user0x1337 / CVE-2022-39227Links
CVE-2022-39227 : Proof of Concept
☆21Updated last year
Alternatives and similar repositories for CVE-2022-39227
Users that are interested in CVE-2022-39227 are comparing it to the libraries listed below
Sorting:
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆47Updated last year
- Resources and exploits made for OSWE preparation.☆49Updated 2 years ago
- Root shell PoC for CVE-2021-3156☆70Updated 4 years ago
- A python based minimal DNS server to test/verify DNS rebinding attacks☆66Updated 2 years ago
- TUDO - A vulnerable PHP Web Application☆122Updated 2 years ago
- A tool to inspect and attack version 1 GUIDs☆238Updated 3 years ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆145Updated 7 months ago
- Some tips for Bug Bounty using LibreOffice☆51Updated 8 months ago
- Tool to mass analyse potentially exposed Firebase databases on Android apps☆63Updated 6 years ago
- Python Duo Push API☆39Updated 5 months ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆94Updated 6 years ago
- Useful tips and resources for preparing for the AWAE exam.☆142Updated 4 years ago
- XXE techniques☆12Updated 4 years ago
- Transition form local file inclusion attacks to remote code exection☆66Updated 5 years ago
- Enumerate / Dump Docker Registry☆180Updated last year
- ☆132Updated 4 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆116Updated 4 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆62Updated 2 years ago
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆158Updated 3 years ago
- NotSoCereal: A Deserialization exploit playground☆54Updated 3 years ago
- PP-finder Help you find gadget for prototype pollution exploitation☆180Updated last year
- ☆92Updated 3 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆149Updated 11 months ago
- Content-Security-Policy (CSP) Bypass Techniques☆70Updated 5 years ago
- An OSWE Guide☆117Updated 4 years ago
- ☆42Updated last year
- Notes on Preparing for Offsec☆26Updated 2 years ago
- SSTI Payload Generator☆92Updated 3 years ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆61Updated 4 months ago