CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to send arbitrary HTTP requests and authenticate as the Exchange server.
☆12Jan 1, 2024Updated 2 years ago
Alternatives and similar repositories for CVE-2021-26855
Users that are interested in CVE-2021-26855 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 武器库、渗透测试、红蓝对抗、黑客攻防、目录扫描器、phpmyadmin爆破写一句话☆12Feb 20, 2021Updated 5 years ago
- ☆18Sep 21, 2019Updated 6 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- ☆27Aug 25, 2020Updated 5 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 👶🏻😿 A zero-dependency network sniffer, written from scratch, that supports emulated and native cBPF. Runs on Linux, BSD, macOS and Win…☆13Nov 8, 2025Updated 6 months ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Burpsuite Extension for Jsmon☆23Apr 6, 2026Updated last month
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- A code security platform based on fortify sca windows☆15Mar 6, 2019Updated 7 years ago
- Manual JavaScript Linting is a Bug☆48Mar 6, 2021Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Scanner to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability and to detec…☆12Feb 15, 2022Updated 4 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- Cisco CallManager User Enumeration☆16Aug 16, 2022Updated 3 years ago
- Vulnerability scanner for Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 4 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Dec 27, 2021Updated 4 years ago
- Collection of reusable references☆14Updated this week