jam620 / Sophos-VulnerabilityView external linksLinks
CVE-2022-1040
☆17Sep 25, 2022Updated 3 years ago
Alternatives and similar repositories for Sophos-Vulnerability
Users that are interested in Sophos-Vulnerability are comparing it to the libraries listed below
Sorting:
- POC CVE-2019-0708 with python script!☆14Jun 24, 2019Updated 6 years ago
- quick script for mixing wordlists in a way that maintains order. ([1,2],[3,4],[5,6] -> [1,3,5,2,4,6])☆10Mar 6, 2022Updated 3 years ago
- PoC for CVE-2021-43557☆22Nov 22, 2021Updated 4 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- ☆11May 13, 2024Updated last year
- CVE-2022-21907 Vulnerability PoC☆30Jan 23, 2022Updated 4 years ago
- may the poc with you☆17May 6, 2022Updated 3 years ago
- ☆11Feb 16, 2025Updated 11 months ago
- CVE-2019-0708 Exploit Tool☆18Jul 18, 2019Updated 6 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- ☆12Aug 20, 2021Updated 4 years ago
- A Python script to parse Fortinet products serial numbers, and detect the associated model and revision.☆19Oct 1, 2023Updated 2 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆17Dec 26, 2021Updated 4 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- ☆23Jun 17, 2024Updated last year
- This is a simple process injection made in C for Linux systems☆30Sep 23, 2023Updated 2 years ago
- POC Script for CVE-2020-12800: RCE through Unrestricted File Type Upload☆27Jan 6, 2023Updated 3 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆62Jun 4, 2022Updated 3 years ago
- ☆10Mar 7, 2023Updated 2 years ago
- ☆12Oct 10, 2023Updated 2 years ago
- Related subdomains finder☆29May 18, 2022Updated 3 years ago
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 8 years ago
- WordPress WP_Query SQL Injection POC☆28Mar 11, 2023Updated 2 years ago
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.☆24Jan 26, 2022Updated 4 years ago
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Aug 11, 2023Updated 2 years ago
- ☆11Sep 15, 2024Updated last year
- 个人网站☆14Jan 9, 2026Updated last month
- some eJPT exam preparation notes☆75Apr 29, 2021Updated 4 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆40May 5, 2024Updated last year
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27May 23, 2023Updated 2 years ago
- ☆18May 11, 2021Updated 4 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- A command line tic-tac-toe game in Golang☆12Oct 14, 2024Updated last year
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Jul 5, 2022Updated 3 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- Python client for IP to ASN lookup services☆12Sep 17, 2025Updated 4 months ago
- Solutions for Kattis problems.☆10Updated this week
- 🏍Fast Home Delivery App of Grocery ,Medicines , Vegetables ,etc during lockdown . Client can send Handwritten List Photo ,Chat with Shop…☆11Jun 27, 2020Updated 5 years ago