gigaryte / cve-2022-31898Links
Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215
☆17Updated 2 years ago
Alternatives and similar repositories for cve-2022-31898
Users that are interested in cve-2022-31898 are comparing it to the libraries listed below
Sorting:
- Windows Oracle Database Attack Toolkit☆80Updated 3 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆20Updated last year
- An improvement over the original Mimikatz wrapper.☆19Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆83Updated 2 years ago
- the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An aut…☆34Updated 2 years ago
- CobaltStrike Extentions☆38Updated 3 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆60Updated 3 years ago
- CVE-2022-29464 Exploit☆1Updated last year
- MacOS C2 Framework☆84Updated 3 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- Zimbra RCE simple poc☆66Updated 2 years ago
- F5 BIG-IP 任意文件读取+远程命令执行RCE☆13Updated 5 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Updated last year
- Terminate the eventlog thread to disable the windows eventlog☆21Updated 5 years ago
- The king of shell -Javaweb Memory Shell☆25Updated 2 years ago
- POC of CVE-2021-2394☆21Updated 4 years ago
- Case for CVE-2022-30778☆23Updated 2 years ago
- Atlassian Questions Hardcoded Password (CVE-2022-26138)☆31Updated 3 years ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆67Updated last year
- Beacon Object Files.☆37Updated last year
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆38Updated 3 years ago
- golang amsi bypass☆30Updated 3 years ago
- Winsocket for Cobalt Strike.☆99Updated 2 years ago
- Hikvision log4j PoC☆64Updated 2 years ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆20Updated 2 years ago
- PoC for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. Although it was defined as remote command execution, it can …☆9Updated 4 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆62Updated 2 years ago
- ☆16Updated 2 years ago