nokn0wthing / CVE-2023-20052View external linksLinks
CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV
☆27May 8, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-20052
Users that are interested in CVE-2023-20052 are comparing it to the libraries listed below
Sorting:
- ☆10Mar 11, 2024Updated last year
- Just simple PoC for the Atlassian Jira exploit. Provides code execution for unauthorised user on a server.☆11Jul 21, 2022Updated 3 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆17Sep 30, 2025Updated 4 months ago
- 「🧊」Ring 3 Rootkit for Windows 10☆60Dec 7, 2024Updated last year
- ☆14Mar 6, 2025Updated 11 months ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Jan 25, 2024Updated 2 years ago
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆17Jun 6, 2024Updated last year
- One-Click to Completely Take Over A macOS Device☆18Aug 25, 2022Updated 3 years ago
- Find secrets on any machine from over 120 Different Signatures.☆48Aug 16, 2024Updated last year
- CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web …☆83Jul 19, 2024Updated last year
- Enumeration & fingerprint tool☆24Mar 3, 2024Updated last year
- ☆30Sep 5, 2025Updated 5 months ago
- ☆76Jan 27, 2025Updated last year
- This is a simple process injection made in C for Linux systems☆30Sep 23, 2023Updated 2 years ago
- vulnlab.com reaper writeup☆27Aug 30, 2023Updated 2 years ago
- Zimbra <9.0.0.p27 RCE☆105Nov 24, 2022Updated 3 years ago
- ☆99Feb 1, 2024Updated 2 years ago
- Lexmark CVE-2023-26067☆28Aug 8, 2023Updated 2 years ago
- ☆31Oct 14, 2025Updated 4 months ago
- CVE-2023-2255 Libre Office☆63Jul 10, 2023Updated 2 years ago
- A PoC for the dMSA Active Directory Domain Takeover deemed BadSuccessor☆48Jul 20, 2025Updated 6 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Apr 6, 2024Updated last year
- This script monitors a Bitcoin wallet address and notifies the user when there are changes in the balance or new transactions.☆23Jul 11, 2023Updated 2 years ago
- Apache Solr Backup/Restore APIs RCE Poc (CVE-2023-50386)☆63Feb 29, 2024Updated last year
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Jul 29, 2023Updated 2 years ago
- Convert OVA and other file types to be able to use and create a Proxmox VM☆33Jun 28, 2022Updated 3 years ago
- VMware Aria Operations for Logs CVE-2023-34051☆61Oct 20, 2023Updated 2 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆130Sep 7, 2023Updated 2 years ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29May 5, 2023Updated 2 years ago
- Send Bulk fake poll votes with your accounts by this tool.☆12Oct 14, 2025Updated 4 months ago
- POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.☆35Jul 4, 2024Updated last year
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- PoC and Detection for CVE-2024-21626☆76Feb 6, 2024Updated 2 years ago
- ☆40Jan 30, 2023Updated 3 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- Generate image payloads in JS to bypass filters☆39Mar 16, 2021Updated 4 years ago
- ☆10Sep 24, 2021Updated 4 years ago