A pre-authenticated RCE exploit for Inductive Automation Ignition
☆48Jul 18, 2022Updated 3 years ago
Alternatives and similar repositories for randy
Users that are interested in randy are comparing it to the libraries listed below
Sorting:
- ☆30Nov 1, 2022Updated 3 years ago
- CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to des…☆103Apr 16, 2024Updated last year
- 一款快速全端口扫描的工具,并获取网站标题、指纹识别结果、WAF判断、是否为后台、状态码判断等功能的IP信息收集工具。☆13Sep 21, 2023Updated 2 years ago
- ☆114Aug 25, 2023Updated 2 years ago
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Oct 3, 2023Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Dec 6, 2025Updated 2 months ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- Apahce-Superset身份认证绕过漏洞(CVE-2023-27524)检测工具☆11Aug 3, 2023Updated 2 years ago
- ☆11Sep 1, 2023Updated 2 years ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85May 31, 2023Updated 2 years ago
- Metasploit modules in testing☆14Jul 21, 2019Updated 6 years ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- Tomcat漏洞批量检测工具☆13Dec 18, 2025Updated 2 months ago
- [CVE-2020-6287] SAP NetWeaver AS JAVA (LM Configuration Wizard) Authentication Bypass (Create Simple & Administrator Java User)☆13Sep 18, 2020Updated 5 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆90Oct 8, 2023Updated 2 years ago
- Contains challenges, write-ups, and deployment configurations from b01lersCTF 2023.☆12Apr 3, 2023Updated 2 years ago
- Triton based symbolic emulator☆16Oct 30, 2022Updated 3 years ago
- Authentication Bypass in GoAnywhere MFT☆65Jan 23, 2024Updated 2 years ago
- Open KLara Project☆36Feb 12, 2026Updated 2 weeks ago
- PoC for CVE-2024-27130☆37May 17, 2024Updated last year
- Simple script to find kernel objects of a certain size in the Linux kernel☆112Dec 1, 2022Updated 3 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆71Mar 28, 2023Updated 2 years ago
- CVE-2022-41852 Proof of Concept (unofficial)☆75Oct 20, 2022Updated 3 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago
- ☆22Jun 18, 2015Updated 10 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Feb 8, 2023Updated 3 years ago
- This is a repository for collecting and collating vulnerability disclosures, tips, and tools☆17Nov 19, 2025Updated 3 months ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- DHCP Server Remote Code Execution impact: 2008 R2 SP1 до Server 2019☆69May 5, 2023Updated 2 years ago
- RCE on Apache Solr 8.3.1☆42May 6, 2023Updated 2 years ago
- ☆38Jan 13, 2023Updated 3 years ago
- CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC☆119Jan 9, 2023Updated 3 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆18Mar 24, 2025Updated 11 months ago
- ☆21Dec 24, 2022Updated 3 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- Library for manipulating gdb in batch mode☆21Mar 10, 2024Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Feb 12, 2023Updated 3 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago