A loader for bitbucket 2022 rce (cve-2022-36804)
☆12Apr 28, 2025Updated 10 months ago
Alternatives and similar repositories for CVE-2022-36804
Users that are interested in CVE-2022-36804 are comparing it to the libraries listed below
Sorting:
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- Updated Malware Crawler to populate repositories☆10Jul 6, 2015Updated 10 years ago
- An authentication bypass using an alternate path or channel in Fortinet product☆14Oct 27, 2022Updated 3 years ago
- some sploits☆19Sep 20, 2024Updated last year
- Exploit for CVE-2024-29847☆18Sep 15, 2024Updated last year
- ☆33Feb 27, 2018Updated 8 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated last month
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- ☆11Apr 18, 2022Updated 3 years ago
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- 哔哩哔哩-API收集整理【不断更新中....】☆10Apr 25, 2025Updated 10 months ago
- POC of CVE-2022-36537☆36Jun 18, 2025Updated 8 months ago
- A prompt-based pipeline for finding, validating, and proving vulnerabilities using LLM sub-agents.☆41Feb 22, 2026Updated last week
- Automatially unzip files added to a specified directory☆14Mar 12, 2022Updated 3 years ago
- making printf work for you☆15Nov 10, 2025Updated 3 months ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- A Web UI For Telegram Automation☆38Mar 29, 2022Updated 3 years ago
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.☆42Apr 25, 2024Updated last year
- Code with Windows Hacker☆12Oct 14, 2022Updated 3 years ago
- CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发☆15Nov 1, 2022Updated 3 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- 黑客神器,谁用谁知道!☆10Jul 10, 2019Updated 6 years ago
- 一款用于记录终端软件使用时间的开发套件☆12Feb 26, 2022Updated 4 years ago
- ☆10Jun 26, 2024Updated last year
- POC Of CVE-2022-21971☆11Oct 7, 2022Updated 3 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- go版本机器学习框架☆10May 8, 2025Updated 9 months ago
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Sep 28, 2022Updated 3 years ago
- Query LDAP and AD with SQL☆10Jun 17, 2021Updated 4 years ago
- oh no oh no this is not good very bad very good☆11Mar 8, 2023Updated 2 years ago
- PoC for CVE-2016-1000027☆12Mar 5, 2021Updated 4 years ago
- Sophos Central PowerShell module☆11Jul 11, 2023Updated 2 years ago
- CVE-2022-39197 RCE POC☆13Oct 22, 2022Updated 3 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago