POC for RCE vulnerability in ParseExcel library, and ParseXLSX too, as a depending library
☆18Sep 20, 2024Updated last year
Alternatives and similar repositories for perl_spreadsheet_excel_rce_poc
Users that are interested in perl_spreadsheet_excel_rce_poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆24Nov 29, 2020Updated 5 years ago
- ☆19May 1, 2025Updated 10 months ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- cve-2025-24813验证脚本☆11Mar 14, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago
- Python Script to quickly check if a host is running NetScaler Gateway and/or AAA☆12Jul 27, 2023Updated 2 years ago
- ☆40Apr 23, 2025Updated 11 months ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last month
- 蜜罐捕获的数据☆12May 16, 2016Updated 9 years ago
- ☆13Jul 26, 2021Updated 4 years ago
- A fast, deterministic, non-cryptographic hash for use in hash tables for Rust☆15Jan 12, 2021Updated 5 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- This is a powershell module to help implement the AD Tier Model☆15Feb 17, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- JLU drcom client written in golang.☆12Sep 4, 2019Updated 6 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- ☆18May 18, 2018Updated 7 years ago
- CTF&RealWorld challenges☆26Oct 18, 2019Updated 6 years ago
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Nov 19, 2024Updated last year
- ☆40Jun 10, 2023Updated 2 years ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated 2 months ago
- Spring-Kafka-Deserialization-Remote-Code-Execution☆32Oct 8, 2023Updated 2 years ago
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆27May 21, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🐲 separate user on windows + firejail on linux + sandbox-exec on macOS☆21Feb 21, 2026Updated last month
- POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon☆106Mar 14, 2023Updated 3 years ago
- Automatically deploy a Cuckoo sandbox☆23Jun 6, 2023Updated 2 years ago
- DragonNest .pak extraction via quickbms script☆17May 18, 2015Updated 10 years ago
- ☆14Sep 5, 2024Updated last year
- CVE-2023-21554 Windows MessageQueuing PoC,分析见 https://www.zoemurmure.top/posts/cve_2023_21554/☆59May 18, 2023Updated 2 years ago
- CVE-2020-14882/14883/14750☆21Nov 4, 2020Updated 5 years ago
- ☆17Mar 8, 2024Updated 2 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- system pseudo protocals digger for windows -- Windows 系统下的伪协议查看工具☆17Dec 22, 2016Updated 9 years ago
- 1day practice - Escape macOS sandbox (partial) using RemoteViewServices☆44May 12, 2025Updated 10 months ago
- ☆34Jun 11, 2024Updated last year
- Sun NFS 2.0 Release☆24Sep 16, 2025Updated 6 months ago
- ☆12Mar 10, 2020Updated 6 years ago
- Extract the Procedures (TTP) from CTI reports☆17Dec 13, 2025Updated 3 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆38Jan 2, 2025Updated last year