o-o-overflow / dc2020q-uploooaditLinks
HTTP Desync Attack
☆28Updated 5 years ago
Alternatives and similar repositories for dc2020q-uploooadit
Users that are interested in dc2020q-uploooadit are comparing it to the libraries listed below
Sorting:
- CTF writeups☆30Updated 3 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- Some of my public exploits☆51Updated 4 years ago
- ☆25Updated last year
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- ☆13Updated 6 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆124Updated 4 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Updated 8 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 5 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- Scripts I used during CTP☆67Updated 5 years ago
- PoC for CVE-2020-8617 (BIND)☆45Updated 5 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆25Updated last year
- ☆36Updated 7 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- ☆26Updated 4 years ago
- YSOSERIAL Integration with burp suite☆41Updated 3 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Pentest TeamCity using Metasploit☆45Updated 4 years ago
- Argument Injection in Dragonfly Ruby Gem☆16Updated 4 years ago
- A malicious LDAP server for JNDI injection attacks☆75Updated 8 months ago
- XSS payloads for edge cases☆34Updated 6 years ago
- Compiled dataset of Java deserialization CVEs☆62Updated 4 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 4 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 4 years ago