CVE-2022-39227 : Proof of Concept
☆22Mar 19, 2024Updated 2 years ago
Alternatives and similar repositories for CVE-2022-39227
Users that are interested in CVE-2022-39227 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Werkzeug password cracker☆19Nov 14, 2024Updated last year
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆219Dec 4, 2024Updated last year
- ☆23Sep 26, 2023Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Content-Security-Policy (CSP) Bypass Techniques☆76Oct 28, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆12Feb 7, 2024Updated 2 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Mar 13, 2024Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Mar 3, 2021Updated 5 years ago
- Monorepo for challenges, infra, and theming for UIUCTF 2024 (https://2024.uiuc.tf/)☆17Jul 14, 2024Updated last year
- Postman Integration is an extension for burp to generate Postman collection fomat json file.☆20Sep 7, 2022Updated 3 years ago
- ☆17Apr 30, 2024Updated last year
- Detect and bypass Istio sidecar☆21Sep 24, 2021Updated 4 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- Kyuubi is a Telegram bot written in Golang. a multipurpose telegram bot to use in recon process. Don't you have access to terminal to do …☆12Oct 11, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- hack3270 is a python3 based tool to manipulate tn3270 data streams, specifically to perform application penetration testing of mainframe …☆24Feb 21, 2026Updated last month
- LFI to RCE tool.☆15May 10, 2020Updated 5 years ago
- ☆10Feb 2, 2024Updated 2 years ago
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- Access All Networks: an offensive multitool against 802.1X☆20Aug 25, 2025Updated 7 months ago
- Vulnerabilities Exploitation On Ubuntu 22.04☆49May 16, 2023Updated 2 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Feb 18, 2021Updated 5 years ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆19Feb 18, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Scans plugins directory for possible vulnerable plugins.☆22Dec 9, 2023Updated 2 years ago
- The agent for kube-advisor.io☆14Jan 28, 2025Updated last year
- ☆14Sep 26, 2023Updated 2 years ago
- An open-source knowledge base for security researchers.☆18Jan 8, 2025Updated last year
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Mar 27, 2020Updated 6 years ago
- A simple tool to fix corrupted png images by bruteforcing possible image dimensions in the IHDR chunk.☆19Oct 6, 2023Updated 2 years ago
- Nishang - PowerShell for penetration testing and offensive security.☆14May 4, 2015Updated 10 years ago
- ☆11Mar 12, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.☆20Apr 6, 2024Updated last year
- Asynchronous Python Wrapper For EgyBest-API.☆16Sep 3, 2024Updated last year
- Web Application Penetration Testing Methodology☆52Nov 12, 2025Updated 4 months ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- ☆15May 22, 2023Updated 2 years ago
- a powerful tool designed to automate the detection of Server-Side Request Forgery (SSRF) and Open Redirect vulnerabilities☆22Oct 15, 2024Updated last year
- Automated tool to find backup files that may disclose a website's source code☆20Oct 13, 2022Updated 3 years ago