CVE-2021-43798 - Grafana 8.x Path Traversal (Pre-Auth)
☆40Dec 7, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-43798
Users that are interested in CVE-2021-43798 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Just simple PoC for the Atlassian Jira exploit. Provides code execution for unauthorised user on a server.☆11Jul 21, 2022Updated 3 years ago
- Grafana Arbitrary File Reading Vulnerability☆27Dec 7, 2021Updated 4 years ago
- Get a reverse shell using PostgreSQL☆21Aug 16, 2024Updated last year
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- Gitbook: OSCP-Jewels☆12Oct 19, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- NetCommander - An easy to use arp spoofing tool.☆19Jul 6, 2011Updated 14 years ago
- Java deserialization examples☆13Feb 6, 2019Updated 7 years ago
- post/windows/manage/enable_rdp Metaploit module in Command prompt module☆38Apr 21, 2019Updated 6 years ago
- Neuviks Terraform Red Team Workshop☆14Aug 10, 2025Updated 8 months ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸☆35Jun 16, 2022Updated 3 years ago
- FlipperZero Bad USB script for loadouts☆10Mar 25, 2024Updated 2 years ago
- Instructions for hacking and cloning RFID cards☆19Nov 28, 2023Updated 2 years ago
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Apr 10, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Rubidea - Bind XSS Server to Steal cookies.☆14May 2, 2020Updated 5 years ago
- 远程探测 remote desktop licensing 服务开放情况,用于 CVE-2024-38077 漏洞快速排查☆12Aug 9, 2024Updated last year
- Offshore.CAT provides DMCA-ignored offshore hosting solutions. Built with HTML and CSS, it offers an intuitive interface for seamless int…☆19Sep 9, 2025Updated 7 months ago
- Place for random PoCs☆18May 21, 2020Updated 5 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Jun 19, 2024Updated last year
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆21Dec 16, 2025Updated 4 months ago
- Integrated tool for extracting scripts and binaries of AutoIt, AutoHotKey, InnoSetup, NSIS executables and Decoding powershell / jse / vb…☆14Dec 10, 2018Updated 7 years ago
- ☆13Nov 25, 2024Updated last year
- A tiny runtime hot patch tool for JAVA☆14Dec 22, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Telegram Bot that you can check if you have an account that has been compromised in any public data breaches☆17Jan 8, 2026Updated 3 months ago
- Pentest Tool to generate usernames/logins based on supplied names.☆38Jan 7, 2019Updated 7 years ago
- POC for CVE-2024-23897 Jenkins File-Read☆39Nov 20, 2025Updated 4 months ago
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure☆12Feb 17, 2022Updated 4 years ago
- ☆189May 29, 2023Updated 2 years ago
- quick script for mixing wordlists in a way that maintains order. ([1,2],[3,4],[5,6] -> [1,3,5,2,4,6])☆10Mar 6, 2022Updated 4 years ago
- A powerful pentesting tool for proactive detection and exploitation of dependency confusion vulnerabilities in Node.js projects. Enhance …☆14Jul 25, 2023Updated 2 years ago
- PSX provides a collection of common operations that rely on PowerShell like encoding and hosting PowerShell-specific payloads☆12Oct 18, 2023Updated 2 years ago
- generate payloads that force authentication against an attacker machine☆120Nov 6, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CVE-2022-24734 PoC☆48May 8, 2022Updated 3 years ago
- ☆13Jan 20, 2017Updated 9 years ago
- 免杀shellcode加载器☆18Mar 4, 2021Updated 5 years ago
- ☆22Nov 3, 2022Updated 3 years ago
- WebSocket shell☆14Nov 29, 2020Updated 5 years ago
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- SearchToolkit is advanced collection of tools, hardwares, resources and cheatsheets useful for Pentester, Red Teamer, Bug Hunter, Forensi…☆25Apr 12, 2026Updated last week