Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB
☆25Feb 6, 2024Updated 2 years ago
Alternatives and similar repositories for CVE-2020-11579
Users that are interested in CVE-2020-11579 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Nexus Repository Manager3 - 远程执行代码漏洞回显payload☆13Sep 29, 2020Updated 5 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆29Sep 11, 2021Updated 4 years ago
- some struts tag , attributes which out of the range will call SetDynamicAttribute() function, it will cause ONGL expression execute☆70Dec 14, 2020Updated 5 years ago
- Python Script for SAML2 Authentication Passwordspray☆40Jul 5, 2023Updated 2 years ago
- Implementation of SpoolSample without rDLL☆29Sep 28, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Parses logs created by Cobalt Strike, Brute Ratel, OC2 and creates an SQLite DB which can be used to create custom reports.☆27Mar 18, 2026Updated last month
- Python exploit of cve-2020-7247☆25Feb 19, 2020Updated 6 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆125Nov 14, 2022Updated 3 years ago
- ☆106May 4, 2020Updated 6 years ago
- ☆24Oct 31, 2023Updated 2 years ago
- PoC for CVE-2021-43557☆22Nov 22, 2021Updated 4 years ago
- PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Or…☆96Jul 21, 2020Updated 5 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Terraform project to build AWS instances for pivot practice☆12May 15, 2023Updated 2 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆28Nov 11, 2020Updated 5 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆107May 25, 2020Updated 5 years ago
- ☆32Aug 9, 2019Updated 6 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆225Sep 29, 2020Updated 5 years ago
- public exploits☆36May 11, 2023Updated 2 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)☆52Sep 19, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆182Aug 22, 2020Updated 5 years ago
- OpenFire 管理后台账 号密码解密☆30Dec 15, 2020Updated 5 years ago
- Binary reversing tool to find all possible code paths between two functions.☆28Apr 25, 2018Updated 8 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- ☆35Nov 2, 2022Updated 3 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49May 3, 2017Updated 9 years ago
- ☆11Mar 11, 2016Updated 10 years ago
- Stuff for the DEFCON 24 Car Hacking Village Badge☆13Sep 4, 2016Updated 9 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- a exec jsp shell, simply like weevely php C/S shell.☆15Jun 21, 2022Updated 3 years ago
- huawei mac2wepkey scanner