mirchr / security-research
Security Research
☆95Updated 5 years ago
Alternatives and similar repositories for security-research:
Users that are interested in security-research are comparing it to the libraries listed below
- CVE-2019-0604☆134Updated 6 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆126Updated 2 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- Citrix ADC Remote Code Execution☆83Updated 5 years ago
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆98Updated 5 years ago
- Full TTY reverse shell over SSH☆58Updated 4 years ago
- Some scripts and exploits☆145Updated 6 years ago
- Java serialization brute force attack tool.☆122Updated 7 years ago
- poison and relay NTLM credentials☆174Updated 6 years ago
- Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect☆132Updated 3 years ago
- CVE-2018-2893-PoC☆103Updated 6 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆125Updated 6 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Updated 6 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆81Updated 6 years ago
- rce exploit , made to work with pocsuite3☆119Updated 5 years ago
- Burp Suite Attack Selector Plugin☆61Updated 7 years ago
- checkO365 is a tool to check if a target domain is using O365☆84Updated 6 years ago
- Apache Tomcat Remote Code Execution on Windows☆185Updated 5 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆64Updated last month
- Post module for Metasploit to execute ELF in memory☆85Updated 6 years ago
- PoC or Exp Of Vulnerability☆107Updated 5 years ago
- Atlassian JIRA Template injection vulnerability RCE☆93Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆100Updated 3 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 6 years ago
- Mimipenguin密码抓取神器☆26Updated 7 years ago
- CVE-2018-7600 Drupal RCE☆116Updated 6 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆144Updated 5 years ago