Writeup of CVE-2017-1002101 with sample "exploit"/escape
☆35Mar 23, 2018Updated 7 years ago
Alternatives and similar repositories for subpath-exploit
Users that are interested in subpath-exploit are comparing it to the libraries listed below
Sorting:
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 7 years ago
- CVE-2018-3191 反弹shell☆16Oct 23, 2018Updated 7 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- 群晖使用钉钉机器人做消息通知☆10Jun 9, 2020Updated 5 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- ☆56Nov 29, 2017Updated 8 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67May 27, 2018Updated 7 years ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Nov 2, 2013Updated 12 years ago
- 一些Java RASP demo☆11Sep 26, 2019Updated 6 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 9 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Apr 1, 2020Updated 5 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- 漏洞复现记录☆11Jun 18, 2019Updated 6 years ago
- CVE-2018-3191 反弹shell☆63Oct 23, 2018Updated 7 years ago
- Tool for CVE-2018-16323☆82Jan 17, 2019Updated 7 years ago
- ☆21Jul 10, 2017Updated 8 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 8 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- !!!不建议使用了,可以使用AuditBeat!!! Linux服务器命令监控辅助脚本,ElasticSearch + Logstash + Kibana + Redis + Auditd☆28Apr 10, 2019Updated 6 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- 从扫描器结果分离出的一些大公司泛解析ip列表☆60Jun 8, 2017Updated 8 years ago
- 一些漏洞场景的还原,基于https://www.exploit-db.com/☆37Feb 7, 2018Updated 8 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- Ruby interface to cirt.net default passwords database☆19May 4, 2011Updated 14 years ago
- ☆41Nov 9, 2018Updated 7 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- DNS Botnet Server and Client☆34Aug 28, 2025Updated 6 months ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 7 years ago