liamg / CVE-2025-48384Links
PoC for CVE-2025-48384
☆19Updated 5 months ago
Alternatives and similar repositories for CVE-2025-48384
Users that are interested in CVE-2025-48384 are comparing it to the libraries listed below
Sorting:
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Updated 2 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆56Updated last year
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Updated 3 years ago
- OSED Practice binary☆24Updated 2 years ago
- ☆22Updated 3 years ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- PoC☆12Updated 8 months ago
- Java archive implant toolkit.☆61Updated 7 months ago
- ☆63Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆22Updated last year
- Elasticsearch Stack Overflow Vulnerability☆18Updated 2 years ago
- A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3.☆21Updated 2 years ago
- Right-To-Left Override POC☆36Updated 3 years ago
- Exactly what it sounds like, which is something rad☆23Updated 3 years ago
- A simple Meterpreter stager written in Rust.☆43Updated last month
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆15Updated last year
- ☆12Updated 2 years ago
- ☆23Updated 3 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 5 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- Simple WebSocket fuzzer☆32Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆28Updated 2 months ago
- Golang Shlyuz Implant Implementation☆13Updated 6 months ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 4 years ago