mirchr / security-researchLinks
Security Research
☆94Updated 6 months ago
Alternatives and similar repositories for security-research
Users that are interested in security-research are comparing it to the libraries listed below
Sorting:
- rce exploit , made to work with pocsuite3☆122Updated 6 years ago
- CVE-2019-0604☆133Updated 6 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆128Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆100Updated 3 years ago
- CVE-2018-13382☆147Updated 6 years ago
- CVE-2018-7600 Drupal RCE☆114Updated 7 years ago
- cve-2019-0604 SharePoint RCE exploit☆101Updated 6 years ago
- Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect☆133Updated 3 years ago
- Apache Tomcat Remote Code Execution on Windows☆189Updated 6 years ago
- WebLogic Exploit☆142Updated 7 years ago
- CentOS Control Web Panel, Root Privilege Escalation☆67Updated 6 years ago
- solana lets bonk fun copy sniper trading bot using grpc, and block engine, 0 slot☆109Updated 4 months ago
- X41 BeanStack - Stack Trace Fingerprinting BETA☆52Updated last month
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 8 years ago
- CVE-2018-2893-PoC☆104Updated 7 years ago
- The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813☆68Updated 5 years ago
- A weaponized version of CVE-2018-9206☆62Updated 7 years ago
- Burp Suite Attack Selector Plugin☆60Updated 8 years ago
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆100Updated 6 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆75Updated last month
- Full TTY reverse shell over SSH☆59Updated 5 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 6 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- Java serialization brute force attack tool.☆123Updated 8 years ago
- Post module for Metasploit to execute ELF in memory☆86Updated 7 years ago
- miscellaneous security research stuff☆37Updated 6 years ago
- None of the exploit code or research is my own but all available in public domain☆26Updated 6 years ago
- Gogs CVEs☆80Updated 6 years ago
- ☆63Updated 6 years ago