A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root
☆21Oct 20, 2022Updated 3 years ago
Alternatives and similar repositories for refreshing-soap-exploit
Users that are interested in refreshing-soap-exploit are comparing it to the libraries listed below
Sorting:
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last week
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- ☆14Jan 8, 2026Updated last month
- ☆13Mar 12, 2022Updated 3 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Scan your account for the use of untrusted AMIs☆31Feb 13, 2026Updated 2 weeks ago
- ☆18Jul 30, 2024Updated last year
- Windows NTLM Authentication Backdoor☆16Jan 27, 2022Updated 4 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ☆16Mar 26, 2024Updated last year
- ☆25Jun 27, 2024Updated last year
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- ☆27Mar 1, 2022Updated 4 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆24Oct 10, 2019Updated 6 years ago
- ☆28Dec 26, 2025Updated 2 months ago
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 2 weeks ago
- PoC code and tools for Black Hat USA 2024☆24Aug 1, 2024Updated last year
- ☆29May 12, 2025Updated 9 months ago
- Java archive implant toolkit.☆61Apr 20, 2025Updated 10 months ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- ☆30Jan 12, 2023Updated 3 years ago
- Repository to store exploits created by Assetnotes Security Research team☆181Nov 7, 2023Updated 2 years ago
- Scripts from Ghidra Golf competitions☆34Jan 24, 2023Updated 3 years ago
- Execute a shell command within Cloud Run☆31Jul 7, 2022Updated 3 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated 2 months ago
- ☆65Dec 9, 2021Updated 4 years ago
- ☆181Dec 16, 2022Updated 3 years ago
- ☆31Sep 23, 2022Updated 3 years ago
- ☆35Apr 15, 2022Updated 3 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- Leverage Ollion's GCP Landing Zone to deploy a secure, compliant foundation with ease. The repository contains an implementation of a sec…☆38Jun 13, 2024Updated last year
- ☆36Apr 29, 2025Updated 10 months ago
- Examples of Metamorphic and Polymorphic code☆35Aug 16, 2020Updated 5 years ago
- ☆30Jan 13, 2026Updated last month
- .NET deserialization hunter☆82Jul 21, 2024Updated last year
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆66Jan 14, 2019Updated 7 years ago