OpenSSH 9.1 vulnerability mass scan and exploit
☆108Mar 7, 2023Updated 3 years ago
Alternatives and similar repositories for CVE-2023-25136
Users that are interested in CVE-2023-25136 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits for CVE-2023-27327 and CVE-2023-27328☆15May 9, 2023Updated 3 years ago
- Domain Parser for IPAddress.com Reverse IP Lookup☆84Jan 2, 2023Updated 3 years ago
- SSH Zero-Day Made By ClumsyLulz☆128Jan 7, 2026Updated 4 months ago
- ☆106May 15, 2023Updated 3 years ago
- ☆181Jul 10, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- CVE-2023-22515: Confluence Broken Access Control Exploit☆151Nov 12, 2025Updated 6 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Webshell plugin that works on any Atlassian product employing their plugin framework☆27Nov 20, 2017Updated 8 years ago
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 5 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 4 months ago
- ☆42Feb 9, 2023Updated 3 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- A bash script that will automatically install Bug Hunting tools used for recon☆180Jul 6, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Repository contains psexec, which will help to exploit the forgotten pipe☆174Nov 5, 2024Updated last year
- Hikvision log4j PoC☆67Dec 29, 2022Updated 3 years ago
- Smart context-based SSRF vulnerability scanner.☆361May 5, 2022Updated 4 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- PDF Icon File Type Spoofer☆17Jul 8, 2024Updated last year
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆413Mar 16, 2026Updated 2 months ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)☆232Nov 20, 2022Updated 3 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Dec 18, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Exploit for the CVE-2023-23397☆159Mar 15, 2023Updated 3 years ago
- RCE on Apache Solr 8.3.1☆42May 6, 2023Updated 3 years ago
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Jul 29, 2023Updated 2 years ago
- Jeeves SQLI Finder☆214May 13, 2022Updated 4 years ago
- scscanner is tool to read website status code response from the lists.☆39May 27, 2023Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Find subdomains with GPT, for free☆355Apr 18, 2024Updated 2 years ago
- Amsi Bypass payload that works on Windwos 11☆381Jul 30, 2023Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple tool to check command injection in headers of http request☆18Aug 12, 2022Updated 3 years ago
- Harvest passwords automatically from OpenSSH server☆375May 25, 2023Updated 2 years ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆27Aug 28, 2025Updated 8 months ago
- Subdomains wordlist generted from subdomains of public bug bounty programs☆11Mar 25, 2025Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆146May 17, 2024Updated 2 years ago
- CVE-2024-32002 RCE PoC☆109May 18, 2024Updated 2 years ago
- Brute Force subdomains with a list of custom DNS records.☆13Feb 24, 2023Updated 3 years ago