Reference: http://www.secgeek.net/bookfresh-vulnerability/
☆138Apr 5, 2015Updated 10 years ago
Alternatives and similar repositories for Bypass-PHP-GD-Process-To-RCE
Users that are interested in Bypass-PHP-GD-Process-To-RCE are comparing it to the libraries listed below
Sorting:
- use docker to attack web as a demo☆86Mar 24, 2016Updated 9 years ago
- procfs-based PHP sandbox bypass☆133Sep 19, 2018Updated 7 years ago
- PoC for CVE-2018-15133 (Laravel unserialize vulnerability)☆260Mar 10, 2024Updated last year
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 6 years ago
- 一个半自动化命令注入漏洞Fuzz工具(One Semi-automation command injection vulnerability Fuzz tool)☆92Sep 28, 2017Updated 8 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Aug 17, 2017Updated 8 years ago
- Github Desktop RCE PoC☆28Dec 4, 2018Updated 7 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- 动态多线程敏感信息泄露检测工具☆1,142Dec 17, 2016Updated 9 years ago
- Security-related PHP7 OPcache abuse tools and demo☆317Jan 2, 2023Updated 3 years ago
- SSRF Proxy facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery.☆479Jan 1, 2018Updated 8 years ago
- Php Codz Hacking☆669Sep 5, 2015Updated 10 years ago
- ☆82Apr 20, 2021Updated 4 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- A tool that can scan php vulnerabilities automatically using static analysis methods☆488Mar 20, 2018Updated 7 years ago
- 针对PHP网马的正则查杀☆13Jan 10, 2018Updated 8 years ago
- A script to mine email addresses in the Github repository.☆31Aug 20, 2019Updated 6 years ago
- Code-Audit-Challenges☆990Nov 17, 2018Updated 7 years ago
- 一个各种方式突破Disable_functions达到命令执行的shell☆1,198Oct 17, 2023Updated 2 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- 这是一个实验性的PHP扩展,加载这个扩展后,每次请求将可以执行一段自己的PHP代码。☆198Oct 22, 2018Updated 7 years ago
- Multi-language web CGI interfaces exploits.☆399Aug 22, 2022Updated 3 years ago
- Reverse TCP Port to UDP Forwarding Tools☆160Nov 11, 2016Updated 9 years ago
- java unserialize vulnerability payload☆21Apr 20, 2019Updated 6 years ago
- Feigong,针对各种情况自由变化的mysql注入脚本,In view of the different things freely change the mysql injection script☆107Jan 24, 2017Updated 9 years ago
- A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.☆171Apr 25, 2016Updated 9 years ago
- Environment for CVE-2019-6340 (Drupal)☆42Jun 19, 2023Updated 2 years ago
- a simple tool to detect potential security threat in php code☆316Sep 9, 2024Updated last year
- CVE-2017-13089☆55Nov 15, 2017Updated 8 years ago
- A collection of curated Java Deserialization Exploits☆591May 16, 2021Updated 4 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Web&Browser Security☆43Sep 27, 2022Updated 3 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- a project aim to collect CTF web practices .☆678Feb 15, 2023Updated 3 years ago
- ☆46May 15, 2016Updated 9 years ago