tunelko / CVE-2022-22954-PoCLinks
VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.
☆12Updated last year
Alternatives and similar repositories for CVE-2022-22954-PoC
Users that are interested in CVE-2022-22954-PoC are comparing it to the libraries listed below
Sorting:
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 7 months ago
- ☆17Updated 3 years ago
- ☆45Updated last year
- This includes all the templates of nuclei collected from different sources☆17Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- bug bounty automation☆13Updated 4 years ago
- CVE-2022-41040 nuclei template☆19Updated 2 years ago
- ☆12Updated 3 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Striping CDN & WAF IPs from a list of IP Addresses☆79Updated 3 months ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- Burp Suite Extensions☆12Updated 3 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Updated 8 months ago
- List of custom Nuclei templates☆15Updated last year
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆29Updated 3 years ago
- ☆43Updated 4 years ago
- URL scanner for recon, vulnerabilities, secrets and more!☆12Updated 3 years ago
- Script for Bug Bounty☆29Updated 3 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Updated 2 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- ☆14Updated last year
- This extension provides a way to discover NoSQL injection vulnerabilities.☆23Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Scan for and exploit the zerologon vulnerability.☆10Updated 4 years ago
- Template Nuclei SSTI☆31Updated last year
- Extract endpoints marked as disallow in robots files to generate wordlists.☆59Updated 3 years ago
- Web CTF CheatSheet 🐈☆34Updated 6 years ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆60Updated 2 years ago