Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for vulnerabilities attacker
attacker
x
vulnerabilities
x
16 search results found
Secure Ios App Dev
⭐
1,338
Collection of the most common vulnerabilities found in iOS applications
Labs
⭐
939
Vulnerability Labs for security analysis
Takeover
⭐
816
Sub-Domain TakeOver Vulnerability Scanner
K8s Security
⭐
659
Kubernetes security notes and best practices
Hacking
⭐
515
hacker, ready for more of our story ! 🚀
Subaru Starlink Research
⭐
405
Subaru StarLink persistent root code execution.
Shadowsocks
⭐
330
Redirect attack on Shadowsocks stream ciphers
Leaky Leaky
⭐
152
[PATCHED] Exploit that allows one to authenticate as any user in Minecraft
Cve 2019 0708
⭐
110
Only Hitting PoC [Tested on Windows Server 2008 r2]
Django_cve_2019_19844_poc
⭐
92
PoC for CVE-2019-19844(https://www.djangoproject.com/weblo
Bodhi
⭐
92
Bodhi - Client-side Vulnerability Playground
Cisco Cve 2020 3452 Scanner Exploiter
⭐
87
CISCO CVE-2020-3452 Scanner & Exploiter
Security_examples
⭐
77
Rails application to demo CSRF, XSS, and XXE vulnerabilities and how to avoid them
Poodle
⭐
74
A Proof of Concept for the POODLE vulnerability in SSLv3
Livebox 0day
⭐
73
CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.
Prototype Pollution Explained
⭐
66
Prototype Pollution in JavaScript
Protocol Vul
⭐
59
Some Vulnerability in the some protocol are collected.
Modjoda
⭐
55
Java Object Deserialization on Android
Security
⭐
49
Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.
Exploits
⭐
49
Real world and CTFs exploiting web/binary POCs.
Plataoplomo
⭐
42
Collection of (at time of release) iOS bugs I found
Cve 2016 1764
⭐
41
Extraction of iMessage Data via XSS
Xattacker
⭐
39
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Dumpit
⭐
36
An exploit for SHAREit <= v 4.0.38
Wd Rce
⭐
31
WD My Cloud PoC exploit
Cve 2019 0708
⭐
20
CVE-2019-0708
Vulnerabilities
⭐
18
List of every possible vulnerabilities in computer security.
Lgosp Poc
⭐
13
LG On Screen Phone authentication bypass PoC (CVE-2014-8757)
Pulsesecure_session_hijacking
⭐
12
Attacking and defending web and VPN session hijacking in Pulse Secure Connect
Apekit
⭐
12
Mass Android app vulnerability analysis toolkit
Winmagic_sd
⭐
12
Technical Write-Up on and PoC Exploit for CVE-2020-11519 and CVE-2020-11520
Interview_tips
⭐
12
Summary of Cyber Security interview questions I have been through, hope this helps
Cve 2020 8289
⭐
10
CVE-2020-8289 – Remote Code Execution as SYSTEM/root via Backblaze
Pwn Multiple Dlink Router Via Soap Proto
⭐
9
日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用
Fhem 6.0 Local File Inclusion Lfi Vulnerability
⭐
9
Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.
Dlsw_exploit
⭐
9
cisco dlsw exploit
Cve 2015 3073
⭐
9
CVE-2015-3073 PoC
Whitepaper
⭐
8
[WIP] The 0xdeface.me whitepaper
Cve 2017 5638
⭐
7
Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header
Iot Securitychecker
⭐
5
IoT Security Checker is a framework for automating some IoT-related security checks
Firepwner
⭐
5
Exploit for CVE-2015-6357 Cisco FireSIGHT Management Center Certificate Validation Vulnerability
Fortios_vpnssl_traversal_leak
⭐
5
This module massively scan and exploit a path traversal vulnerability in the FortiOS SSL VPN web portal may allow an unauthenticated attacker to download FortiOS system files through specially crafted HTTP resource requests (CVE-2018-13379).
Related Searches
Security Vulnerabilities (12,350)
Laravel Vulnerabilities (11,319)
Php Vulnerabilities (8,887)
Javascript Vulnerabilities (1,306)
Python Vulnerabilities (1,159)
Vulnerabilities Scanner (695)
Vulnerabilities Exploitation (636)
Python Attacker (365)
Attack Attacker (278)
Java Vulnerabilities (259)
1-16 of 16 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.