Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script
☆16May 13, 2018Updated 7 years ago
Alternatives and similar repositories for CVE-2017-5638
Users that are interested in CVE-2017-5638 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 11 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆20Jun 6, 2024Updated last year
- ☆11Sep 12, 2022Updated 3 years ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆31Nov 18, 2025Updated 5 months ago
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- SQLMap with Autonomous AI, phased workflows, RAG memory, and MCP Agent Tools☆92Feb 26, 2026Updated 2 months ago
- ☆13Mar 6, 2025Updated last year
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- ☆16Mar 29, 2024Updated 2 years ago
- ☆16Apr 30, 2020Updated 6 years ago
- Context-aware Nmap reconnaissance framework with traffic intelligence and AD awareness☆26Feb 4, 2026Updated 3 months ago
- PHP DDoS/Stress Test☆11Feb 7, 2026Updated 2 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- Bug bounty policies☆12Mar 23, 2026Updated last month
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- Unauthenticated Command Injection In Progress Kemp LoadMaster☆19Aug 26, 2025Updated 8 months ago
- ☆15Jul 23, 2024Updated last year
- Spacedrive native dependencies☆13Apr 8, 2025Updated last year
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆141Sep 16, 2024Updated last year
- TINMORRY filament profiles for Elegoo Printers (Orca Slicer)☆16Mar 27, 2026Updated last month
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- simple bash script to earn bounties☆36Apr 27, 2024Updated 2 years ago
- ADB Download All Files - A dirty shell script to adb pull all readable files using adb pull & base64☆25Jun 17, 2021Updated 4 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆14Jan 23, 2023Updated 3 years ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 4 months ago
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 8 months ago
- Let's make quick work of GraphQL instances ;)☆26Mar 8, 2026Updated last month
- ☆10Mar 26, 2025Updated last year
- ☆39Nov 9, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- The official BBF university.☆10Oct 12, 2017Updated 8 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Mar 16, 2023Updated 3 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated last year
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 13 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago