ImageTragick / PoCsLinks
Proof of Concepts for CVE-2016–3714
☆496Updated 9 years ago
Alternatives and similar repositories for PoCs
Users that are interested in PoCs are comparing it to the libraries listed below
Sorting:
- PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container☆405Updated 2 years ago
- Content hijacking proof-of-concept using Flash, PDF and Silverlight☆384Updated 6 years ago
- Authenticate against a MySQL server without knowing the cleartext password☆226Updated 3 years ago
- A tiny and cute URL fuzzer☆402Updated 3 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- htcap is a web application scanner able to crawl single page application (SPA) recursively by intercepting ajax calls and DOM changes.☆623Updated 4 years ago
- 💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002☆352Updated 6 years ago
- Chrome extension Exploitation Framework☆574Updated 7 years ago
- This is a burp intruder extender that is designed for automation and validation of XSS vulnerabilities.☆417Updated 3 years ago
- SSRF Proxy facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery.☆476Updated 7 years ago
- A Burp Suite Pro extension which augments your proxy traffic by injecting non-invasive headers designed to reveal backend systems by caus…☆438Updated 7 months ago
- Bypassing disabled exec functions in PHP (c) CRLF☆404Updated 5 years ago
- Utils☆274Updated 9 years ago
- Add headers to all Burp requests to bypass some WAF products☆329Updated 7 years ago
- An automated XSS payload generator written in python.☆316Updated 9 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆486Updated last year
- A collection of web pages vulnerable to SQL injection flaws☆351Updated 3 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆530Updated last year
- Exploits for various CVEs☆211Updated 5 years ago
- Password lists obtained from strangers attempting to log in to my server.☆222Updated 6 years ago
- ☆423Updated 8 years ago
- Web-based Source Code Vulnerability Scanner☆355Updated 8 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆602Updated last year
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆393Updated 8 years ago
- SHELLING - a comprehensive OS command injection payload generator☆445Updated 5 years ago
- The Magical Code Injection Rainbow! MCIR is a framework for building configurable vulnerability testbeds. MCIR is also a collection of co…☆445Updated 5 years ago
- An exploit for Apache Struts CVE-2017-5638☆439Updated 7 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromgif()☆121Updated 10 years ago
- Plecost - Wordpress finger printer Tool☆347Updated 2 years ago
- Multi-threaded tool for scanning many hosts for CVE-2014-0160.☆573Updated 10 years ago