Here you can get full exploit for SAP NetWeaver AS JAVA
☆77Jan 18, 2018Updated 8 years ago
Alternatives and similar repositories for SAP_exploit
Users that are interested in SAP_exploit are comparing it to the libraries listed below
Sorting:
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆226Sep 29, 2020Updated 5 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- ☆73Nov 5, 2018Updated 7 years ago
- laravel 5.8 rce pop chain☆26Oct 27, 2019Updated 6 years ago
- Weblogic IIOP CVE-2020-2551☆340Apr 7, 2020Updated 5 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 5 years ago
- exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts☆17Oct 23, 2019Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters☆254Oct 26, 2022Updated 3 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- SAP Gateway RCE exploits☆158Sep 7, 2020Updated 5 years ago
- PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Or…☆96Jul 21, 2020Updated 5 years ago
- Vulnerabilities which found in Oracle products☆33Apr 17, 2019Updated 6 years ago
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆26Jun 25, 2014Updated 11 years ago
- Nothing special --- Some resources to save my time☆20Aug 14, 2020Updated 5 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- just a python script for cve-2017-12615☆11Oct 1, 2017Updated 8 years ago
- A BurpSuite plugin for BBRF☆25Nov 17, 2024Updated last year
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Dec 8, 2022Updated 3 years ago
- experimenting w/ apple script for various macOS functionality☆14Aug 4, 2019Updated 6 years ago
- 超精简的POC扫描框架☆10Aug 5, 2019Updated 6 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- Rusty Joomla RCE Exploit☆69Dec 3, 2022Updated 3 years ago
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 4 years ago
- POC for CVE-2019-14339 Canon PRINT 2.5.5☆14Sep 15, 2019Updated 6 years ago
- Siva is a high speed multi-threaded vulnerability scanner☆15Nov 5, 2019Updated 6 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆12Aug 29, 2025Updated 5 months ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆31Mar 13, 2019Updated 6 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago