illikainen / advisories
security advisories
☆12Updated 4 years ago
Alternatives and similar repositories for advisories
Users that are interested in advisories are comparing it to the libraries listed below
Sorting:
- CVE-2017-13089☆55Updated 7 years ago
- 各种漏洞poc、Exp的收集或编写☆33Updated 8 years ago
- ☆28Updated 7 years ago
- ☆89Updated 4 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- ctf challenges by salt☆16Updated 5 years ago
- Keyboard Weak Password☆28Updated 9 years ago
- A Java serializer in JavaScript☆81Updated 6 years ago
- Web&Browser Security☆43Updated 2 years ago
- ☆84Updated 8 years ago
- DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API☆19Updated 7 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Updated 7 years ago
- ☆27Updated 4 years ago
- ☆46Updated 9 years ago
- Ruby interface to cirt.net default passwords database☆20Updated 14 years ago
- S2-055的环境,基于rest-show-case改造☆37Updated 7 years ago
- XXXX☆21Updated 7 years ago
- 0CTF 2015 Final web problem☆16Updated 10 years ago
- ☆14Updated 7 years ago
- cve-2019-0604 SharePoint RCE exploit☆40Updated 5 years ago
- spring mvc cve-2014-3625☆32Updated 9 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Updated 6 years ago
- Python Web framework P0wner☆75Updated 12 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 6 years ago
- running fb script☆8Updated 8 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Updated 8 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆55Updated 3 years ago
- Flash XSS Scanner☆54Updated 8 years ago
- n0js xss challenges☆27Updated 6 years ago