A critical severity Remote Code Execution (RCE) vulnerability (CVE-2023-22527) was discovered in Confluence Server and Data Center.
☆22Jan 23, 2024Updated 2 years ago
Alternatives and similar repositories for CVE-2023-22527-POC
Users that are interested in CVE-2023-22527-POC are comparing it to the libraries listed below
Sorting:
- ☆11Oct 30, 2025Updated 4 months ago
- java 内存马系列 实现(Servlets 、组件、Agent)☆10Mar 7, 2022Updated 4 years ago
- ☆13Apr 25, 2024Updated last year
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- CVE-2023-52251 There is a Remote Code Execution vulnerability provectus/kafka-ui.☆20Jan 23, 2024Updated 2 years ago
- A Tool For CVE-2023-49070/CVE-2023-51467 Attack☆18Mar 12, 2024Updated last year
- Dompdf RCE PoC Exploit - CVE-2022-28368☆16Jan 19, 2024Updated 2 years ago
- CVE-2023-4634☆46Sep 7, 2023Updated 2 years ago
- 将fofa quake zoomeye hunter等空间测绘聚合的小工具☆23Aug 13, 2023Updated 2 years ago
- Windows C++ Implant for Exploration C2☆45Jan 26, 2026Updated last month
- 收集各种漏洞POC知识库☆29Sep 12, 2023Updated 2 years ago
- PoC for CVE-2023-28771 based on Rapid7's excellent writeup☆30May 23, 2023Updated 2 years ago
- 专注于java代码审计skills☆254Updated this week
- C# implementation to produce ROR-13 numeric hash for given function API name☆34May 26, 2019Updated 6 years ago
- FOFA-X是一款方便处理FOFA URL的工具☆12Nov 11, 2024Updated last year
- TLS Examples in Schannel and IO Completion Ports☆10Jun 21, 2022Updated 3 years ago
- Java代码审计学习笔记☆13Dec 20, 2024Updated last year
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆18Dec 30, 2024Updated last year
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- Movie Web with real data film☆11Sep 24, 2022Updated 3 years ago
- 递归寻找JS泄露的路径。Recursively search for the paths of JS Files.For pentest☆11Sep 30, 2024Updated last year
- A malware development library written in rust.☆13Jan 13, 2024Updated 2 years ago
- 利用shiro反序列化注入冰蝎内存马☆37Dec 19, 2021Updated 4 years ago
- Rust Based PE & Shellcode Packer☆40Dec 28, 2025Updated 2 months ago
- 一个神一般的linux全架构全漏洞提权程序☆47May 5, 2025Updated 10 months ago
- Chrome-RCE-Poc☆92Aug 24, 2024Updated last year
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Jan 7, 2021Updated 5 years ago
- tcp socket封包,解包,粘包处理(包头+包体)☆10Sep 6, 2016Updated 9 years ago
- Java ☕ reverse engineering tool - Batch decompile the jar package.☆10Feb 14, 2023Updated 3 years ago
- Java安全相关,目前主要是CC链研究☆10Sep 1, 2022Updated 3 years ago
- Basic Tonic (gRPC) example using Windows Named Pipes as transport☆11Oct 7, 2024Updated last year
- Best Tools For DDoS☆12Apr 19, 2024Updated last year
- fscan结果优化,更新DC域筛选☆10Nov 21, 2023Updated 2 years ago
- 代码审计关键词扫描工具☆11Apr 29, 2024Updated last year
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated last year
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- 灯塔v2.6.2_docker版本☆15Oct 13, 2025Updated 4 months ago
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago