TecR0c / DoubleTroubleLinks
This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Automation's Ignition software.
☆45Updated last year
Alternatives and similar repositories for DoubleTrouble
Users that are interested in DoubleTrouble are comparing it to the libraries listed below
Sorting:
- ☆63Updated last year
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- CVE-2023-21554 Windows MessageQueuing PoC,分析见 https://www.zoemurmure.top/posts/cve_2023_21554/☆57Updated 2 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- PoC repository for CVE-2023-29007☆35Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Updated 10 months ago
- OpenSSH Pre-Auth Double Free CVE-2023-25136 POC☆47Updated 2 years ago
- Java archive implant toolkit.☆61Updated 6 months ago
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- xortigate-cve-2023-27997☆63Updated 2 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆63Updated last year
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆18Updated last year
- ☆27Updated 2 years ago
- POC for RCE vulnerability in ParseExcel library, and ParseXLSX too, as a depending library☆17Updated last year
- Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10☆13Updated 2 years ago
- php7.4.26-internalog☆13Updated 3 years ago
- PoC☆12Updated 6 months ago
- Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.☆53Updated 3 months ago
- Simple WebSocket fuzzer☆32Updated 2 years ago
- ☆38Updated 2 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Updated last year
- ☆21Updated last month
- ☆39Updated 7 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated last year
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆47Updated 9 months ago
- ☆42Updated 2 weeks ago