buffered4ever / Exploits
None of the exploit code or research is my own but all available in public domain
☆28Updated 5 years ago
Alternatives and similar repositories for Exploits:
Users that are interested in Exploits are comparing it to the libraries listed below
- ☆63Updated 5 years ago
- Directory transversal to remote code execution☆69Updated 5 years ago
- Atlassian JIRA Template injection vulnerability RCE☆93Updated 5 years ago
- ☆65Updated 4 years ago
- Sample Spring Boot App Demonstrating RCE via Exposed env Actuator and H2 Database☆104Updated 5 years ago
- ☆34Updated 5 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆76Updated 7 years ago
- 用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞☆52Updated 4 years ago
- Citrix ADC Vulns☆86Updated 4 years ago
- Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11/12☆94Updated 2 years ago
- CVE-2020-8163 - Remote code execution of user-provided local names in Rails☆61Updated 2 years ago
- Learn how to get a reverse shell from JIRA application server☆24Updated 6 years ago
- JWT_Brute☆32Updated 5 years ago
- Weblogic Unrestricted File Upload☆52Updated 5 years ago
- WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit☆47Updated 5 years ago
- X41 BeanStack - Stack Trace Fingerprinting BETA☆52Updated 4 years ago
- PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)☆89Updated 4 years ago
- Some private tools i decided to release for public.☆49Updated last year
- CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE☆62Updated last year
- Jira未授权SSRF漏洞☆31Updated 5 years ago
- Poc Collected for study and develop☆30Updated 4 years ago
- ☆116Updated 4 years ago
- Webshell for Razor Syntax (C#)☆20Updated 7 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆67Updated 5 years ago
- ☆32Updated 4 years ago
- CVE-2020-0688 - Exchange☆65Updated 5 years ago
- XSS payloads for edge cases☆34Updated 6 years ago
- Burp extension that add a tab to edit Office Open XML document (xlsx,docx,pptx)☆13Updated 7 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- ☆111Updated 5 years ago