PoC for CVE-2019-5736
☆657Jan 5, 2022Updated 4 years ago
Alternatives and similar repositories for CVE-2019-5736-PoC
Users that are interested in CVE-2019-5736-PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)☆208Feb 20, 2019Updated 7 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 7 years ago
- PoC for Dirty COW (CVE-2016-5195)☆508Mar 16, 2022Updated 4 years ago
- FileReader Exploit☆256Mar 20, 2019Updated 7 years ago
- ☆231Feb 13, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Redis 4.x/5.x RCE☆975Nov 30, 2021Updated 4 years ago
- Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (…☆316Apr 1, 2019Updated 6 years ago
- There is no pre-auth RCE in Jenkins since May 2017, but this is the one!☆607May 17, 2019Updated 6 years ago
- Some of my exploits.☆601Feb 25, 2021Updated 5 years ago
- Tomcat-Ajp协议文件读取漏洞☆797Mar 3, 2020Updated 6 years ago
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- CVE-2019-1040 with Exchange☆253Jun 18, 2021Updated 4 years ago
- Bypass firewall for traffic forwarding using webshell☆1,431Sep 29, 2021Updated 4 years ago
- 用于记录分享一些有趣的案例☆865Jan 10, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!☆298Jun 10, 2019Updated 6 years ago
- ☆146Jun 20, 2018Updated 7 years ago
- CVE-2019-2725 命令回显☆436May 8, 2023Updated 2 years ago
- Fastjson vulnerability quickly exploits the framework(fastjson漏洞快速利用框架)☆1,392Dec 16, 2022Updated 3 years ago
- a webshell resides in the memory of java web server☆700Jun 26, 2018Updated 7 years ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,587Feb 23, 2026Updated last month
- ☆1,381Jul 2, 2020Updated 5 years ago
- Venom - A Multi-hop Proxy for Penetration Testers☆2,153May 11, 2022Updated 3 years ago
- Apache Solr Injection Research☆580Jan 28, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- WebLogic wls9-async反序列化远程命令执行漏洞☆240May 26, 2019Updated 6 years ago
- ☆835Jun 7, 2022Updated 3 years ago
- A tiny project for generating SnakeYAML deserialization payloads☆628Oct 14, 2025Updated 5 months ago
- Java RCE 回显测试代码☆1,016Oct 15, 2020Updated 5 years ago
- a PoC for Linux to get around agents that log commands being executed, without root privilege. Linux低权限模糊化执行的程序名和参数,避开基于execve系统调用监控的命令日志☆245May 8, 2019Updated 6 years ago
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆246Apr 30, 2020Updated 5 years ago
- exploit for fastjson remote code execution vulnerability☆153Dec 16, 2022Updated 3 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆682May 9, 2019Updated 6 years ago
- Burp suite 分块传输辅助插件☆2,029Feb 23, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Weblogic一键漏洞检测工具,V1.5,更新时间:20200730☆2,267May 22, 2023Updated 2 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,082Apr 5, 2022Updated 3 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆364Jan 11, 2020Updated 6 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,517Jan 21, 2020Updated 6 years ago
- POC of https://research.checkpoint.com/extracting-code-execution-from-winrar/☆267Feb 27, 2019Updated 7 years ago
- CVE-2018-13379☆254Aug 14, 2019Updated 6 years ago
- CVE-2018-3245-PoC☆172Jul 13, 2021Updated 4 years ago