This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Automation's Ignition software.
☆47Dec 22, 2023Updated 2 years ago
Alternatives and similar repositories for DoubleTrouble
Users that are interested in DoubleTrouble are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- ☆82Apr 9, 2024Updated 2 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆89Jun 13, 2024Updated last year
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆154May 3, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆19Mar 7, 2026Updated last month
- An interactive shell to spoof some LOLBins command line☆187Jan 27, 2024Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- A SKILL.md for ipsw☆53Jan 27, 2026Updated 3 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Feb 20, 2025Updated last year
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago
- 1day practice - Escape macOS sandbox (partial) using RemoteViewServices☆45May 12, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Brew Local Privilege Escalation exploit on Intel macOS☆19Mar 6, 2024Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated 2 years ago
- ☆15Jul 3, 2025Updated 10 months ago
- ☆14Jun 29, 2023Updated 2 years ago
- Spring-Kafka-Deserialization-Remote-Code-Execution☆32Oct 8, 2023Updated 2 years ago
- ☆16Mar 26, 2024Updated 2 years ago
- Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution☆84Feb 6, 2024Updated 2 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Oct 1, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆35Dec 21, 2023Updated 2 years ago
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.☆42Apr 25, 2024Updated 2 years ago
- A service container for interacting with SRA's VECTR☆17Apr 9, 2025Updated last year
- ☆20Apr 10, 2025Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago