MAYASEVEN / CVE-2016-6662Links
From SQL injection to root shell with CVE-2016-6662 by MaYaSeVeN
☆29Updated 8 years ago
Alternatives and similar repositories for CVE-2016-6662
Users that are interested in CVE-2016-6662 are comparing it to the libraries listed below
Sorting:
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆128Updated 3 years ago
- Burp Suite Attack Selector Plugin☆60Updated 7 years ago
- CVE-2018-7600 Drupal RCE☆114Updated 7 years ago
- WebLogic Exploit☆142Updated 7 years ago
- ☆43Updated 5 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Updated 12 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Updated 8 years ago
- Gogs CVEs☆79Updated 5 years ago
- It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).☆55Updated 3 years ago
- Java serialization brute force attack tool.☆123Updated 8 years ago
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆100Updated 6 years ago
- ☆63Updated 6 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 7 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 9 years ago
- Atlassian JIRA Template injection vulnerability RCE☆93Updated 6 years ago
- Another plugin for CRLF vulnerability detection☆26Updated 8 years ago
- ☆34Updated 6 years ago
- Python Web framework P0wner☆75Updated 12 years ago
- Full TTY reverse shell over SSH☆58Updated 5 years ago
- X41 BeanStack - Stack Trace Fingerprinting BETA☆52Updated 4 years ago
- CORS checking☆34Updated 7 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Updated 6 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container☆47Updated last year
- CVE-2018-2893-PoC☆104Updated 7 years ago
- CVE-2019-0604☆133Updated 6 years ago
- YSOSERIAL Integration with burp suite☆41Updated 3 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Updated 7 years ago
- Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect☆133Updated 3 years ago