XMLRPC - RCE in MovableTypePoC
☆21Mar 21, 2022Updated 4 years ago
Alternatives and similar repositories for CVE-2021-20837
Users that are interested in CVE-2021-20837 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fetch & Filter Known URLs☆15Aug 3, 2022Updated 3 years ago
- Code By:Tas9er / F5 BIG-IP 远程命令执行漏洞☆14Mar 29, 2021Updated 5 years ago
- Alias for storing ffuf results☆20May 23, 2020Updated 5 years ago
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- Oracle WebLogic Server 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 Local File Inclusion☆27Jan 25, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An HTTP request smuggling scanner designed to work at scale☆25Oct 2, 2022Updated 3 years ago
- Tools for auditing WAFS☆19Feb 25, 2022Updated 4 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 8 years ago
- Bug Bounty Program Discovery tool, that discovers bug Bounty Program via security.txt file by default and you can use custom dork☆16Jul 17, 2022Updated 3 years ago
- Just an automation script to delete/unsend fb messages. Inspired from: @pishangujeniya/instagram-helper☆10Jul 31, 2022Updated 3 years ago
- 一个可以全端口捕获流量的简易蜜罐 tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.☆13Aug 3, 2022Updated 3 years ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31May 1, 2022Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆59May 8, 2024Updated last year
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- My workflow made with shell script, some API's and tools. ;)☆11Nov 25, 2025Updated 4 months ago
- Simple multi client Backdoor, with Python.☆12Feb 10, 2023Updated 3 years ago
- Burp Suite extension for parsing Swagger web service definition files☆19Jul 15, 2025Updated 9 months ago
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Sep 16, 2021Updated 4 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Nov 24, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆34Aug 28, 2023Updated 2 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- ☆21May 19, 2022Updated 3 years ago
- ☆10Jul 28, 2021Updated 4 years ago
- simple WMI Viewer☆21Jun 11, 2020Updated 5 years ago
- Lexmark CVE-2023-26067☆28Aug 8, 2023Updated 2 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆17Sep 13, 2019Updated 6 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Mar 31, 2017Updated 9 years ago
- This Repo Contain Summary of The eLearnSecurity Web Application Penetration Tester certification Content☆20Apr 9, 2022Updated 4 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- Thực tập trung tâm an ninh mạng Viettel☆14Aug 25, 2017Updated 8 years ago
- ☆13May 9, 2017Updated 8 years ago
- lpe poc for cve-2022-21882☆49Feb 7, 2022Updated 4 years ago
- The OWASP Testing Guide v4.2 Checlist [2023]☆13Jan 15, 2023Updated 3 years ago