CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script will verify if the vulnerability exists, and if it does, will give you a reverse shell.
☆24Mar 18, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2022-22963_Reverse-Shell-Exploit
Users that are interested in CVE-2022-22963_Reverse-Shell-Exploit are comparing it to the libraries listed below
Sorting:
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 2 months ago
- quick and dirty proof-of-concept to hide shells in images☆51Jun 27, 2024Updated last year
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆15Feb 25, 2021Updated 5 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 2 years ago
- ☆23Oct 16, 2023Updated 2 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆92Dec 27, 2023Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 3 months ago
- ☆199Aug 28, 2025Updated 6 months ago
- ☆35Apr 15, 2022Updated 3 years ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29May 5, 2023Updated 2 years ago
- ☆36Apr 24, 2024Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago
- CVE-2022-22947_EXP,CVE-2022-22947_RCE,CVE-2022-22947反弹shell,CVE-2022-22947 getshell☆36Mar 8, 2022Updated 4 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Apr 2, 2021Updated 4 years ago
- VM Escape for Parallels Desktop <18.1.1☆37May 7, 2023Updated 2 years ago
- ☆13Oct 27, 2025Updated 4 months ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- Modern open source login forms with clean HTM, CSS, JS and no dependencies☆37Aug 5, 2025Updated 7 months ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- Checks for tpm vulnerabilities☆38Mar 16, 2023Updated 2 years ago
- A DFVFS Backed Forensic Viewer☆42Apr 13, 2020Updated 5 years ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- Spring Cloud Gateway < 3.0.7 & < 3.1.1 Code Injection (RCE)☆38Mar 4, 2022Updated 4 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- A collection of utility scripts and other tools that make working with Crabgrass easier.☆11Apr 3, 2020Updated 5 years ago
- OWASP Foundation web repository☆16Oct 11, 2025Updated 5 months ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆10Feb 1, 2021Updated 5 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- sqli-labs学习记录☆12Jan 15, 2020Updated 6 years ago
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- ☆16Nov 6, 2025Updated 4 months ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.☆41Sep 11, 2023Updated 2 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year