gigaryte / cve-2022-31898Links
Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215
☆17Updated 2 years ago
Alternatives and similar repositories for cve-2022-31898
Users that are interested in cve-2022-31898 are comparing it to the libraries listed below
Sorting:
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆19Updated 2 years ago
- Terminate the eventlog thread to disable the windows eventlog☆20Updated 5 years ago
- Post-Exploitation script to exfiltrate 7-zip files☆10Updated 2 years ago
- CVE-2019-1040 with Kerberos delegation☆34Updated 3 years ago
- ☆14Updated 4 years ago
- Use current thread token to execute command☆15Updated 4 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Updated last year
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- CVE-2022-24112:Apache APISIX apisix/batch-requests RCE☆44Updated 3 years ago
- CobaltStrike Extentions☆38Updated 3 years ago
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆26Updated last year
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- F5 BIG-IP 任意文件读取+远程命令执行RCE☆13Updated 4 years ago
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆20Updated last year
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆60Updated 3 years ago
- ☆12Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- PoC for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. Although it was defined as remote command execution, it can …☆9Updated 4 years ago
- Windows 7/2008 R2 EoP☆13Updated 4 years ago
- ☆18Updated 3 years ago
- CVE-2021-33766-poc☆10Updated 3 years ago
- Windows Persistence Collection☆12Updated 4 years ago
- Beacon Object Files.☆35Updated last year
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Updated 3 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated last year
- POC from TestANull for CVE-2021-28482 on Exchange Server☆45Updated 4 years ago
- Burp Suite extension for parsing Swagger web service definition files☆19Updated 6 months ago
- Case for CVE-2022-30778☆23Updated 2 years ago
- ☆21Updated 3 years ago