gigaryte / cve-2022-31898Links
Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215
☆17Updated 3 years ago
Alternatives and similar repositories for cve-2022-31898
Users that are interested in cve-2022-31898 are comparing it to the libraries listed below
Sorting:
- Windows Oracle Database Attack Toolkit☆80Updated 3 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 3 years ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆21Updated 3 years ago
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆20Updated last year
- the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An aut…☆34Updated 3 years ago
- An improvement over the original Mimikatz wrapper.☆19Updated 4 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆84Updated 2 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Updated 2 years ago
- Terminate the eventlog thread to disable the windows eventlog☆21Updated 5 years ago
- MacOS C2 Framework☆85Updated 4 years ago
- CobaltStrike Extentions☆40Updated 4 years ago
- The king of shell -Javaweb Memory Shell☆26Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆38Updated 3 years ago
- RCE on Apache Solr 8.3.1☆42Updated 2 years ago
- 针对多个框架的高度自定义的内存马 一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆48Updated last year
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Updated last year
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Updated 2 years ago
- Ivanti EPM AgentPortal RCE Vulnerability☆20Updated last year
- CVE-2023-22621: SSTI to RCE by Exploiting Email Templates affecting Strapi Versions <=4.5.5☆24Updated 2 years ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆69Updated 5 months ago
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆27Updated last year
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Updated 3 years ago
- Case for CVE-2022-30778☆23Updated 3 years ago
- CVE-2022-24112:Apache APISIX apisix/batch-requests RCE☆44Updated 3 years ago
- Beacon Object Files.☆36Updated last year
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Updated last year
- CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server☆91Updated 2 years ago