doyensec / CVE-2022-39299_PoC_Generator
A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-saml
☆18Updated 2 years ago
Alternatives and similar repositories for CVE-2022-39299_PoC_Generator:
Users that are interested in CVE-2022-39299_PoC_Generator are comparing it to the libraries listed below
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆18Updated last year
- Lexmark CVE-2023-26067☆23Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- Tomcat backdoor based on CS blog☆27Updated last year
- OSED Practice binary☆24Updated last year
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆13Updated last year
- A Burp extension to show the Collaborator client in a tab☆23Updated 2 years ago
- tool that generates bypasses for open redirects☆52Updated 2 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated 9 months ago
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆25Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆20Updated last year
- Query various sources for CVE proof-of-concepts☆49Updated last year
- Exploit for Microsoft SharePoint 2019☆14Updated last year
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆12Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- ☆18Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 5 months ago
- Proof of Concept Exploit for CVE-2024-9465☆28Updated 4 months ago
- ☆25Updated 8 months ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Updated last year
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆20Updated last year
- Tools for Attacking Pleasant Password Server☆21Updated last year
- PoC repository for CVE-2023-29007☆33Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- evasion of defender☆9Updated 2 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year