Ostorlab / agent_asteroidLinks
Agent responsible for detecting remote vulnerabilities, a robust scanner.
☆35Updated 3 weeks ago
Alternatives and similar repositories for agent_asteroid
Users that are interested in agent_asteroid are comparing it to the libraries listed below
Sorting:
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Updated last year
- ☆63Updated 2 months ago
- ☆44Updated 5 months ago
- VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)☆96Updated 2 years ago
- ZDI presentations, publications, whitepapers etc☆62Updated last year
- ☆114Updated 2 years ago
- Apache Solr Backup/Restore APIs RCE Poc (CVE-2023-50386)☆63Updated last year
- PoC for CVE-2024-27130☆36Updated last year
- CVE-2025-49844 (RediShell)☆318Updated 3 months ago
- Cloud Penetration Testing Toolkit☆106Updated last week
- POC for RCE vulnerability in ParseExcel library, and ParseXLSX too, as a depending library☆18Updated last year
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.☆44Updated 2 years ago
- Research analysis☆56Updated last month
- Ruby-SAML / GitLab Authentication Bypass (CVE-2024-45409) exploit☆82Updated last year
- ☆29Updated last year
- A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate f…☆84Updated 2 months ago
- Breaking git with a carriage return and cloning RCE☆50Updated 6 months ago
- CVE-2022-41852 Proof of Concept (unofficial)☆75Updated 3 years ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Updated last year
- ☆90Updated last year
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385)☆51Updated 2 years ago
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆32Updated last year
- A tool for identifying and exploiting vulnerable Viewstate implementations in ASP.NET☆59Updated last month
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆27Updated last year
- The king of shell -Javaweb Memory Shell☆26Updated 2 years ago
- Burp Suite Extension - Trigger actions and reshape HTTP request/response and WebSocket traffic using configurable rules☆105Updated last month
- PAN-OS auth bypass + RCE☆47Updated last year
- ☆38Updated 4 years ago
- A tool for analyzing vulnerabilities in JWT tokens. Advanced JWT Vulnerability Scanner & Exploitation Toolkit☆45Updated last month
- Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)☆91Updated last year