Rogdham / CVE-2018-11235
PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules
☆49Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2018-11235
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 6 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 7 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆56Updated 8 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- Python Web framework P0wner☆75Updated 11 years ago
- A Java serializer in JavaScript☆82Updated 6 years ago
- A simple Burp extension for scanning stuffs in CTF☆30Updated 6 years ago
- ☆34Updated 5 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆125Updated 2 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆53Updated 2 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆52Updated 11 years ago
- ☆27Updated 3 years ago
- Java serialization brute force attack tool.☆124Updated 7 years ago
- Unified repository for different Metasploit Framework payloads☆47Updated 4 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 8 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆41Updated 11 months ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Updated 5 years ago
- It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).☆55Updated 3 years ago
- ☆70Updated 7 years ago
- X41 BeanStack - Stack Trace Fingerprinting BETA☆52Updated 4 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆33Updated 7 years ago
- Study about HQL injection exploitation.☆49Updated 8 years ago
- Burp Suite Attack Selector Plugin☆62Updated 7 years ago
- Environment for CVE-2019-6340 (Drupal)☆42Updated last year
- ☆45Updated 8 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆41Updated 5 years ago