Python PoC for CVE-2020-35846 targeting Cockpit 0.11.1
☆15Jul 25, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2020-35846
Users that are interested in CVE-2020-35846 are comparing it to the libraries listed below
Sorting:
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- ☆14May 14, 2022Updated 3 years ago
- A Python replicated exploit for Webmin 1.580 /file/show.cgi Remote Code Execution☆42Sep 28, 2021Updated 4 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- An anti DDoS tool that tries to neutralize proxies denial of service. Created in 2016.☆10Oct 2, 2016Updated 9 years ago
- ☆10Aug 17, 2021Updated 4 years ago
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- Install LAMP(Linux + Apache + MySQL/MariaDB/Percona Server + PHP ) for CentOS/Fedora/Debian/Ubuntu☆10Apr 4, 2020Updated 5 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- ☆12Aug 23, 2019Updated 6 years ago
- Beautifully display social media and contact info on your website with these simple widgets.☆15Dec 6, 2022Updated 3 years ago
- c++ implementation of a simple-virtual-machine☆14Sep 19, 2014Updated 11 years ago
- Tool to display a Windows 8+ process mitigation policy☆12Jul 9, 2025Updated 8 months ago
- ☆13Oct 14, 2017Updated 8 years ago
- Vault 7: CIA Hacking Tools Revealed☆17Mar 8, 2017Updated 9 years ago
- ☆15Nov 12, 2015Updated 10 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- Sample cross-platform Web Application Firewall, used as a security proxy for existing web apps☆15Oct 16, 2017Updated 8 years ago
- Linux port scan detector☆13Nov 20, 2017Updated 8 years ago
- CTFs solve scripts☆20Jan 9, 2026Updated 2 months ago
- Utility to check the integrity of your DNS managed zones at your cloud service provider☆15Jan 19, 2022Updated 4 years ago
- web shell,php shell ,bypass shell , web hack,symlink☆13May 15, 2019Updated 6 years ago
- Paper Collection☆23Jan 22, 2018Updated 8 years ago
- Cookbook for mod_security deployment☆25Oct 6, 2022Updated 3 years ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- Writeups for all pwn challenges from HTB Cyber Apocalypse 2023☆18Mar 22, 2023Updated 2 years ago
- Python YouTube Video Downloader☆16May 25, 2020Updated 5 years ago
- Reading SNI value from quic Initial Packet.☆19Dec 27, 2024Updated last year
- A minimal http request library for Android☆15Dec 29, 2017Updated 8 years ago
- ☆15Feb 26, 2026Updated last week
- Writes a custom message to your master boot record, inspired by XKCD☆16Apr 9, 2015Updated 10 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆20Feb 19, 2024Updated 2 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 2 years ago
- An example repository of a simple login system in GoLang☆16Mar 15, 2017Updated 8 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Feb 15, 2022Updated 4 years ago
- lua state machine taking advantage of first class functions. Made this while reading a book on oop in lua.☆17Nov 5, 2017Updated 8 years ago
- demo of common anti-analysis techniques used by malware☆18Nov 16, 2021Updated 4 years ago