vin01 / poc-cve-2024-38396Links
PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution
☆19Updated last year
Alternatives and similar repositories for poc-cve-2024-38396
Users that are interested in poc-cve-2024-38396 are comparing it to the libraries listed below
Sorting:
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- Simple WebSocket fuzzer☆33Updated 2 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- ☆30Updated last year
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Updated 2 years ago
- ☆21Updated last month
- ☆10Updated 4 years ago
- CVE, reports, research☆17Updated 4 years ago
- A python-based padding oracle tool☆20Updated 11 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 4 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- ☆16Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated 5 months ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- Left To My Own Devices - NT hash tools☆33Updated 2 years ago
- USENIX 2023 Artifacts☆11Updated 2 years ago
- ☆21Updated 7 years ago
- 2022 CTF public release☆23Updated 3 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Cryptovenom: The Cryptography Swiss Army Knife☆9Updated 5 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago