knqyf263 / CVE-2023-50387View external linksLinks
KeyTrap (DNSSEC)
☆44Feb 18, 2024Updated last year
Alternatives and similar repositories for CVE-2023-50387
Users that are interested in CVE-2023-50387 are comparing it to the libraries listed below
Sorting:
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- Repository for application-layer loop DoS☆33Mar 20, 2024Updated last year
- Examples for Implementing cve-2023-44487 ( HTTP/2 Rapid Reset Attack ) Concept☆13Nov 10, 2023Updated 2 years ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆21Apr 11, 2024Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆96Nov 14, 2024Updated last year
- Proof-of-concept exploit for CVE-2024-25153.☆42Mar 13, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。☆11Nov 28, 2022Updated 3 years ago
- PAN-OS auth bypass + RCE☆47Nov 19, 2024Updated last year
- ☆11Jul 15, 2024Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆50Jan 12, 2025Updated last year
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated last month
- ☆14Jul 9, 2024Updated last year
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆15Jul 28, 2025Updated 6 months ago
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Sep 1, 2022Updated 3 years ago
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 7 months ago
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated last year
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated last year
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Fortinet FortiClient EMS SQL Injection☆52Mar 20, 2024Updated last year
- Explore the http3 by quic with examples☆15Jul 28, 2022Updated 3 years ago
- ☆13Jun 27, 2023Updated 2 years ago
- Research developed by Allele Security Intelligence.☆17Jul 21, 2025Updated 6 months ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 3 weeks ago
- MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques☆14Dec 18, 2023Updated 2 years ago
- A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner☆14Dec 22, 2021Updated 4 years ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 8 months ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- CVE-2022-2185 poc☆13Jul 12, 2022Updated 3 years ago
- ☆16Aug 18, 2024Updated last year
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆29Sep 15, 2025Updated 5 months ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago