mhaskar / CVE-2020-14947View external linksLinks
The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947
☆19Jul 2, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2020-14947
Users that are interested in CVE-2020-14947 are comparing it to the libraries listed below
Sorting:
- ☆11Dec 5, 2020Updated 5 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- 致远OA通过发送特殊请求获取管理员cookie,再通过文件上传接口上传webshell压缩文件,最后发送解压请求获取webshell☆10Apr 11, 2021Updated 4 years ago
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Dec 30, 2023Updated 2 years ago
- VMWare vRealize SSRF-CVE-2021-21975☆14Apr 2, 2021Updated 4 years ago
- Portable & Custmizable Windows Defender☆13Nov 10, 2021Updated 4 years ago
- PoC CVE-2020-6308☆36Dec 29, 2020Updated 5 years ago
- 使用JAVAFX图形化界面检测对HVV中常见的重点CMS系统和OA系统的已公开的漏洞进行验证。☆15Jul 15, 2022Updated 3 years ago
- ☆16Jul 20, 2020Updated 5 years ago
- CVE-2022-24086 about Magento RCE☆36Dec 16, 2022Updated 3 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Hacking the Linux kernel☆15Jun 17, 2023Updated 2 years ago
- Proof of concept exploit about OpenSSL signature_algorithms_cert DoS flaw (CVE-2020-1967)☆20Jun 16, 2024Updated last year
- Automated Recon Tool Installer☆15Jun 29, 2022Updated 3 years ago
- iOS安全与防护☆17May 31, 2025Updated 8 months ago
- ☆22May 29, 2020Updated 5 years ago
- AggressorScript-RunDumpHash☆19Oct 9, 2019Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- [CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU☆56Apr 6, 2020Updated 5 years ago
- ACTIVELabs Security Advisories☆23May 19, 2021Updated 4 years ago
- Win32k Elevation of Privilege Poc☆24May 17, 2019Updated 6 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Apr 25, 2022Updated 3 years ago
- SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)☆97Jan 11, 2022Updated 4 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106May 25, 2020Updated 5 years ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆15Apr 15, 2020Updated 5 years ago
- manual mapping injector☆29Sep 28, 2025Updated 4 months ago
- ☆66Mar 5, 2022Updated 3 years ago
- 泛微OA_V9全版本前台任意文件上传漏洞☆29Apr 26, 2022Updated 3 years ago
- ☆26Aug 12, 2020Updated 5 years ago
- ☆27Aug 25, 2020Updated 5 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- ☆34Apr 18, 2020Updated 5 years ago
- Basically a regexp over a GitHub search.☆69Mar 28, 2023Updated 2 years ago
- The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813☆68Feb 22, 2020Updated 5 years ago