A loader for bitbucket 2022 rce (cve-2022-36804)
☆12Apr 28, 2025Updated 10 months ago
Alternatives and similar repositories for CVE-2022-36804
Users that are interested in CVE-2022-36804 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The best telnet bruter for the moment, please use it for educational purpose☆26Apr 28, 2025Updated 10 months ago
- Getting the ip of a fivem server with a cfx.re link☆16Apr 28, 2025Updated 10 months ago
- some sploits☆19Sep 20, 2024Updated last year
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- A node js script to protect from ddos in Layer 7 under nginx☆27Feb 26, 2023Updated 3 years ago
- Updated Malware Crawler to populate repositories☆10Jul 6, 2015Updated 10 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆31Jun 14, 2022Updated 3 years ago
- An authentication bypass using an alternate path or channel in Fortinet product☆14Oct 27, 2022Updated 3 years ago
- Archive of Metasploit Framework v1 (Perl)☆13Sep 29, 2014Updated 11 years ago
- React hook to keep state using URL search params. Based on useSearchParams from react-router-dom@6☆13Dec 5, 2024Updated last year
- Exploit for CVE-2024-29847☆18Sep 15, 2024Updated last year
- Fork of ligolo-ng with exec and service capability☆17Oct 30, 2023Updated 2 years ago
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆25Jun 30, 2022Updated 3 years ago
- Collection of scripts to p*wn mainframes☆16Sep 20, 2017Updated 8 years ago
- http-tiny library improvments (POST, Auth, Thread)☆10Oct 13, 2013Updated 12 years ago
- POC of CVE-2022-36537☆36Jun 18, 2025Updated 9 months ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- CutefishOS GUI library, based on Qt Quick.☆23Apr 5, 2023Updated 2 years ago
- SPAM filter rules for Stalwart Mail Server☆15Dec 16, 2025Updated 3 months ago
- POC☆43Jul 21, 2025Updated 8 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆43Jan 18, 2026Updated 2 months ago
- Two ComfyUI custom nodes that convert 2D images or videos into a simulated 3D side-by-side (SBS) format☆34Jun 13, 2025Updated 9 months ago
- Lightweight reflection scanner☆20Aug 31, 2025Updated 6 months ago
- Reverse engineer obfuscated JavaScript visually. Chain transforms, inspect AST changes, write reusable deobfuscation plugins.☆102Feb 4, 2026Updated last month
- XOR-based shellcode encoder☆30Apr 20, 2023Updated 2 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆60Aug 21, 2024Updated last year
- ☆11Apr 18, 2022Updated 3 years ago
- ☆12Dec 16, 2022Updated 3 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆11Nov 6, 2022Updated 3 years ago
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Sep 28, 2022Updated 3 years ago
- Python SSH Botnet DDOS☆25Apr 13, 2021Updated 4 years ago
- ☆11Dec 22, 2023Updated 2 years ago
- Py写的tsh的流量加解密过程。☆28Aug 15, 2022Updated 3 years ago
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆35Sep 22, 2025Updated 6 months ago
- ☆33Aug 29, 2022Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- stealth userland kit that doesn't use sys_clone/sys_execve call☆35Apr 10, 2025Updated 11 months ago
- WordPress File Upload RCE Exploit☆17Sep 1, 2025Updated 6 months ago