A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root
☆21Oct 20, 2022Updated 3 years ago
Alternatives and similar repositories for refreshing-soap-exploit
Users that are interested in refreshing-soap-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Mar 12, 2022Updated 4 years ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- Build your own cloud virtual machine lab☆13Nov 25, 2025Updated 3 months ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Windows NTLM Authentication Backdoor☆16Jan 27, 2022Updated 4 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Some useful tools for all kinds of Embedded device.☆11Oct 12, 2015Updated 10 years ago
- ☆20Jan 24, 2022Updated 4 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated 11 months ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- ☆14Jan 8, 2026Updated 2 months ago
- ☆18Jul 30, 2024Updated last year
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Mar 26, 2022Updated 3 years ago
- This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The…☆16Jun 5, 2024Updated last year
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated 2 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Oct 14, 2014Updated 11 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- 🔮 Your Tarot, With Emoji!☆11Jan 3, 2023Updated 3 years ago
- Yet another attempt to make embedded camera software☆18Jun 2, 2022Updated 3 years ago
- Scan your account for the use of untrusted AMIs☆32Mar 16, 2026Updated last week
- Some commonly asked about patterns & examples for building Preact projects☆15May 10, 2025Updated 10 months ago
- [✅Py 3.x]渗透测试插件化并发框架 / Open-sourced remote vulnerability PoC/EXP framework,现已兼容 Python3☆11Jul 9, 2024Updated last year
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 3 months ago
- ☆16Mar 26, 2024Updated last year
- ☆21Jan 7, 2019Updated 7 years ago
- CTF problems I have created.☆14Mar 5, 2023Updated 3 years ago
- An IDA plugin to demangle Swift function names☆26Apr 23, 2016Updated 9 years ago
- Playing with LLVM passes☆40Aug 17, 2023Updated 2 years ago
- ☆181Dec 16, 2022Updated 3 years ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated 2 months ago
- Mach Fuzzing Tools☆32Oct 24, 2013Updated 12 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- Minimal Angular + Vite Example application☆11Sep 5, 2024Updated last year
- A simple, minimal "Hello World" template for Preact CLI for being used on a ESP8266/ESP32☆12Dec 10, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆15Mar 7, 2026Updated 2 weeks ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- Groq Public Changelog☆16Dec 2, 2025Updated 3 months ago