laolisafe / CVE-2020-1938Links
CVE-2020-1938漏洞复现
☆38Updated 5 years ago
Alternatives and similar repositories for CVE-2020-1938
Users that are interested in CVE-2020-1938 are comparing it to the libraries listed below
Sorting:
- guest→system(UAC手动提权)☆73Updated 5 years ago
- Webshell for Razor Syntax (C#)☆19Updated 8 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆76Updated 8 years ago
- PoC CVE-2020-6308☆36Updated 5 years ago
- This is a Poc for BIGIP iControl unauth RCE☆51Updated 4 years ago
- CVE-2020-3452 exploit☆24Updated 5 years ago
- CVE2020-0796 SMBv3 RCE☆61Updated 5 years ago
- ☆19Updated 5 years ago
- Kerberos TGS_REP cracker written in Golang☆57Updated 10 years ago
- miscellaneous security research stuff☆37Updated 6 years ago
- ☆71Updated 4 years ago
- Some private tools i decided to release for public.☆49Updated last year
- MySQL Injection Exfoliation Optimization☆24Updated 6 years ago
- ☆45Updated 5 years ago
- Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container☆48Updated last year
- 该脚本为Citrix XenMobile 目录遍历漏洞(CVE-2020-8209)批量检测脚本。☆31Updated 5 years ago
- Example Vulnerable .NET HTTP Remoting☆87Updated 6 years ago
- DO NOT RUN THIS.☆47Updated 4 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- CVE-2020-2021☆22Updated 5 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- CVE-2020-12828 PoC and Analysis.☆28Updated 5 years ago
- ☆63Updated 6 years ago
- Exploits, Exploits, Exploits and more Exploits!☆33Updated 5 years ago
- Nmap script to check vulnerability CVE-2021-21972☆27Updated 4 years ago
- This script helps to identify CVE-2021-26855 ssrf Poc☆22Updated 4 years ago
- SonicWALL SSL-VPN Web Server Vulnerable Exploit☆48Updated 4 years ago
- WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit☆51Updated 6 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆30Updated 4 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 7 years ago