doyensec / CVE-2022-39299_PoC_GeneratorLinks
A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-saml
☆19Updated 2 years ago
Alternatives and similar repositories for CVE-2022-39299_PoC_Generator
Users that are interested in CVE-2022-39299_PoC_Generator are comparing it to the libraries listed below
Sorting:
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated 2 years ago
- ☆24Updated 3 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆24Updated 2 years ago
- a deterministic finite automata ranker☆73Updated 3 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- php7.4.26-internalog☆13Updated 3 years ago
- ☆21Updated 4 months ago
- Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077☆35Updated 4 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- Query various sources for CVE proof-of-concepts☆53Updated 2 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- ☆33Updated last year
- ☆16Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36Updated 3 years ago
- ☆12Updated 3 years ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated 2 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Updated 2 years ago
- OSED Practice binary☆24Updated 2 years ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Updated 3 years ago
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Updated 4 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- Java archive implant toolkit.☆61Updated 8 months ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆14Updated last year
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆17Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- ☆42Updated 2 months ago