hadrian3689 / looney-tunables-CVE-2023-4911Links
☆29Updated 2 years ago
Alternatives and similar repositories for looney-tunables-CVE-2023-4911
Users that are interested in looney-tunables-CVE-2023-4911 are comparing it to the libraries listed below
Sorting:
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Updated 2 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- Python code to Serialize and Unserialize java binary serialization format.☆30Updated this week
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆24Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
- ☆73Updated last year
- POC for DLL Proxying / Hijacking☆62Updated 6 months ago
- Java archive implant toolkit.☆61Updated 7 months ago
- Automate converting webshells into reverse shells.☆71Updated 2 weeks ago
- ysoserial.net docker image☆28Updated last year
- ☆45Updated last month
- ☆41Updated 2 weeks ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- ☆27Updated 2 years ago
- ☆52Updated 9 months ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 5 months ago
- Exploits Unauth Docker API☆42Updated 7 months ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆93Updated 5 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit☆37Updated 9 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆41Updated 5 months ago
- ☆68Updated 10 months ago
- Golden collection of weak passwords☆69Updated 11 months ago
- Keycloak admin API allows low privilege users to use administrative functions☆28Updated last year
- List of some AD tools I frequently use☆51Updated 3 weeks ago
- Scanner for CVE-2024-4040☆50Updated last year
- Proof Of Concepts☆54Updated 4 months ago
- ☆63Updated last year
- Scripts that automate portions of pentests.☆55Updated 3 months ago