All Projects → tintinweb → Pub

tintinweb / Pub

Licence: gpl-2.0
Vulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Pub

Exphub
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
Stars: ✭ 3,056 (+1308.29%)
Mutual labels:  exploit, vulnerability, poc
Pentesting
Misc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-88.94%)
Mutual labels:  exploit, poc, vulnerability
dheater
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (-34.56%)
Mutual labels:  exploit, poc, vulnerability
Ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Stars: ✭ 4,808 (+2115.67%)
Mutual labels:  exploit, vulnerability, poc
CVE-2021-33766
ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
Stars: ✭ 37 (-82.95%)
Mutual labels:  exploit, poc, vulnerability
Poc
Proofs-of-concept
Stars: ✭ 467 (+115.21%)
Mutual labels:  exploit, vulnerability, poc
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-59.91%)
Mutual labels:  exploit, vulnerability
Reverse Shell
Reverse Shell as a Service
Stars: ✭ 1,281 (+490.32%)
Mutual labels:  exploit, vulnerability
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+4716.13%)
Mutual labels:  exploit, vulnerability
Cve 2018 11776 Python Poc
Working Python test and PoC for CVE-2018-11776, includes Docker lab
Stars: ✭ 118 (-45.62%)
Mutual labels:  exploit, poc
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-66.82%)
Mutual labels:  exploit, vulnerability
Hisilicon Dvr Telnet
PoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (-53.46%)
Mutual labels:  exploit, poc
Safiler
Safari local file reader
Stars: ✭ 118 (-45.62%)
Mutual labels:  exploit, vulnerability
Cve 2019 0708 Tool
A social experiment
Stars: ✭ 87 (-59.91%)
Mutual labels:  exploit, poc
Cve 2017 0781
Blueborne CVE-2017-0781 Android heap overflow vulnerability
Stars: ✭ 74 (-65.9%)
Mutual labels:  exploit, poc
Jscpwn
PoC exploit for CVE-2016-4622
Stars: ✭ 89 (-58.99%)
Mutual labels:  exploit, vulnerability
Ciscoexploit
Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution/CVE-2019-1653/Cisco SNMP RCE/Dump Cisco RV320 Password)
Stars: ✭ 73 (-66.36%)
Mutual labels:  exploit, poc
Ansvif
A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.
Stars: ✭ 107 (-50.69%)
Mutual labels:  exploit, vulnerability
Vulscan
Advanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+962.21%)
Mutual labels:  exploit, vulnerability
Mtpwn
PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)
Stars: ✭ 143 (-34.1%)
Mutual labels:  exploit, poc

❤ Be a Hero, tip a 🍺 🙂 ⟶ Ƀ: 1AZMeGVfCBbYwVYyG9s79pJDyocTZgiApa | Ξth: 0x438B38E30eF117C15fBfF833f9C2c70182925815

Exploit PoCs and tools for vulnerabilities disclosed by tintinweb.

pub

[police line - do not cross] ==== [police line - do not cross] ==== [police line - do not cross]
                             ==== [                          ] ==== 
[police line - do not cross] ==== [police line - do not cross] ==== [police line - do not cross]

GPG

Fingerprint: 8CBAF803B970FA71202AB0851801E37B756236CB

-----BEGIN PGP PUBLIC KEY BLOCK-----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=toza
-----END PGP PUBLIC KEY BLOCK-----
	

history:

-----BEGIN PGP PUBLIC KEY BLOCK-----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=nkv0
-----END PGP PUBLIC KEY BLOCK-----
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].