doyensec / CVE-2022-39299_PoC_GeneratorLinks
A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-saml
☆19Updated 2 years ago
Alternatives and similar repositories for CVE-2022-39299_PoC_Generator
Users that are interested in CVE-2022-39299_PoC_Generator are comparing it to the libraries listed below
Sorting:
- ☆22Updated 3 years ago
- ☆21Updated 2 months ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Updated 3 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- OSED Practice binary☆24Updated 2 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 4 years ago
- PoC repository for CVE-2023-29007☆35Updated 2 years ago
- ☆12Updated 3 years ago
- ☆14Updated 11 months ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- Query various sources for CVE proof-of-concepts☆52Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- a deterministic finite automata ranker☆72Updated 3 years ago
- Java archive implant toolkit.☆61Updated 7 months ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- A python-based padding oracle tool☆20Updated last year
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- Exactly what it sounds like, which is something rad☆23Updated 3 years ago
- Lexmark CVE-2023-26067☆28Updated 2 years ago
- ☆32Updated last year
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated last year
- A tool to abuse Exchange services☆12Updated last year
- ☆12Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated 2 years ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17Updated last year
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated last month