Example PoC Code for CVE-2017-5638 | Apache Struts Exploit
☆19Mar 12, 2017Updated 8 years ago
Alternatives and similar repositories for cve-2017-5638
Users that are interested in cve-2017-5638 are comparing it to the libraries listed below
Sorting:
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- An exploit for Apache Struts CVE-2017-5638☆442May 21, 2018Updated 7 years ago
- A personalised Spotify quiz based on the music you listen to☆15Mar 24, 2021Updated 4 years ago
- ☆29Mar 15, 2017Updated 8 years ago
- In this work, we compared the predictive capabilities of six different machine learning algorithms - linear regression, random forest, ex…☆15Sep 21, 2020Updated 5 years ago
- ☆28Jun 28, 2019Updated 6 years ago
- MWO Issue Tracker☆17Aug 22, 2017Updated 8 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- Tainted PhantomJS☆52Jul 6, 2015Updated 10 years ago
- Files to make FFXI Beautiful☆10Jan 9, 2022Updated 4 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- A Node-RED node to increment a count.☆10Sep 22, 2023Updated 2 years ago
- Where I keep my config files for other to look at and use☆12May 27, 2021Updated 4 years ago
- The unofficial Prime League Bot for sending push notifications via discord and telegram.☆12Feb 5, 2026Updated last month
- Kubernetes for Beginners, by Packt PPublishing☆14Jan 30, 2023Updated 3 years ago
- API Automation Testing Via Playwright☆10Aug 9, 2023Updated 2 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- AWS CloudFormation templates for the blog post regarding Defense in Depth using AWS Managed Rules☆10Aug 17, 2020Updated 5 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Introduction to using Python to process CSV files.☆10Feb 24, 2017Updated 9 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- golang utils☆10Dec 8, 2022Updated 3 years ago
- Scanning alive hosts of the given CIDR range in parallel.☆10May 8, 2025Updated 10 months ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- AES file encryption for Visual Studio Code☆10Oct 25, 2023Updated 2 years ago
- ☆16May 18, 2023Updated 2 years ago
- A multi-function macro for Mechwarrior Online☆12Jul 11, 2022Updated 3 years ago
- Public release of the sources for SunshineCTF 2017 challenges☆11Oct 31, 2017Updated 8 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- My resume written in Markdown, with publishing script for various formats.☆12Jan 13, 2026Updated last month
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- Kubernetes Kubelet RCE Automated Script. Utilizes both "run" and "exec" debug handlers.☆10Sep 28, 2020Updated 5 years ago