Hearbleed exploit to retrieve sensitive information CVE-2014-0160
☆85Feb 20, 2021Updated 5 years ago
Alternatives and similar repositories for heartbleed-PoC
Users that are interested in heartbleed-PoC are comparing it to the libraries listed below
Sorting:
- Heartbleed vulnerability exploited 🩸☆19Apr 11, 2023Updated 2 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- Dll injection for executable file☆17Jul 22, 2016Updated 9 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 7 years ago
- ☆27Feb 3, 2026Updated last month
- Get the urls for all disclosed vulnerabilities☆17Dec 29, 2015Updated 10 years ago
- CVE-2017-12149 JBOSS RCE (TESTED)☆15Dec 23, 2017Updated 8 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Yet another collection of Frida scripts.☆21Mar 6, 2022Updated 4 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- ☆131Dec 15, 2020Updated 5 years ago
- SubdomainDB is a simple self-hosted API that allows you to maintain your own subdomain database.☆31Jan 8, 2018Updated 8 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Mar 15, 2021Updated 5 years ago
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆39Apr 15, 2017Updated 8 years ago
- Keep track of changes in website with WEBSY☆35May 22, 2023Updated 2 years ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆14Feb 20, 2020Updated 6 years ago
- ☆17Feb 17, 2022Updated 4 years ago
- Toy version of the sweet32 attack☆16Nov 24, 2017Updated 8 years ago
- ☆13Jan 6, 2020Updated 6 years ago
- CVE-2017-13156-Janus复现☆13Sep 7, 2020Updated 5 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- Subdomains-enumeration, subdomain-takeover monitoring api and S3 bucket scanner.☆40Nov 21, 2025Updated 3 months ago
- ☆12Sep 23, 2023Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- 用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞☆52May 21, 2020Updated 5 years ago
- CVE-2020-5410 Spring Cloud Config directory traversal vulnerability☆31Jun 16, 2020Updated 5 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- A collection of my answers to the exercises in Modern Cryptography: Theory and Practice by Wenbo Mao☆10Oct 8, 2017Updated 8 years ago
- A place to store my own wordlists, and link to others that are useful☆108Nov 15, 2023Updated 2 years ago
- ☆11Oct 2, 2025Updated 5 months ago
- CVE-2022-22947_POC_EXP☆13Mar 17, 2022Updated 4 years ago
- A test suite built with Mocha/Chai to test for behavioral differences between image libraries for the web☆73May 7, 2020Updated 5 years ago
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago