voidz0r / CVE-2022-44268
A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read
☆213Updated last year
Alternatives and similar repositories for CVE-2022-44268:
Users that are interested in CVE-2022-44268 are comparing it to the libraries listed below
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆271Updated last year
- ImageMagick LFI PoC [CVE-2022-44268]☆52Updated last year
- Enumerate / Dump Docker Registry☆166Updated 9 months ago
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆195Updated 3 months ago
- POC for CVE-2021-41091☆64Updated last year
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆277Updated 5 months ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆121Updated 5 years ago
- CVE-2023-33733 reportlab RCE☆114Updated last year
- PP-finder Help you find gadget for prototype pollution exploitation☆147Updated 5 months ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆79Updated 6 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆117Updated last year
- ☆114Updated 2 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆251Updated 8 months ago
- Root shell PoC for CVE-2021-3156☆63Updated 3 years ago
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆131Updated 8 months ago
- Privilege escalation with polkit - CVE-2021-3560☆118Updated 3 years ago
- A collection of Server-Side Prototype Pollution gadgets and exploits☆160Updated 5 months ago
- SSTI Payload Generator☆89Updated 2 years ago
- GameOver(lay) Ubuntu Privilege Escalation☆122Updated last year
- LFI to RCE via phpinfo() assistance or via controlled log file☆60Updated last year
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆105Updated 9 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty☆198Updated last week
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆68Updated 10 months ago
- RCE exploit for dompdf☆178Updated 2 years ago
- Vulnerabilities Exploitation On Ubuntu 22.04☆36Updated last year
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆69Updated 3 years ago
- Repository to store exploits created by Assetnotes Security Research team☆175Updated last year
- Aspx reverse shell☆100Updated 4 years ago
- ☆23Updated 3 years ago
- ☆143Updated 2 years ago