masahiro331 / CVE-2020-8165View external linksLinks
☆41Jan 19, 2023Updated 3 years ago
Alternatives and similar repositories for CVE-2020-8165
Users that are interested in CVE-2020-8165 are comparing it to the libraries listed below
Sorting:
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Jul 5, 2020Updated 5 years ago
- This will give you shell access on the target system if redis server is not configured properly and faced on the internet without any aut…☆97Jan 2, 2020Updated 6 years ago
- ☆15Jun 27, 2020Updated 5 years ago
- ☆17Jan 3, 2021Updated 5 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Jan 29, 2021Updated 5 years ago
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Jun 11, 2020Updated 5 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- CVE-2020-1958 PoC☆22Apr 11, 2020Updated 5 years ago
- Citrix ADC从权限绕过到RCE☆45Jul 12, 2020Updated 5 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- TelerikUI Vulnerability Scanner (CVE-2019-18935)☆12May 10, 2023Updated 2 years ago
- Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()☆80Jul 20, 2020Updated 5 years ago
- Check for certs affected by July 2020 OCSP intermediate incident☆13Jul 15, 2020Updated 5 years ago
- ☆16Feb 12, 2022Updated 4 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- ☆37Dec 10, 2017Updated 8 years ago
- ☆127Oct 28, 2021Updated 4 years ago
- string encryption in Nim☆20Jun 15, 2024Updated last year
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Oct 21, 2020Updated 5 years ago
- In-app view hierarchy inspector☆16Apr 13, 2015Updated 10 years ago
- IOXIDResolver.py from AirBus Security☆260Oct 30, 2023Updated 2 years ago
- ☆107May 4, 2020Updated 5 years ago
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- SNES for MiSTer☆16Sep 5, 2025Updated 5 months ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Oct 25, 2021Updated 4 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- An extendable and flexible infrastructure for program instrumentation.☆24Sep 15, 2025Updated 5 months ago
- ☆21Dec 15, 2020Updated 5 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆159Jan 24, 2021Updated 5 years ago
- A hobby project of a C++ game engine. Uses OpenGL and C++20☆16Updated this week
- Exploit for CVE-2021-3129☆68Mar 7, 2021Updated 4 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- Source files for my posts☆17Jun 20, 2023Updated 2 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆99Sep 27, 2021Updated 4 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago