spiarh / webhook-cve-2022-0811
Simple webhook to block exploitation of CVE-2022-0811
☆8Updated 3 years ago
Alternatives and similar repositories for webhook-cve-2022-0811:
Users that are interested in webhook-cve-2022-0811 are comparing it to the libraries listed below
- PoC for CVE-2021-43557☆21Updated 3 years ago
- log4j 1.x RCE Poc -- CVE-2021-4104☆20Updated 3 years ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆74Updated 10 months ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆30Updated 4 years ago
- 云原生安全漏洞收集☆12Updated 3 weeks ago
- ☆15Updated 4 years ago
- 渗透技术栈☆19Updated 5 years ago
- redshift-jdbc-RCE proof☆1Updated 2 years ago
- CVE's for onlyoffice☆11Updated last year
- ☆20Updated 3 years ago
- Proof of concept exploit for CVE-2022-30525 (Zxyel firewall command injection)☆30Updated 2 years ago
- 一款基于机器学习的Web日志统计分析与异常检测命令行工具☆14Updated 3 years ago
- CVE-2022-37042 Zimbra Auth Bypass leads to RCE☆30Updated 2 years ago
- CVE-2021-42342 RCE☆42Updated 3 years ago
- ☆21Updated 3 years ago
- (CNVD-2021-26422)亿邮电子邮件系统 远程命令执行漏洞☆12Updated 3 years ago
- A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692☆36Updated 2 years ago
- SSRF 绕过 Payload☆15Updated 4 years ago
- 一款利用某云厂商的物联网平台作为c2的框架☆23Updated last year
- 欺骗wappalyzer插件指纹识别&XSS☆13Updated 3 years ago
- CodeQL extractor for java, which don't need to compile java source☆10Updated 2 years ago
- reverse Shell☆10Updated 2 years ago
- woodpecker-plugins☆10Updated 3 years ago
- Cobalt Strike teamserver detection.☆16Updated 3 years ago
- CVE-2022-24112:Apache APISIX apisix/batch-requests RCE☆44Updated 3 years ago
- Java XMLDecoder payload generator☆15Updated 3 years ago
- Oracle WebLogic Server 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 Local File Inclusion☆27Updated 3 years ago
- ☆18Updated 2 years ago
- 在一定条件下可执行命令☆12Updated 5 years ago
- Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?☆39Updated 7 months ago