nccgroup / abstractshimmerLinks
Proof of concept for CVE-2020-15257 in containerd.
☆18Updated 4 years ago
Alternatives and similar repositories for abstractshimmer
Users that are interested in abstractshimmer are comparing it to the libraries listed below
Sorting:
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 3 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 5 years ago
- PoC for CVE-2020-8617 (BIND)☆45Updated 5 years ago
- RCE in NPM VSCode Extension☆20Updated 4 years ago
- POC for CVE-2022-23648☆37Updated 3 years ago
- ☆13Updated 2 years ago
- Tool to pentest spark clusters☆32Updated last year
- Some private tools i decided to release for public.☆49Updated last year
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆114Updated 6 years ago
- PoC for CVE-2021-43557☆22Updated 4 years ago
- ☆15Updated 4 years ago
- ☆71Updated 4 years ago
- Privilege escalation using dmidecode☆20Updated 6 years ago
- Hacking Artifactory with server side template injection☆51Updated 5 years ago
- A HTTP PoC Endpoint for cve-2020-5260 which can be deployed to Heroku☆38Updated 5 years ago
- Webshell plugin that works on any Atlassian product employing their plugin framework☆27Updated 8 years ago
- ☆35Updated 3 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 3 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆108Updated 5 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆100Updated 4 years ago
- XSS payloads for edge cases☆34Updated 7 years ago
- A malicious LDAP server for JNDI injection attacks☆76Updated last year
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Updated 5 years ago
- CVE-2020-2021☆22Updated 5 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆16Updated 2 years ago
- ☆65Updated 5 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Updated 4 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- ☆54Updated 4 years ago
- Example Vulnerable .NET HTTP Remoting☆87Updated 6 years ago