OpenSSH 9.1 vulnerability mass scan and exploit
☆108Mar 7, 2023Updated 3 years ago
Alternatives and similar repositories for CVE-2023-25136
Users that are interested in CVE-2023-25136 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose☆17Feb 24, 2023Updated 3 years ago
- Domain Parser for IPAddress.com Reverse IP Lookup☆84Jan 2, 2023Updated 3 years ago
- SSH Zero-Day Made By ClumsyLulz☆128Jan 7, 2026Updated 3 months ago
- ☆106May 15, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆180Jul 10, 2023Updated 2 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- CVE-2023-22515: Confluence Broken Access Control Exploit☆150Nov 12, 2025Updated 5 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Webshell plugin that works on any Atlassian product employing their plugin framework☆27Nov 20, 2017Updated 8 years ago
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 5 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 3 months ago
- ☆42Feb 9, 2023Updated 3 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A bash script that will automatically install Bug Hunting tools used for recon☆179Jul 6, 2023Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆174Nov 5, 2024Updated last year
- Hikvision log4j PoC☆65Dec 29, 2022Updated 3 years ago
- Smart context-based SSRF vulnerability scanner.☆361May 5, 2022Updated 3 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- PDF Icon File Type Spoofer☆17Jul 8, 2024Updated last year
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆411Mar 16, 2026Updated last month
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Dec 18, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)☆233Nov 20, 2022Updated 3 years ago
- Exploit for the CVE-2023-23397☆159Mar 15, 2023Updated 3 years ago
- RCE on Apache Solr 8.3.1☆42May 6, 2023Updated 2 years ago
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Jul 29, 2023Updated 2 years ago
- Jeeves SQLI Finder☆216May 13, 2022Updated 3 years ago
- scscanner is tool to read website status code response from the lists.☆39May 27, 2023Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Find subdomains with GPT, for free☆353Apr 18, 2024Updated 2 years ago
- Amsi Bypass payload that works on Windwos 11☆380Jul 30, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- Simple tool to check command injection in headers of http request☆18Aug 12, 2022Updated 3 years ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆27Aug 28, 2025Updated 7 months ago
- Subdomains wordlist generted from subdomains of public bug bounty programs☆11Mar 25, 2025Updated last year
- CVE-2024-32002 RCE PoC☆108May 18, 2024Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆146May 17, 2024Updated last year
- Brute Force subdomains with a list of custom DNS records.☆13Feb 24, 2023Updated 3 years ago