An authentication bypass using an alternate path or channel in Fortinet product
☆14Oct 27, 2022Updated 3 years ago
Alternatives and similar repositories for CVE-2022-40684-metasploit-scanner
Users that are interested in CVE-2022-40684-metasploit-scanner are comparing it to the libraries listed below
Sorting:
- CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发☆15Nov 1, 2022Updated 3 years ago
- POC OF CVE-2022-21970☆14Oct 20, 2022Updated 3 years ago
- A POC of CVE-2022-30206☆15Sep 26, 2022Updated 3 years ago
- A loader for bitbucket 2022 rce (cve-2022-36804)☆12Apr 28, 2025Updated 10 months ago
- 利用sudo提权,只针对cnetos7☆29Nov 3, 2022Updated 3 years ago
- IIS shortname scanner + bruteforce☆55Feb 18, 2024Updated 2 years ago
- Lexmark CVE-2023-26067☆28Aug 8, 2023Updated 2 years ago
- ☆31Nov 1, 2022Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Sep 28, 2022Updated 3 years ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Jun 9, 2023Updated 2 years ago
- Control MHI Airconditioning locally using your own ESP32-C3!☆14Oct 2, 2025Updated 5 months ago
- ☆11Dec 5, 2020Updated 5 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A prompt-based pipeline for finding, validating, and proving vulnerabilities using LLM sub-agents.☆41Feb 22, 2026Updated 2 weeks ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Python Shellcode 免杀加载器 支持图形化定制开发✌☆10Oct 23, 2022Updated 3 years ago
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- 程式人雜誌 2013 年 5 月號☆16May 2, 2013Updated 12 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- 巨量資料導論 上課資料☆13Jun 28, 2018Updated 7 years ago
- ☆10Feb 23, 2022Updated 4 years ago
- ☆10Sep 6, 2018Updated 7 years ago
- ES6 Front-End Framework☆11May 18, 2017Updated 8 years ago
- PrimeHub Python SDK☆13Apr 21, 2023Updated 2 years ago
- Slides and stuffs of the meetings during the 2018☆13Jan 18, 2022Updated 4 years ago
- A python exploit to automatically dump all the data stored by the auto-completion plugin of Ametys CMS to a local sqlite database file.☆14May 3, 2022Updated 3 years ago
- POC Of CVE-2022-21971☆11Oct 7, 2022Updated 3 years ago
- RUSTENGINE is the high-assurance HTTP server.☆11Aug 11, 2021Updated 4 years ago
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Sep 28, 2022Updated 3 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- ☆12Dec 16, 2022Updated 3 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Ekko is a Golang-based todo list app that can be expanded into a Jira-like issue tracker with workflow management, collaboration tools, a…☆11Mar 1, 2026Updated last week
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- An exploit for CVE-2018-5955 GitStack 2.3.10 Unauthenticated RCE☆10Nov 15, 2024Updated last year
- 一款全自动化弱口令检测工具☆15Aug 11, 2025Updated 6 months ago
- CVE-2022-39197 RCE POC☆13Oct 22, 2022Updated 3 years ago
- jsinfo-scan简单改版,增加了swagger、druid目录扫描和手机号、身份证号敏感信息匹配☆45Oct 22, 2021Updated 4 years ago