MikeTheHash / CVE-2018-5955
An exploit for CVE-2018-5955 GitStack 2.3.10 Unauthenticated RCE
☆10Updated last week
Related projects ⓘ
Alternatives and complementary repositories for CVE-2018-5955
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Updated last year
- tool that generates bypasses for open redirects☆49Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- Introduction to CYS4-SensitiveDiscoverer, a Burp extension that discovers sensitive information inside HTTP messages.☆17Updated 3 weeks ago
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆22Updated 3 years ago
- My fuzz repo!☆22Updated last year
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated last year
- ☆43Updated last year
- Open-Source Phishing Toolkit☆17Updated 3 years ago
- Scan for and exploit the zerologon vulnerability.☆10Updated 4 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Updated 3 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆32Updated 6 months ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆37Updated 2 years ago
- Unauthenticated Path Traversal in Nexus Repository 3☆2Updated 5 months ago
- Make better use of the embedded browser that comes by default with Burp☆38Updated 10 months ago
- ☆19Updated 2 months ago
- H&E- Burp Highlighter and Extractor☆18Updated last year
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 4 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆36Updated last year
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated last year
- SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration☆35Updated last year
- CVE-2023-24488 PoC☆9Updated last year
- This repository presents a proof-of-concept of CVE-2023-22527☆13Updated 9 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- Downloads Nuclei templates from a huge list of sources☆12Updated 3 weeks ago
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Updated last year
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆29Updated 9 months ago
- Central Repo for Burp extensions☆22Updated last month