A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-saml
☆19Feb 8, 2023Updated 3 years ago
Alternatives and similar repositories for CVE-2022-39299_PoC_Generator
Users that are interested in CVE-2022-39299_PoC_Generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Blogpost series showcasing interesting cloud - web app security bugs☆49Jun 13, 2023Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆21Mar 23, 2026Updated 3 weeks ago
- exploitation of php use-after-free vulnerabilities on 64 bit systems | poc||gtfo☆12Apr 8, 2015Updated 11 years ago
- Public Cybersecurity Research & Advisories☆22Jan 12, 2026Updated 3 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Updated version of the ProtoBurp Extension, with enhanced features and capabilities to encode and fuzz custom protobuf messages☆36Sep 11, 2023Updated 2 years ago
- Reversing Citrix Gateway for XSS☆17Jul 3, 2023Updated 2 years ago
- Dependency Confusion Security Testing Tool☆51Jul 21, 2022Updated 3 years ago
- ☆93Apr 29, 2024Updated last year
- Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.☆13Apr 5, 2025Updated last year
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Sep 23, 2022Updated 3 years ago
- ☆14Feb 12, 2026Updated 2 months ago
- A tampered payload generator to Fuzz Web Application Firewalls☆34Nov 4, 2019Updated 6 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CVE-2022-41852 Proof of Concept (unofficial)☆75Oct 20, 2022Updated 3 years ago
- ☆10Feb 3, 2021Updated 5 years ago
- DPAPI looting remotely and locally in Python☆546Mar 13, 2026Updated last month
- ☆37May 8, 2022Updated 3 years ago
- JSON Web Tokens for Zig☆41Aug 21, 2025Updated 7 months ago
- A SOCKS proxy for Citrix.☆97Dec 8, 2022Updated 3 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 4 months ago
- Tiny helper to protect against Prototype Pollution vulnerabilities in your application regardless if they introduced in your own code or …☆35Nov 2, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- Exploits targeting vBulletin.☆74Apr 15, 2023Updated 3 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆29Jul 21, 2025Updated 8 months ago
- cve-2020-0688 UNIVERSAL Python implementation utilizing ASPX webshell for command output☆24Sep 12, 2023Updated 2 years ago
- A Python Library designed to facilitate interaction with Synack's undocumented API endpoints☆25Mar 4, 2025Updated last year
- Server prepared for SSRF post exploitation, javascript exploits and open redirect.☆13Jan 4, 2023Updated 3 years ago
- ☆34Apr 16, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12Apr 17, 2022Updated 4 years ago
- unicode abnormalizer to takes a unicode string and abnormalizes it by character replacment☆26Jun 27, 2020Updated 5 years ago
- Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519☆62Aug 14, 2024Updated last year
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- Session Hijacking Visual Exploitation☆212Mar 7, 2024Updated 2 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆13Oct 24, 2024Updated last year
- A pre-authenticated RCE exploit for Inductive Automation Ignition☆48Jul 18, 2022Updated 3 years ago