liamg / CVE-2025-48384Links
PoC for CVE-2025-48384
☆19Updated 2 months ago
Alternatives and similar repositories for CVE-2025-48384
Users that are interested in CVE-2025-48384 are comparing it to the libraries listed below
Sorting:
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆18Updated 2 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆55Updated last year
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Updated 3 years ago
- OSED Practice binary☆24Updated last year
- Simple WebSocket fuzzer☆32Updated 2 years ago
- ☆20Updated 2 years ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆16Updated last year
- PoC☆12Updated 5 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆24Updated last week
- Java archive implant toolkit.☆61Updated 5 months ago
- Use WordPress pingback.ping to transfer files.☆17Updated last year
- A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3.☆21Updated last year
- A simple Meterpreter stager written in Rust.☆40Updated last year
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- ☆28Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 9 months ago
- ☆12Updated 3 years ago
- ☆59Updated last year
- Tools for Attacking Pleasant Password Server☆22Updated 2 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Updated 2 years ago
- A service container for interacting with SRA's VECTR☆12Updated 5 months ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- ☆12Updated last year
- Remote code execution in Power Platform connectors via JSON deserialization☆23Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- Golang Shlyuz Implant Implementation☆13Updated 4 months ago
- Mara is a userland pty/tty sniffer☆54Updated last year