user0x1337 / CVE-2022-39227View external linksLinks
CVE-2022-39227 : Proof of Concept
☆22Mar 19, 2024Updated last year
Alternatives and similar repositories for CVE-2022-39227
Users that are interested in CVE-2022-39227 are comparing it to the libraries listed below
Sorting:
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆217Dec 4, 2024Updated last year
- Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty…☆25Jan 13, 2024Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Mar 3, 2021Updated 4 years ago
- ☆23Sep 26, 2023Updated 2 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Mar 13, 2024Updated last year
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆34Oct 31, 2017Updated 8 years ago
- ☆11Mar 12, 2020Updated 5 years ago
- You'll find all the resources and presentations I have used in my talks and workshops☆12Nov 16, 2024Updated last year
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆11Feb 7, 2024Updated 2 years ago
- Collection of all the resources published by Payatu.☆11Aug 11, 2025Updated 6 months ago
- ☆10Feb 2, 2024Updated 2 years ago
- Inject code into .net applications☆12Nov 7, 2018Updated 7 years ago
- A python script to automatically generate shellcode payload from assembly files.☆13Nov 13, 2022Updated 3 years ago
- ☆12Feb 2, 2022Updated 4 years ago
- A collection of tools for the Janus exploit [CVE-2017-13156].☆10Oct 22, 2019Updated 6 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- Picarch is a Python project for face detection and image similarity search using insightface and PostgreSQL.☆14Apr 8, 2025Updated 10 months ago
- The agent for kube-advisor.io☆14Jan 28, 2025Updated last year
- Mobster is a tool that can help you get deeper understanding into the performance of mobile web applications on real mobile devices☆38Mar 27, 2013Updated 12 years ago
- ☆13Mar 12, 2022Updated 3 years ago
- ☆15May 22, 2023Updated 2 years ago
- Spring Cloud Function SPEL RCE demo☆11Apr 2, 2022Updated 3 years ago
- CVE-2024-0044☆12Aug 24, 2024Updated last year
- Linux-kernel related code (patch form mark1/logibone support, kernel modules for communication, etc), can link to supported repositories☆23Apr 12, 2017Updated 8 years ago
- Asynchronous Python Wrapper For EgyBest-API.☆14Sep 3, 2024Updated last year
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆29Jan 29, 2026Updated 2 weeks ago
- A python based minimal DNS server to test/verify DNS rebinding attacks☆70May 15, 2023Updated 2 years ago
- ☆123Dec 6, 2023Updated 2 years ago
- Decoding of Microsoft Script Encoder☆12Dec 29, 2018Updated 7 years ago
- Looney Tunables Local privilege escalation (CVE-2023-4911) workshop☆15Oct 1, 2024Updated last year
- ☆12Jul 1, 2025Updated 7 months ago
- DCTF 2022 Challenge and infrastructure repository☆10May 8, 2024Updated last year
- ☆17Apr 30, 2024Updated last year
- ARK: Survival Evolved via Kubernetes (and then some)☆13May 23, 2025Updated 8 months ago
- Material e instructivo para el Workshop de nerdearla 101 v2☆13Jul 27, 2022Updated 3 years ago
- scripts & notes☆13Nov 4, 2019Updated 6 years ago