vin01 / poc-cve-2024-38396
PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution
☆19Updated 9 months ago
Alternatives and similar repositories for poc-cve-2024-38396:
Users that are interested in poc-cve-2024-38396 are comparing it to the libraries listed below
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Updated 2 years ago
- static sites for blog.orange.tw☆21Updated last week
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- Reversing Citrix Gateway for XSS☆17Updated last year
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆16Updated 7 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆49Updated 10 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 3 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 6 years ago
- 2022 CTF public release☆23Updated 2 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆17Updated 3 years ago
- A red team emulation tool deveoped by CyCraft Technology☆25Updated 11 months ago
- Simple WebSocket fuzzer☆32Updated last year
- ☆15Updated 3 years ago
- Reverse Shell as a Service☆32Updated 4 years ago
- ☆50Updated 2 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆22Updated 3 years ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆22Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆26Updated 4 months ago
- ☆21Updated 7 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated last year
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated 10 months ago