justinsteven / advisoriesView external linksLinks
☆269Apr 3, 2023Updated 2 years ago
Alternatives and similar repositories for advisories
Users that are interested in advisories are comparing it to the libraries listed below
Sorting:
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆206Feb 15, 2024Updated 2 years ago
- A collection of published exploits and proof-of-concept code.☆21Dec 19, 2017Updated 8 years ago
- ☆111May 16, 2017Updated 8 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Jan 10, 2016Updated 10 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago
- It's bloody scantastic☆238Jun 21, 2022Updated 3 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,167May 26, 2023Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- ☆15Oct 25, 2021Updated 4 years ago
- Apache Solr Injection Research☆579Jan 28, 2020Updated 6 years ago
- Generate DOM clobbering attack vectors for you.☆35Jun 3, 2025Updated 8 months ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- A Java serializer in JavaScript☆81May 21, 2018Updated 7 years ago
- Study about HQL injection exploitation.☆51May 15, 2016Updated 9 years ago
- ☆91Feb 22, 2021Updated 4 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Feb 22, 2017Updated 8 years ago
- ☆709Nov 27, 2024Updated last year
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆177Dec 1, 2022Updated 3 years ago
- ☆16Sep 26, 2016Updated 9 years ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Feb 8, 2023Updated 3 years ago
- ☆1,201Sep 2, 2022Updated 3 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆2,097Jan 3, 2026Updated last month
- List of Trusted Types bypasses☆102Apr 15, 2024Updated last year
- PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)☆89Jun 2, 2020Updated 5 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Updated this week
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- Collections of Orange Tsai's public presentation slides.☆751Jan 1, 2025Updated last year
- The Outlook HTML Leak Test Project☆131May 12, 2018Updated 7 years ago
- Collection of CTF Web challenges I made☆2,821Aug 31, 2025Updated 5 months ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Exploits for some of the vulnerabilities I have discovered☆19Aug 3, 2020Updated 5 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆445Sep 7, 2022Updated 3 years ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆778May 10, 2022Updated 3 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆138Dec 22, 2017Updated 8 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,033Jun 3, 2021Updated 4 years ago
- A collection of browser-based side channel attack vectors.☆759Mar 19, 2024Updated last year
- CVE-2020-5410 Spring Cloud Config directory traversal vulnerability☆31Jun 16, 2020Updated 5 years ago