Vozec / CVE-2023-22527Links
This repository presents a proof-of-concept of CVE-2023-22527
☆11Updated last year
Alternatives and similar repositories for CVE-2023-22527
Users that are interested in CVE-2023-22527 are comparing it to the libraries listed below
Sorting:
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- Multithreaded spraying of a password on all accounts of a domain.☆23Updated 9 months ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Updated 9 months ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆20Updated 5 months ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- A Python script to find tenant id an region from a list of domain names.☆15Updated 10 months ago
- A script used to query the dehashed API and filter for more useful results☆17Updated 4 years ago
- Cobalt Strike BOFS☆16Updated last year
- ☆27Updated 2 years ago
- ☆22Updated 2 years ago
- Tomcat backdoor based on CS blog☆27Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Updated 2 years ago
- A collection of http fuzzing python scripts to fuzz HTTP servers for bugs.☆15Updated 2 years ago
- Proof of Concept Exploit for CVE-2024-9465☆30Updated last year
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.☆23Updated 2 years ago
- ☆53Updated 2 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆17Updated last year
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 3 years ago
- Exploits Unauth Docker API☆42Updated 7 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Updated 7 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 4 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- Right-To-Left Override POC☆36Updated 3 years ago
- CVE-2013-4786 Go exploitation tool☆39Updated 2 weeks ago
- ☆20Updated last year