Zeyad-Azima / CVE-2022-1388
F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB
☆12Updated 2 years ago
Alternatives and similar repositories for CVE-2022-1388
Users that are interested in CVE-2022-1388 are comparing it to the libraries listed below
Sorting:
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆44Updated 2 years ago
- Open-Source Phishing Toolkit☆19Updated 3 years ago
- ☆25Updated last year
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960☆2Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆26Updated last year
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆12Updated last year
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆14Updated 3 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆52Updated 8 months ago
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆23Updated 3 years ago
- Crackmapexec custom scripts used in my internal pentests.☆24Updated last year
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- ☆47Updated 3 years ago
- ☆34Updated 3 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated last month
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- Zimbra Unauthenticated Remote Code Execution Exploit (CVE-2022-27925)☆56Updated 2 years ago
- Vulnerable Windows Application☆15Updated last year
- InfluxDB CVE-2019-20933 vulnerability exploit☆39Updated 3 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆28Updated 5 years ago
- Scan for and exploit the zerologon vulnerability.☆10Updated 4 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- .Net Assembly loader for the GMSAPasswordReader☆12Updated 2 years ago
- Exploits targeting vBulletin.☆76Updated 2 years ago