2023Updated 2 years ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated last year