doyensec / CVE-2022-39299_PoC_Generator
A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-saml
☆19Updated 2 years ago
Alternatives and similar repositories for CVE-2022-39299_PoC_Generator:
Users that are interested in CVE-2022-39299_PoC_Generator are comparing it to the libraries listed below
- OSED Practice binary☆24Updated last year
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- Tomcat backdoor based on CS blog☆27Updated last year
- ☆20Updated 2 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated 11 months ago
- Query various sources for CVE proof-of-concepts☆51Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 6 months ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 11 months ago
- A tool to abuse Exchange services☆10Updated last year
- ☆19Updated last year
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆16Updated 10 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- ☆16Updated last month
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- Asynchronous NFSv3 client in pure Python☆26Updated last month
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 8 months ago
- Dump Linux keyrings☆19Updated 9 months ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated last year
- ☆21Updated last month
- A little implant which SSH's back with a shell☆37Updated 3 years ago
- Java archive implant toolkit.☆60Updated this week
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3.☆20Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 9 months ago
- ☆23Updated 3 years ago
- php7.4.26-internalog☆13Updated 2 years ago