niemand-sec / RazorSyntaxWebshellLinks
Webshell for Razor Syntax (C#)
☆20Updated 8 years ago
Alternatives and similar repositories for RazorSyntaxWebshell
Users that are interested in RazorSyntaxWebshell are comparing it to the libraries listed below
Sorting:
- PoC CVE-2020-6308☆36Updated 4 years ago
- miscellaneous security research stuff☆37Updated 6 years ago
- 该脚本为Citrix XenMobile 目录遍历漏洞(CVE-2020-8209)批量检测脚本。☆31Updated 4 years ago
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Updated 5 years ago
- CVE-2020-3452 exploit☆24Updated 5 years ago
- Some private tools i decided to release for public.☆49Updated last year
- Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container☆47Updated last year
- Kerberos TGS_REP cracker written in Golang☆56Updated 9 years ago
- ☆35Updated 2 years ago
- guest→system(UAC手动提权)☆74Updated 5 years ago
- This is a writeup for CVE-2020-11107 reported by Maximilian Barz☆32Updated 5 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆76Updated 7 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- ☆63Updated 6 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆30Updated 3 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆67Updated 5 years ago
- ☆45Updated 5 years ago
- ☆34Updated 6 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Updated 5 years ago
- CVE-2019-0230 Exploit POC☆15Updated 5 years ago
- ☆19Updated 5 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 7 years ago
- Example Vulnerable .NET HTTP Remoting☆86Updated 6 years ago
- SSL VPN Rce☆53Updated 6 years ago
- Gogs CVEs☆79Updated 5 years ago
- Webmin Remote Code Execution (authenticated)☆32Updated 6 years ago
- Vuln Liferay scanner & Exploit☆21Updated 5 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32Updated 10 years ago
- Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.☆33Updated 5 years ago