doyensec / CVE-2022-39299_PoC_GeneratorLinks
A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-saml
☆19Updated 2 years ago
Alternatives and similar repositories for CVE-2022-39299_PoC_Generator
Users that are interested in CVE-2022-39299_PoC_Generator are comparing it to the libraries listed below
Sorting:
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated last year
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- OSED Practice binary☆24Updated last year
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- ☆20Updated 2 years ago
- php7.4.26-internalog☆13Updated 2 years ago
- ☆18Updated 2 months ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 9 months ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆18Updated last year
- Tomcat backdoor based on CS blog☆27Updated last year
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- ☆30Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆23Updated 5 months ago
- ☆18Updated 2 weeks ago
- CTF challenges WriteUp☆14Updated 2 years ago
- Lexmark CVE-2023-26067☆25Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 7 months ago
- ☆26Updated 3 years ago
- ☆52Updated last year
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 2 years ago
- ☆35Updated last month
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated last year
- A collection of utilities for building extensions using Burp's Montoya API☆50Updated 11 months ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- ☆14Updated last week
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago