SSTI Payload Generator
☆93Aug 8, 2022Updated 3 years ago
Alternatives and similar repositories for ssti-payload
Users that are interested in ssti-payload are comparing it to the libraries listed below
Sorting:
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Jun 7, 2022Updated 3 years ago
- A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.☆116Jan 31, 2025Updated last year
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆24Mar 18, 2023Updated 2 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- Enumerate / Dump Docker Registry☆182Apr 10, 2024Updated last year
- Demo of a malicious python package that will run code upon pip download or install☆29Sep 10, 2022Updated 3 years ago
- Aspx reverse shell☆120Feb 4, 2020Updated 6 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Apr 2, 2021Updated 4 years ago
- An Improved Proof of Concept for CVE-2022-1388 w/ an Interactive Shell☆14May 25, 2025Updated 9 months ago
- ☆10Feb 3, 2021Updated 5 years ago
- ☆11May 15, 2020Updated 5 years ago
- QNAP N-Day (Probably not CVE-2020-2509)☆14Jul 27, 2022Updated 3 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)☆10Apr 8, 2022Updated 3 years ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 7 months ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Werkzeug password cracker☆19Nov 14, 2024Updated last year
- ☆11Feb 6, 2023Updated 3 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- Spongebob-themed cypher injection playground☆13Jun 4, 2023Updated 2 years ago
- Various scripts I've built for CTFs, hacking challenges, and for learning how various existing tools work☆17Mar 21, 2023Updated 2 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆861Feb 14, 2026Updated 3 weeks ago
- ☆54Jun 1, 2024Updated last year
- bWAPP Docker image based on raesene/bWAPP and mattrayner/lamp☆12Dec 10, 2019Updated 6 years ago
- CVE-2022-30780 - lighttpd remote denial of service☆17Mar 16, 2024Updated last year
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- Metasploit modules in testing☆14Jul 21, 2019Updated 6 years ago
- Web directory and file discovery.☆18Oct 31, 2022Updated 3 years ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆615Jul 31, 2025Updated 7 months ago
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Feb 26, 2026Updated last week
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆362Feb 12, 2024Updated 2 years ago
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,344Jul 12, 2024Updated last year
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆144Oct 27, 2019Updated 6 years ago
- Spring Boot with FreeMarker - Server Side Template Injection example☆17Jan 28, 2019Updated 7 years ago
- crawler for finding reflected parameters and reflecting special characters!☆21Dec 2, 2024Updated last year
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- Toy version of the sweet32 attack☆16Nov 24, 2017Updated 8 years ago
- Basic Website template Django 2.2 Example + Python3☆54Feb 9, 2022Updated 4 years ago