A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1
☆20Mar 19, 2024Updated last year
Alternatives and similar repositories for CVE-2024-23334-PoC
Users that are interested in CVE-2024-23334-PoC are comparing it to the libraries listed below
Sorting:
- Decrypts blowfish (w. static key) encrypted hMail database password.☆15Feb 21, 2018Updated 8 years ago
- ☆61Jun 28, 2025Updated 8 months ago
- ☆21Sep 12, 2025Updated 5 months ago
- LimeSurvey Authenticated RCE☆23Jul 16, 2023Updated 2 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated 2 years ago
- Atlassian Confluence (CVE-2022-26134) - Unauthenticated Remote code execution (RCE)☆28Aug 23, 2024Updated last year
- This tool can gather a lot of info without any defender alerts. It is useful for Penetration testers, SOC Analysts, System administrators…☆29Apr 9, 2025Updated 11 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- Notes, Lab Commands and Vulnerability Information for BSCP Exam Prep☆51Jun 7, 2023Updated 2 years ago
- The list of files through which we can pop-up the java script alert box☆40Mar 5, 2018Updated 8 years ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆168Aug 22, 2024Updated last year
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 10 months ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Code dump from PEN-300/OSEP updated 2022☆43Aug 23, 2022Updated 3 years ago
- ☆12Feb 24, 2025Updated last year
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 3 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- ☆11Apr 2, 2024Updated last year
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- ☆12Feb 20, 2025Updated last year
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- python coding guidelines☆13May 31, 2022Updated 3 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- ☆18Jan 12, 2026Updated last month
- Tool for enumerate subdomains by Brute-force, or by using different options while grabbing results.☆14Sep 7, 2023Updated 2 years ago
- ☆14Jul 26, 2025Updated 7 months ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 weeks ago
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- ☆13Mar 27, 2021Updated 4 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago