exploit code for F5-Big-IP (CVE-2020-5902)
☆43May 22, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2020-5902
Users that are interested in CVE-2020-5902 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Izanami Framework is a phishing attacks framework, that use ARP spoof attack and DNS spoofing attack to redirect all LAN devices HTTP…☆14Nov 5, 2025Updated 4 months ago
- AnDroidInject0r is a Python script to inject existing Android applications with a Meterpreter payload. It can be used during penetrating …☆17Feb 22, 2021Updated 5 years ago
- Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)☆25Oct 12, 2021Updated 4 years ago
- CVE-2021-22986 & F5 BIG-IP RCE☆91Apr 3, 2021Updated 4 years ago
- A library that scrapes Linkedin for user data☆24May 12, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆16May 3, 2021Updated 4 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆12Apr 29, 2025Updated 11 months ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆82Nov 13, 2021Updated 4 years ago
- A tool to abuse Exchange services☆18Jun 21, 2019Updated 6 years ago
- 利用api来查询用户的star,仓库的commits、releases、issus。查询关键字更新☆12Mar 7, 2021Updated 5 years ago
- an exploit tool for Thinkcmf RCE vulnerable☆14Feb 5, 2020Updated 6 years ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Nov 5, 2023Updated 2 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆16Mar 13, 2022Updated 4 years ago
- StringEncrypt allows you to encrypt strings and files using a randomly generated algorithm, generating a unique decryption code (so-calle…☆23Mar 11, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- Collection Most Advanced Shell's☆20Jan 6, 2020Updated 6 years ago
- Script for monitoring changes in javascript files on WebApps for offensive reconnaissance.☆28Aug 4, 2021Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆225Sep 29, 2020Updated 5 years ago
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Checker for QNAP pre-auth root RCE (CVE-2019-7192 ~ CVE-2019-7195)☆13Jun 10, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Proof of concept for CVE-2020-5902☆72Jul 6, 2020Updated 5 years ago
- ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit☆48Oct 14, 2021Updated 4 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- 蓝凌OA漏洞利用工具/前台无条件RCE/文件写入☆28Jun 29, 2021Updated 4 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- ☆12Jul 4, 2024Updated last year
- Kubernetes Kubelet RCE Automated Script. Utilizes both "run" and "exec" debug handlers.☆10Sep 28, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Personal Collection of Awesome Google Dorks☆30Sep 13, 2019Updated 6 years ago
- F5 BIG-IP 任意文件读取+远程命令执行RCE☆13Jul 8, 2020Updated 5 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- My recon script☆50Dec 23, 2019Updated 6 years ago
- Proof of concept for Weblogic CVE-2020-2883☆15May 13, 2020Updated 5 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Disables LibOemCrypto.so on rooted devices to bypass DRM restrictions and allow e.g. Netflix, My5 playbacka☆10Dec 20, 2020Updated 5 years ago