This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Automation's Ignition software.
☆47Dec 22, 2023Updated 2 years ago
Alternatives and similar repositories for DoubleTrouble
Users that are interested in DoubleTrouble are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- ☆82Apr 9, 2024Updated 2 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Jun 13, 2024Updated last year
- A simple to use single-include Windows API resolver☆22Jul 9, 2024Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆153May 3, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆24May 12, 2026Updated last week
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Dec 10, 2022Updated 3 years ago
- An interactive shell to spoof some LOLBins command line☆187Jan 27, 2024Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- A SKILL.md for ipsw☆55May 4, 2026Updated 2 weeks ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Feb 20, 2025Updated last year
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆39Nov 16, 2023Updated 2 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 1day practice - Escape macOS sandbox (partial) using RemoteViewServices☆45May 12, 2025Updated last year
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Brew Local Privilege Escalation exploit on Intel macOS☆19Mar 6, 2024Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13May 15, 2026Updated last week
- ☆14Jun 29, 2023Updated 2 years ago
- Spring-Kafka-Deserialization-Remote-Code-Execution☆32Oct 8, 2023Updated 2 years ago
- ☆16Mar 26, 2024Updated 2 years ago
- Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution☆84Feb 6, 2024Updated 2 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Oct 1, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆35Dec 21, 2023Updated 2 years ago
- ☆158Jul 10, 2024Updated last year
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.☆42Apr 25, 2024Updated 2 years ago
- A service container for interacting with SRA's VECTR☆17Apr 9, 2025Updated last year
- ☆20Apr 10, 2025Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- ☆54Oct 10, 2023Updated 2 years ago
- JMX enumeration and attacking tool.☆504Jun 26, 2025Updated 10 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)☆92Mar 25, 2024Updated 2 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆58Dec 29, 2024Updated last year
- A user enumeration tool for Slack.☆37Jun 10, 2024Updated last year
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- ☆10May 17, 2024Updated 2 years ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆237Sep 26, 2023Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Oct 31, 2023Updated 2 years ago