HoangKien1020 / CVE-2020-14321Links
Course enrolments allowed privilege escalation from teacher role into manager role to RCE
☆44Updated 4 years ago
Alternatives and similar repositories for CVE-2020-14321
Users that are interested in CVE-2020-14321 are comparing it to the libraries listed below
Sorting:
- InfluxDB CVE-2019-20933 vulnerability exploit☆41Updated 3 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆42Updated 3 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆56Updated 5 years ago
- ☆31Updated 4 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- ☆42Updated last year
- ☆101Updated 4 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆30Updated 5 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆19Updated last week
- Shell Simulation over Net-SNMP with extend functionality☆96Updated 4 years ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆95Updated 4 years ago
- ☆35Updated 3 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 4 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Updated 5 years ago
- ☆51Updated 3 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆90Updated 5 years ago
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆25Updated 4 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 7 months ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- ☆26Updated 2 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 2 years ago
- Cheat sheet☆36Updated 5 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Web CTF CheatSheet 🐈☆34Updated 6 years ago