Confluence Hardcoded Password POC
☆15Jul 30, 2022Updated 3 years ago
Alternatives and similar repositories for CVE-2022-26138
Users that are interested in CVE-2022-26138 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WordPress WP_Query SQL Injection POC☆28Mar 11, 2023Updated 3 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆23Sep 13, 2022Updated 3 years ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Jun 18, 2025Updated 10 months ago
- CVE-2022-24086 about Magento RCE☆36Dec 16, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆14Mar 16, 2022Updated 4 years ago
- ☆15Sep 13, 2023Updated 2 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- ClickHouse是一款开源的列式数据库,ClickHouse存在未授权访问漏洞,攻击者可利用该漏洞获取数据库的敏感信息☆14May 6, 2023Updated 3 years ago
- 禅道开源版16.5&16.5beta1,企业版6.5&6.5beta1,旗舰版3.0&3.0beta1的前台SQL注入☆13Jul 28, 2022Updated 3 years ago
- K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388☆54May 9, 2022Updated 4 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692☆35Nov 7, 2022Updated 3 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- 天眼查脚本☆19Jun 2, 2022Updated 3 years ago
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.☆20Jul 14, 2022Updated 3 years ago
- 安卓activity劫持演示demo,包含指定activity位于前台时的劫持和指定进程位于前台时的劫持☆15Dec 20, 2018Updated 7 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Sep 16, 2024Updated last year
- CVE-2022-24112:Apache APISIX apisix/batch-requests RCE☆44Feb 22, 2022Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- Redis 沙盒逃逸(CVE-2022-0543)POC&EXP☆25Jul 23, 2022Updated 3 years ago
- Simple Autopilt built using dronekit and MAVLink protocol☆10Nov 2, 2018Updated 7 years ago
- CVE-2021-22205 RCE☆13Jul 4, 2022Updated 3 years ago
- TightVNC Vulnerability.☆16Jan 26, 2022Updated 4 years ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27May 23, 2023Updated 2 years ago
- ☆20Dec 8, 2022Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- Turning Your Computer Into a GPS Tracker With Apple Maps☆18Feb 6, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Reversing Citrix Gateway for XSS☆17Jul 3, 2023Updated 2 years ago
- Shell Scripting with Bash, by EC-Council☆11Jun 4, 2021Updated 4 years ago
- CVE-2022-22965\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用☆16Apr 2, 2022Updated 4 years ago
- Nudity/pornography detection using deeplearning. This model is trained using pretrained VGG-16. To know more about this check the readme …☆19Sep 2, 2021Updated 4 years ago
- CVE-2023-1671-POC, based on dnslog platform☆17Apr 26, 2023Updated 3 years ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆26Dec 28, 2022Updated 3 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago