gbonacini / CVE-2016-5195
A CVE-2016-5195 exploit example.
☆320Updated 7 years ago
Alternatives and similar repositories for CVE-2016-5195:
Users that are interested in CVE-2016-5195 are comparing it to the libraries listed below
- Rogue MySql Server☆467Updated 11 years ago
- ☆467Updated last year
- Redis 4.x/5.x RCE☆944Updated 3 years ago
- MySQL fake server for read files of connected clients☆591Updated 7 years ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆497Updated 2 years ago
- SHELLING - a comprehensive OS command injection payload generator☆440Updated 4 years ago
- Redis(<=5.0.5) RCE☆1,017Updated last year
- J2EEScan is a plugin for Burp Suite Proxy. The goal of this plugin is to improve the test coverage during web application penetration tes…☆650Updated last year
- Java RMI enumeration and attack tool.☆724Updated 7 years ago
- Multi-language web CGI interfaces exploits.☆389Updated 2 years ago
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆513Updated 4 years ago
- Java Message Exploitation Tool☆495Updated 2 years ago
- an IIS shortname Scanner☆537Updated 2 years ago
- POC of https://research.checkpoint.com/extracting-code-execution-from-winrar/☆268Updated 5 years ago
- tools☆539Updated 5 years ago
- office-exploits Office漏洞集合 https://www.sec-wiki.com☆424Updated 6 years ago
- CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882☆541Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆589Updated 3 years ago
- WebLogic wls9-async反序列化远程命令执行漏洞☆241Updated 5 years ago
- CVE-2018-8120 Windows LPE exploit☆495Updated 6 years ago
- Redis 4.x/5.x RCE☆535Updated 4 years ago
- Support ALL Windows Version☆714Updated 4 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆900Updated 4 years ago
- Create a TCP circuit through validly formed HTTP requests☆344Updated 7 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆732Updated 8 years ago
- A collection of pentest and development tips☆1,105Updated 2 years ago
- fixed msf module for cve-2017-7269☆134Updated 7 years ago
- Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!☆295Updated 5 years ago