CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script will verify if the vulnerability exists, and if it does, will give you a reverse shell.
☆24Mar 18, 2023Updated 3 years ago
Alternatives and similar repositories for CVE-2022-22963_Reverse-Shell-Exploit
Users that are interested in CVE-2022-22963_Reverse-Shell-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆15Feb 25, 2021Updated 5 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- quick and dirty proof-of-concept to hide shells in images☆52Jun 27, 2024Updated last year
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 4 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆19Oct 2, 2022Updated 3 years ago
- ☆35Apr 15, 2022Updated 4 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆93Dec 27, 2023Updated 2 years ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆35Jul 10, 2024Updated last year
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆16Aug 8, 2025Updated 9 months ago
- A set of homebrew formulae to install virt-manager and virt-viewer on macOS☆11Feb 17, 2023Updated 3 years ago
- Bruteratel☆15Oct 26, 2022Updated 3 years ago
- CVE-2022-0185 exploit rewritten with pipe primitive☆16Apr 5, 2022Updated 4 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆23Oct 16, 2023Updated 2 years ago
- ☆20Oct 25, 2024Updated last year
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated last year
- CVE-2022-25765 pdfkit <0.8.6 command injection.☆15Dec 21, 2022Updated 3 years ago
- This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.☆41Sep 11, 2023Updated 2 years ago
- Python exploit for vsftpd 2.3.4 - Backdoor Command Execution☆16Jan 8, 2023Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- ☆21Nov 6, 2024Updated last year
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Oct 6, 2022Updated 3 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Random scripts and files I use for Android reversing☆17Feb 19, 2013Updated 13 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- VM Escape for Parallels Desktop <18.1.1☆37May 7, 2023Updated 3 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Dec 6, 2022Updated 3 years ago
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve…☆38Jul 31, 2023Updated 2 years ago
- Spring Boot application that focuses on implementing multiple authentication methods.☆17Jun 8, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Aug 6, 2022Updated 3 years ago
- ☆15Dec 28, 2022Updated 3 years ago
- Binary Ninja plugin for ROP gadget calculation☆28Jul 6, 2019Updated 6 years ago
- Pwning Sudo Rules☆30Mar 3, 2022Updated 4 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- This contains a bundle with an executable to exploit ms17-010 remote or locally. It does not require Python.☆16Jan 10, 2019Updated 7 years ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29May 5, 2023Updated 3 years ago