Proof-of-Concept for Server Side Request Forgery (SSRF) in request-baskets (<= v.1.2.1)
☆30Aug 9, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-27163
Users that are interested in CVE-2023-27163 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RCE Exploit For Maltrail-v0.53☆56Oct 29, 2023Updated 2 years ago
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Jun 27, 2023Updated 2 years ago
- Yet another Werkzeug Console Pin Exploit Explanation☆23Jul 30, 2021Updated 4 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit☆26Dec 29, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Vulnerabilities Exploitation On Ubuntu 22.04☆49May 16, 2023Updated 2 years ago
- Implementation of a popular graphics benchmark written on Ebitengine.☆29Jun 22, 2022Updated 3 years ago
- A proof of concept for CVE-2023–1326 in apport-cli 2.26.0☆21Dec 6, 2023Updated 2 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- GameOver(lay) Ubuntu Privilege Escalation☆133Oct 9, 2023Updated 2 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆14Aug 17, 2022Updated 3 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- Quake Command-Line Application With Golang☆10Jul 20, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- POC for CVE-2021-41091☆65May 20, 2023Updated 2 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.☆72Aug 28, 2025Updated 7 months ago
- This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due…☆18Jan 24, 2024Updated 2 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- Root shell PoC for CVE-2021-3156☆71Feb 3, 2021Updated 5 years ago
- CVE-2021-4034 for single commcand☆10May 31, 2022Updated 3 years ago
- ClinetTik application, search for a text or account among the comments on TikTok easily 😉☆13Dec 15, 2023Updated 2 years ago
- Precompiled executable☆64Feb 21, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- Xdos-server is a type of DDOS {Distributed Denial of Service} by sending as many bots as possible to flood the server until it goes down☆11Oct 16, 2025Updated 5 months ago
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- Modified caesar's-cipher-based encrypt system written in C++.☆22Apr 9, 2023Updated 2 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆16Nov 2, 2022Updated 3 years ago
- Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)☆125Jan 20, 2024Updated 2 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Feb 27, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- w4b-file : WebFile Analyzer is an advanced command-line utility meticulously crafted for web developers, security professionals, and rese…☆11Nov 16, 2023Updated 2 years ago
- ☆11Mar 8, 2026Updated 3 weeks ago
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- ☆13Aug 25, 2021Updated 4 years ago