This script helps to identify CVE-2021-26855 ssrf Poc
☆22Mar 10, 2021Updated 5 years ago
Alternatives and similar repositories for CVE-2021-26855-SSRF
Users that are interested in CVE-2021-26855-SSRF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Microsoft Exchange Server SSRF漏洞(CVE-2021-26855)☆36Mar 6, 2021Updated 5 years ago
- PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github☆62Mar 11, 2021Updated 5 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- PoC exploit code for CVE-2021-26855☆17Mar 9, 2021Updated 5 years ago
- Wireless Pentest☆18Apr 5, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆32May 1, 2021Updated 4 years ago
- ☆20Jan 24, 2022Updated 4 years ago
- A simple tool to inject shellcode into the remote process with the ability to spoof parent process.☆16Mar 18, 2021Updated 5 years ago
- This is just a simple data recovery for Foxmail(http://foxmail.com.cn/)☆18Oct 16, 2015Updated 10 years ago
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- ☆18Dec 12, 2020Updated 5 years ago
- CodeX Tool is to Convert Phishing URL to qr code !☆16Feb 16, 2021Updated 5 years ago
- ☆100Mar 9, 2021Updated 5 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- tomcat 图形化弱口令爆破 也可以作为401认证爆破☆14Mar 5, 2021Updated 5 years ago
- ProxyLogon Pre-Auth SSRF To Arbitrary File Write☆125Nov 8, 2023Updated 2 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Mar 16, 2026Updated last month
- 利用fofa搜索socks5开放代理进行代理池轮切的工具☆36Feb 22, 2022Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 4 months ago
- Phishing mobile application made in React Native for both Android and iOS devices.☆34Aug 16, 2021Updated 4 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 6 years ago
- Log4j漏洞(CVE-2021-44228)的Burpsuite检测插件☆13Jan 26, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- intelligent and automatic build system for C☆15Apr 17, 2021Updated 5 years ago
- Remote command shell application written in C# targeting the .NET runtime.☆29Mar 8, 2026Updated last month
- FuckFileMonitor 将文件加密伪装成图片,可以通过IM工具发送图片来pass内网文件监控.☆27Feb 21, 2023Updated 3 years ago
- Scripts that I've written that others may find useful☆13Aug 17, 2022Updated 3 years ago
- 泛微ecology OA系统接口存在数据库配置信息泄露漏洞☆50Jul 13, 2020Updated 5 years ago
- Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.☆51Mar 24, 2021Updated 5 years ago
- This project used to learn golang and try to bypass AV☆21Sep 20, 2021Updated 4 years ago
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Anonymize your hashcat formatted files for online cracking☆31Oct 27, 2024Updated last year
- A burp extension, check Sturts2 RCE through passive scan.一款检测Struts2 RCE漏洞的burp被动扫描插件~☆15Dec 9, 2020Updated 5 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- Convert GnuPG private keys to Tor hidden service keys (and vice versa)☆12Jun 11, 2015Updated 10 years ago
- A graphical user interface for Magic Wormhole file transfer☆13May 17, 2022Updated 3 years ago
- ☆13Dec 30, 2024Updated last year
- CVE-2019-0230 Exploit POC☆15Aug 21, 2020Updated 5 years ago