brompwnie / CVE-2019-5418-ScannerView external linksLinks
A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418
☆35Mar 21, 2019Updated 6 years ago
Alternatives and similar repositories for CVE-2019-5418-Scanner
Users that are interested in CVE-2019-5418-Scanner are comparing it to the libraries listed below
Sorting:
- ☆17Jul 26, 2018Updated 7 years ago
- Zimbra XXE+SSRF+UPLOAD Poc☆59Jun 25, 2019Updated 6 years ago
- Installs And Executes Shellcode☆11Jul 26, 2015Updated 10 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Aug 26, 2019Updated 6 years ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- ☆11Oct 23, 2019Updated 6 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 6 years ago
- Discover MSSQL Instances via UDP Scanning☆25Dec 17, 2018Updated 7 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53May 30, 2019Updated 6 years ago
- ☆44Apr 20, 2020Updated 5 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit☆20Jun 19, 2019Updated 6 years ago
- ☆63Sep 10, 2019Updated 6 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420)☆133Jan 19, 2023Updated 3 years ago
- ☆39Oct 8, 2019Updated 6 years ago
- A Zhiyuan OA Collaborative Office Remote Code Execution Vulnerability on Windows☆37Jun 27, 2019Updated 6 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Aug 13, 2019Updated 6 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- Environment for CVE-2019-6340 (Drupal)☆42Jun 19, 2023Updated 2 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 6 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Apr 18, 2019Updated 6 years ago
- 🙈 🙉 🙊 Record keystrokes in Linux environment | Keylogger written in Go☆35Oct 23, 2018Updated 7 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated last month
- PowerShell based Microsoft DNS management tool set☆19May 26, 2016Updated 9 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Jul 7, 2019Updated 6 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- Contains poc's and my research works☆31Feb 13, 2023Updated 3 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- Set Up WebDAV Server for Remote File Sharing and more☆35Aug 22, 2019Updated 6 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago