openwall / php_mt_seedLinks
PHP mt_rand() seed cracker
☆71Updated 5 years ago
Alternatives and similar repositories for php_mt_seed
Users that are interested in php_mt_seed are comparing it to the libraries listed below
Sorting:
- PoC. Severity critical.☆71Updated last year
- A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.☆327Updated last year
- CVE-2023-0386在ubuntu22.04上的提权☆412Updated 2 years ago
- VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)☆232Updated 2 years ago
- 针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。☆203Updated 2 years ago
- WebLogic vulnerability exploration from beginner to expert.☆157Updated 2 years ago
- ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具☆254Updated 2 years ago
- GitLab CE/EE Preauth RCE using ExifTool☆237Updated 4 years ago
- exploit for f5-big-ip RCE cve-2023-46747☆206Updated last year
- ☆139Updated 4 months ago
- Exploit for the vulnerability CVE-2024-43044 in Jenkins☆184Updated last year
- CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行☆95Updated 2 years ago
- CVE-2024-32002 RCE PoC☆108Updated last year
- Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset☆109Updated 2 years ago
- ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)☆185Updated 4 years ago
- EXP for CVE-2023-28434 MinIO unauthorized to RCE☆319Updated 2 years ago
- CVE-2022-0847☆88Updated 3 years ago
- CVE-2024-4367 & CVE-2024-34342 Proof of Concept☆190Updated last year
- RCE exploit for CVE-2023-3519☆229Updated 2 years ago
- about thinkphp lang RCE QVD-2022-46174 v6.0.1 <= Thinkphp <= v6.0.13 Thinkphp v5.0.x Thinkphp v5.1.x☆41Updated 3 years ago
- Time Based SQL Injection in Zabbix Server Audit Log --> RCE☆127Updated last year
- Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)☆162Updated 4 years ago
- CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via craft…