crowsec-edtech / CVE-2021-26084Links
CVE-2021-26084 - Confluence Pre-Auth RCE | OGNL injection
☆21Updated 4 years ago
Alternatives and similar repositories for CVE-2021-26084
Users that are interested in CVE-2021-26084 are comparing it to the libraries listed below
Sorting:
- Primefaces <= 5.2.21, 5.3.8 or 6.0 - Remote Code Execution Exploit☆91Updated last year
- POC which exploits a vulnerability within Nagios XI (5.6.5) to spawn a root shell☆13Updated 4 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆56Updated 5 years ago
- Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519☆61Updated last year
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆183Updated 3 years ago
- ☆282Updated 3 years ago
- Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)☆55Updated 4 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- Practice hacking JWT tokens☆116Updated 3 years ago
- Workshop given at Hack in Paris 2019☆124Updated 2 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆94Updated 4 years ago
- Apache Spark Shell Command Injection Vulnerability☆87Updated 3 years ago
- Exploitation toolkit for RichFaces☆105Updated 2 years ago
- 😛 Golang project to exploit an EL Injection vulnerability (CVE-2017-1000486) that affects the Primefaces 5.X versions. This project supp…☆18Updated 2 years ago
- ☆205Updated 4 years ago
- PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)☆87Updated 3 years ago
- Insecure programming functions database☆105Updated 2 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆157Updated 4 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- Wordlist to bruteforce for LFI☆126Updated 6 years ago
- A simple tool to detect vulnerabilities described here https://portswigger.net/research/browser-powered-desync-attacks.☆36Updated 3 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Updated 4 months ago
- ☆215Updated 2 years ago
- ☆51Updated 3 years ago
- ☆28Updated last year
- PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)☆81Updated 4 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- Improve automated and semi-automated active scanning in Burp Pro☆62Updated 5 months ago
- A python script to merge multiple jar files for easier debugging via JD-Eclipse☆62Updated 2 years ago