liamg / CVE-2025-48384Links
PoC for CVE-2025-48384
☆19Updated 3 weeks ago
Alternatives and similar repositories for CVE-2025-48384
Users that are interested in CVE-2025-48384 are comparing it to the libraries listed below
Sorting:
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆36Updated 2 years ago
- gozero: the wannabe zero dependency runtime for Go developers (experimental)☆20Updated last week
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Updated 2 years ago
- A command based package for simple display of statistics☆23Updated 8 months ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆54Updated last year
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- A curated GitHub repository that's in-scope and eligible for bounty.☆20Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated last year
- Backend for Nuclear Pond☆22Updated last year
- an Evil Java RMI Registry.☆51Updated 2 years ago
- ☆12Updated 3 years ago
- ☆20Updated 2 years ago
- ☆21Updated 2 months ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 10 months ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- ☆31Updated 2 years ago
- Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.☆16Updated 9 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated last year
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆27Updated 2 years ago
- ☆12Updated last year
- Ffuf output browser☆39Updated 2 years ago
- A simple way of sending messages from the CLI output to your Discord channel with webhook.☆35Updated 3 years ago