TecR0c / DoubleTroubleLinks
This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Automation's Ignition software.
☆46Updated 2 years ago
Alternatives and similar repositories for DoubleTrouble
Users that are interested in DoubleTrouble are comparing it to the libraries listed below
Sorting:
- ☆63Updated last year
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- CVE-2023-21554 Windows MessageQueuing PoC,分析见 https://www.zoemurmure.top/posts/cve_2023_21554/☆57Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Updated 3 years ago
- Java archive implant toolkit.☆61Updated 9 months ago
- PoC repository for CVE-2023-29007☆35Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated 2 years ago
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆49Updated last year
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Updated last year
- xortigate-cve-2023-27997☆65Updated 2 years ago
- Proof Of Concepts☆55Updated last month
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆34Updated last year
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- Proof of Concept Exploit for CVE-2024-9464☆45Updated last year
- OpenSSH Pre-Auth Double Free CVE-2023-25136 POC☆47Updated 2 years ago
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆22Updated 2 years ago
- PoC☆12Updated 9 months ago
- Authentication Bypass in GoAnywhere MFT☆65Updated 2 years ago
- A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3.☆21Updated 2 years ago
- OSED Practice binary☆24Updated 2 years ago
- 2022 CTF public release☆23Updated 3 years ago
- Simple WebSocket fuzzer☆32Updated 2 years ago
- ☆38Updated 3 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Updated 2 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 3 years ago
- RCE through a race condition in Apache Tomcat☆56Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Updated last year
- php7.4.26-internalog☆13Updated 3 years ago
- ☆41Updated 10 months ago