jasperla / CVE-2017-9101View external linksLinks
Exploit for PlaySMS 1.4 authenticated RCE
☆14Nov 6, 2018Updated 7 years ago
Alternatives and similar repositories for CVE-2017-9101
Users that are interested in CVE-2017-9101 are comparing it to the libraries listed below
Sorting:
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- Useful scripts for pen testing. Require modification to run☆13Oct 17, 2020Updated 5 years ago
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆20Jul 29, 2018Updated 7 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Changes for Visual Studio 2013☆118Jun 22, 2015Updated 10 years ago
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Dec 12, 2018Updated 7 years ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- From SQL injection to root shell with CVE-2016-6662 by MaYaSeVeN☆29Jul 22, 2017Updated 8 years ago
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆123Aug 13, 2021Updated 4 years ago
- Proof of Concept's provided by Source Incite☆36Aug 10, 2017Updated 8 years ago
- Python tool to bruteforce openssl ciphers against a wordilst☆31Jul 20, 2018Updated 7 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- Bot to bypass instagram block feature☆10Jun 21, 2017Updated 8 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- Small CTF challenges running on Docker☆158Jul 26, 2018Updated 7 years ago
- TESTR - A Vulnerable Python Web-App to practice XSS and Command Injection☆42Oct 8, 2022Updated 3 years ago
- Proof of Concept code of the Shoplift code☆41Oct 4, 2021Updated 4 years ago
- Preparation for OSWE☆47Apr 19, 2020Updated 5 years ago
- ☆90Sep 18, 2017Updated 8 years ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Python script to get Samba Server Version☆11May 8, 2018Updated 7 years ago
- Simple Crud php mysql bootstrap 5 utilizando xampp☆14Aug 25, 2021Updated 4 years ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- Cutting-edge research in a practical way☆12Jul 26, 2019Updated 6 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- e-Democracia source code. http://edemocracia.camara.leg.br/ See our plans for the future on Trello: https://trello.com/b/Wzi39aNt/e-democ…☆10Feb 27, 2018Updated 7 years ago
- ☆12Jan 14, 2025Updated last year
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago