numanturle / CVE-2022-0332View external linksLinks
☆46Jan 26, 2022Updated 4 years ago
Alternatives and similar repositories for CVE-2022-0332
Users that are interested in CVE-2022-0332 are comparing it to the libraries listed below
Sorting:
- ☆13Aug 25, 2021Updated 4 years ago
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 3 months ago
- ☆13Oct 3, 2023Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Apache CouchDB 3.2.1 - Remote Code Execution (RCE)☆29May 20, 2022Updated 3 years ago
- ☆14Oct 12, 2021Updated 4 years ago
- TightVNC Vulnerability.☆16Jan 26, 2022Updated 4 years ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Jun 18, 2025Updated 7 months ago
- CVE-2022-24086 about Magento RCE☆36Dec 16, 2022Updated 3 years ago
- A python-based padding oracle tool☆20Aug 14, 2024Updated last year
- Instantly suspend processes to bypass kernel driver protections.☆20Dec 10, 2024Updated last year
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆13Mar 16, 2022Updated 3 years ago
- WebSocket 内存马/Webshell,一种新型内存马/WebShell技术☆22Apr 10, 2023Updated 2 years ago
- Windows MSI Installer LPE (CVE-2021-43883)☆79Dec 17, 2021Updated 4 years ago
- gxor程序根据输入的二进制文件进行异或运算输出☆22Sep 13, 2021Updated 4 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Dec 6, 2022Updated 3 years ago
- collection of various grep patterns collected from tomnomnom/gf and other places☆23Oct 13, 2020Updated 5 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Collect public CTF source code repo☆48Sep 26, 2021Updated 4 years ago
- Drag and Drop Multiple File Uploader PRO - Contact Form 7 v5.0.6.1 Path Traversal (CVE-2023-1112)☆24Mar 7, 2023Updated 2 years ago
- ☆90Oct 28, 2021Updated 4 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Dec 1, 2022Updated 3 years ago
- Burpsuite插件,Unicode自动转码为中文,提高测试效率。☆27Aug 23, 2021Updated 4 years ago
- Some CTF Write-ups☆26Feb 7, 2022Updated 4 years ago
- POC exploit for CVE-2015-10141☆30Aug 11, 2025Updated 6 months ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆32Nov 4, 2022Updated 3 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- A chrome/Firefox extension to retrieve and load react javascript chunks all at once for a wide range of javascript techs☆75Jun 12, 2025Updated 8 months ago
- Python bind shell single line code for both Unix and Windows, used to find and exploit RCE (ImageMagick, Ghostscript, ...)☆31Sep 9, 2021Updated 4 years ago
- My own Custom nuclei templates☆26Dec 8, 2021Updated 4 years ago
- ☆37Jan 7, 2025Updated last year
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆306Feb 26, 2022Updated 3 years ago
- 收集规则☆30Dec 8, 2022Updated 3 years ago
- CVE-2022-21660☆28Jan 10, 2022Updated 4 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Sep 16, 2024Updated last year
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Apr 2, 2021Updated 4 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Nov 14, 2022Updated 3 years ago
- Poc of CVE-2022-22980☆32Jun 23, 2022Updated 3 years ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆146Jul 17, 2025Updated 6 months ago