puzzlepeaches / Log4jUnifiLinks
Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.
☆153Updated last year
Alternatives and similar repositories for Log4jUnifi
Users that are interested in Log4jUnifi are comparing it to the libraries listed below
Sorting:
- Aspx reverse shell☆108Updated 5 years ago
- Active Directory Wordlists☆94Updated 5 years ago
- ☆217Updated 4 years ago
- Root shell PoC for CVE-2021-3156☆66Updated 4 years ago
- Proof of Concept for CVE-2019-18634☆215Updated 3 years ago
- SSTI Payload Generator☆91Updated 2 years ago
- ☆119Updated 2 years ago
- Kerberoast with ACL abuse capabilities☆474Updated 5 months ago
- ☆211Updated 4 years ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆138Updated 11 months ago
- PHP 8.1.0-dev Backdoor System Shell Script☆91Updated 4 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆91Updated 6 years ago
- ☆160Updated 3 years ago
- OpenSSH 2.3 < 7.7 - Username Enumeration☆42Updated last year
- Powershell script to extract information from boot PXE☆141Updated 6 years ago
- Notes compiled for the OSCP exam.☆152Updated 3 years ago
- Useful commands/tricks using smbclient/nmap in a pentesting/auditing/redteaming☆112Updated 3 years ago
- Joomla login bruteforce☆69Updated 10 months ago
- Squid Pivoting Open Port Scanner☆75Updated 6 months ago
- Collection of username lists for enumerating kerberos domain users☆92Updated 7 years ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆492Updated last year
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆280Updated last year
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆94Updated 4 years ago
- Writeups for vulnerable machines.☆174Updated 2 years ago
- A script that you can run in the background!☆176Updated 5 years ago
- Enumerate / Dump Docker Registry☆177Updated last year
- ☆38Updated last year
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆289Updated 3 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆64Updated 3 years ago