skelsec / CVE-2017-12542
Test and exploit for CVE-2017-12542
☆84Updated 6 years ago
Related projects: ⓘ
- A weaponized version of CVE-2018-9206☆62Updated 5 years ago
- Python script to exploit CVE-2015-4852.☆29Updated 8 years ago
- ☆70Updated this week
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 6 years ago
- Test CVE-2018-0296 and extract usernames☆107Updated 5 years ago
- CVE-2019-0604☆132Updated 5 years ago
- Metasploit msfvenom Bash Completions Generator☆40Updated 8 years ago
- Unified repository for different Metasploit Framework payloads☆47Updated 4 years ago
- Python Web framework P0wner☆75Updated 11 years ago
- CVE-2018-7600 Drupal RCE☆115Updated 6 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆125Updated 2 years ago
- ☆67Updated this week
- Automates credential skimming from service accounts in Windows Registry☆73Updated 3 years ago
- ☆51Updated this week
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- public exploits☆35Updated last year
- ☆132Updated this week
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 7 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 6 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆98Updated 6 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Updated 6 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆56Updated 8 years ago
- Proof of Concept exploit for CVE-2017-8570☆185Updated 6 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆56Updated 4 years ago
- ☆60Updated this week
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆47Updated 5 years ago
- Some scripts and exploits☆142Updated 6 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 8 years ago