A proof of concept exploit that tries to pop you a shell on a uftpd server between versions 2.6 and 2.10
☆20Apr 16, 2020Updated 6 years ago
Alternatives and similar repositories for uftpd_dirtrav
Users that are interested in uftpd_dirtrav are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Confluence(<install-directory>/confluence/WEB-INF/)文件读取漏洞☆17Sep 2, 2019Updated 6 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 3 months ago
- 几个UAC Bypass的方法☆12Apr 13, 2018Updated 8 years ago
- Atlassian Questions Hardcoded Password (CVE-2022-26138)☆31Jul 26, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A simple command line utility to quickly load and unload Windows drivers☆19Jul 2, 2022Updated 3 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30May 29, 2015Updated 10 years ago
- Release portal for webscene groups☆22Mar 27, 2021Updated 5 years ago
- Code, exploits, and tips for pentesting osTicket☆13Feb 28, 2025Updated last year
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Feb 9, 2017Updated 9 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 7 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A simple tool with the power of "Go" to find the hidden Vhosts defined at the server.☆19Jan 3, 2019Updated 7 years ago
- Dump paths & pages from Next.js Manifest☆15Mar 19, 2024Updated 2 years ago
- PoC for the CVE-2021-20837 : RCE in MovableType☆18Oct 26, 2021Updated 4 years ago
- ☆27Oct 16, 2017Updated 8 years ago
- Interactive Javascript (SVG|VML) Charting Library☆11Jun 14, 2015Updated 10 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- JNI meets C++☆35Jan 8, 2012Updated 14 years ago
- LFI to RCE tool.☆15May 10, 2020Updated 5 years ago
- ☆16Mar 24, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Tutorials exploiting jni implementation under Android through the ndk☆26Nov 12, 2012Updated 13 years ago
- PHP 8 Sandbox Escape☆82Feb 28, 2026Updated last month
- Proof of concept for Weblogic CVE-2020-2883☆15May 13, 2020Updated 5 years ago
- My Shellcode Archive☆29Mar 21, 2017Updated 9 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- ☆14Apr 16, 2022Updated 4 years ago
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 3 years ago
- CVE-2019-2890 WebLogic 反序列化RCE漏洞☆44Dec 8, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cycle through all open windows in i3 using node.js☆15Jul 3, 2016Updated 9 years ago
- WebView of Android that can use client certificate authentication.☆34Oct 27, 2012Updated 13 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215☆17Nov 17, 2022Updated 3 years ago
- 分布式漏扫框架☆17Nov 7, 2017Updated 8 years ago
- Collection of tools for privesc on Linux☆34Aug 28, 2013Updated 12 years ago
- IDOR bypass fuzz 权限绕过burp 插件 fuzz (shiro 等)☆27Sep 1, 2021Updated 4 years ago