yasserjanah / CVE-2020-5902View external linksLinks
exploit code for F5-Big-IP (CVE-2020-5902)
☆43May 22, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2020-5902
Users that are interested in CVE-2020-5902 are comparing it to the libraries listed below
Sorting:
- Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)☆24Oct 12, 2021Updated 4 years ago
- The Izanami Framework is a phishing attacks framework, that use ARP spoof attack and DNS spoofing attack to redirect all LAN devices HTTP…☆14Nov 5, 2025Updated 3 months ago
- CVE-2021-22986 & F5 BIG-IP RCE☆91Apr 3, 2021Updated 4 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Mar 13, 2022Updated 3 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 9 months ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- an exploit tool for Thinkcmf RCE vulnerable☆14Feb 5, 2020Updated 6 years ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Nov 5, 2023Updated 2 years ago
- CLI for the Akamai's mPulse Query API☆10Apr 22, 2025Updated 9 months ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- 利用api来查询用户的star,仓库的commits、releases、issus。查询关键字更新☆12Mar 7, 2021Updated 4 years ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆10Dec 2, 2021Updated 4 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆82Nov 13, 2021Updated 4 years ago
- An easy to use character based menu program written in C - use it to automate some of those regular tasks. Takes a simple input text fil…☆13Nov 19, 2025Updated 2 months ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 3 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- Checker for QNAP pre-auth root RCE (CVE-2019-7192 ~ CVE-2019-7195)☆13Jun 10, 2021Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆14Nov 6, 2020Updated 5 years ago
- Golang 解析Wappalyzer指纹库,暂不支持识别☆13Oct 10, 2020Updated 5 years ago
- F5 BIG-IP 任意文件读取+远程命令执行RCE☆13Jul 8, 2020Updated 5 years ago
- This tool is used to find the admin login page of a website.☆16Jan 15, 2021Updated 5 years ago
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- Rewriting Armitage in Kotlin for the latest Metasploit☆16Apr 12, 2023Updated 2 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- java UI 插件化漏洞扫描工具☆18Apr 14, 2020Updated 5 years ago
- A simple Fetch API library for making HTTP Requests☆14Aug 11, 2021Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 3 years ago
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- Proof of concept for Weblogic CVE-2020-2883☆15May 13, 2020Updated 5 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆225Sep 29, 2020Updated 5 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago