Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate
☆19Nov 14, 2018Updated 7 years ago
Alternatives and similar repositories for CVE-2018-19131
Users that are interested in CVE-2018-19131 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 8 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆15May 8, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Dec 27, 2017Updated 8 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- .NET Reverse Shell☆16Sep 24, 2016Updated 9 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 参赛所用的sshop平台☆11Jun 26, 2018Updated 7 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Nov 2, 2013Updated 12 years ago
- Exploits for some of the vulnerabilities I have discovered☆18Aug 3, 2020Updated 5 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- PoC code for CVE-2018-9539☆20Nov 11, 2018Updated 7 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- ☆14May 13, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- ☆183Feb 21, 2022Updated 4 years ago
- 使用JS监听获取dz密码☆12Sep 5, 2017Updated 8 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆83Sep 27, 2018Updated 7 years ago
- Only for research and learning, not for commercial and illegal use☆11Jul 22, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- 做过的实验,踩过的坑☆40Jun 7, 2018Updated 7 years ago
- Open source exploit framework made in C#☆54Jan 27, 2025Updated last year
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- ZeroRemote Trojan SRC Extract☆20Mar 1, 2017Updated 9 years ago
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago