☆16Aug 2, 2018Updated 7 years ago
Alternatives and similar repositories for CVE
Users that are interested in CVE are comparing it to the libraries listed below
Sorting:
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Jun 15, 2018Updated 7 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- 安全狗sql注入绕过☆29Mar 21, 2018Updated 7 years ago
- SecurityPaper For www.polaris-lab.com☆104Mar 13, 2019Updated 6 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- Identify vulnerable libraries in Maven dependencies☆46Dec 14, 2022Updated 3 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- GUI版 EXP☆14Mar 20, 2019Updated 6 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- ☆20Oct 22, 2019Updated 6 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- A script to mine email addresses in the Github repository.☆31Aug 20, 2019Updated 6 years ago
- 可能有一些你没见过的端口扫描脚本☆12Nov 28, 2018Updated 7 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Some codes for bypassing Oracle WebLogic CVE-2018-2628 patch☆114May 21, 2018Updated 7 years ago
- carbanak\group_ib_smart_boys☆12Jul 12, 2018Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- pentest floating repo (based off git submodules), and some useful scripts i wrote☆35Aug 24, 2022Updated 3 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 7 years ago
- some java code i met or i used☆29May 7, 2019Updated 6 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Apr 18, 2017Updated 8 years ago
- steal Windows Telegram Desktop session☆15Sep 8, 2020Updated 5 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- ☆17Apr 8, 2015Updated 10 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- CMS指纹识别☆17Jan 8, 2019Updated 7 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- Green-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.☆130Aug 13, 2018Updated 7 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago