gebl / dirtycow-docker-vdso
☆143Updated 4 years ago
Alternatives and similar repositories for dirtycow-docker-vdso
Users that are interested in dirtycow-docker-vdso are comparing it to the libraries listed below
Sorting:
- PoC for Dirty COW (CVE-2016-5195)☆499Updated 3 years ago
- JRE8u20_RCE_Gadget☆251Updated 8 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆173Updated 8 years ago
- Shocker / Docker Breakout PoC☆119Updated 10 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆209Updated 6 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆352Updated 3 years ago
- ☆112Updated 7 years ago
- procfs-based PHP sandbox bypass☆133Updated 6 years ago
- 🌶 一些和容器化/容器编排/服务网格等技术相关的安全代码片段[自用备份]☆81Updated 3 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆201Updated 7 years ago
- Metasploit Framework☆42Updated 8 years ago
- ☆143Updated 6 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116Updated 5 years ago
- CVE-2019-3396 confluence SSTI RCE☆174Updated 4 years ago
- CVE-2018-3245-PoC☆167Updated 3 years ago
- docker 未授权访问漏洞利用脚本☆139Updated 8 years ago
- Java Message Exploitation Tool☆502Updated 2 years ago
- Redis 4.x & 5.x RCE☆141Updated 5 years ago
- A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.☆169Updated 9 years ago
- 🐱💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱💻☆150Updated 6 years ago
- fixed msf module for cve-2017-7269☆135Updated 8 years ago
- Acunetix 0day RCE☆192Updated 9 years ago
- tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484…☆213Updated 4 years ago
- A Java serializer in JavaScript☆81Updated 6 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Updated 7 years ago
- Automatically scan the inner network to detect whether they are vulnerable.☆141Updated 4 years ago
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆117Updated 8 years ago
- WAF Research☆180Updated 2 years ago
- Some codes for bypassing Oracle WebLogic CVE-2018-2628 patch☆114Updated 6 years ago
- java unserialize vul for weblogic exploit☆175Updated 6 years ago