- https://github.com/mauricelambert/CVE-2022-21907
- https://github.com/xiska62314/CVE-2022-21907
- https://github.com/p0dalirius/CVE-2022-21907-http.sys
- https://github.com/antx-code/CVE-2022-21907
- https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-Cross-Site-Request-Forgery-CSRF-Leads-to-XSS
- https://github.com/plsanu/CVE-2021-46080
- https://github.com/plsanu/CVE-2021-46079
- https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Html-Injection
- https://github.com/plsanu/CVE-2021-46078
- https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Stored-Cross-Site-Scripting
- https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Code-Execution
- https://github.com/plsanu/CVE-2021-46076
- https://github.com/plsanu/CVE-2021-46075
- https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-Privilege-Escalation-Leads-to-CRUD-Operations
- https://github.com/plsanu/CVE-2021-46074
- https://github.com/plsanu/Vehicle-Service-Management-System-Settings-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/CVE-2021-46073
- https://github.com/plsanu/Vehicle-Service-Management-System-User-List-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/Vehicle-Service-Management-System-Service-List-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/CVE-2021-46072
- https://github.com/plsanu/CVE-2021-46071
- https://github.com/plsanu/Vehicle-Service-Management-System-Category-List-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/Vehicle-Service-Management-System-Service-Requests-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/CVE-2021-46070
- https://github.com/plsanu/CVE-2021-46069
- https://github.com/plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/CVE-2021-46068
- https://github.com/plsanu/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/CVE-2021-46067
- https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-Cookie-Stealing-Leads-to-Full-Account-Takeover
- https://github.com/plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS
- https://github.com/plsanu/CVE-2021-45745
- https://github.com/plsanu/CVE-2021-45744
- https://github.com/plsanu/Bludit-3.13.1-TAGS-Field-Stored-Cross-Site-Scripting-XSS
- https://github.com/shakeman8/CVE-2021-45232-RCE
- https://github.com/Osyanina/westone-CVE-2021-45232-scanner
- https://github.com/badboycxcc/CVE-2021-45232-POC
- https://github.com/wuppp/cve-2021-45232-exp
- https://github.com/yggcwhat/CVE-2021-45232
- https://github.com/Kuibagit/CVE-2021-45232-RCE
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-45232.yaml
- https://github.com/LTiDi2000/CVE-2021-45232
- https://github.com/itxfahdi/-cve-2021-45232
- https://github.com/yggcwhat/Demo
- https://github.com/Ifory885/CVE-2021-45232
- https://github.com/Ilovewomen/cve-2021-45232
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/apache-apisix-unauth-api-cve-2021-45232.yaml
- https://github.com/GYLQ/CVE-2021-45232-RCE
- https://github.com/dileepdkumar/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105-v
- https://github.com/sakuraji-labs/log4j-remediation
- https://github.com/iAmSOScArEd/log4j2_dos_exploit
- https://github.com/dileepdkumar/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105
- https://github.com/tejas-nagchandi/CVE-2021-45105
- https://github.com/cckuailong/Log4j_dos_CVE-2021-45105
- https://github.com/pravin-pp/log4j2-CVE-2021-45105
- https://github.com/dileepdkumar/https-github.com-pravin-pp-log4j2-CVE-2021-45105
- https://github.com/dileepdkumar/https-github.com-pravin-pp-log4j2-CVE-2021-45105-1
- https://github.com/CaptanMoss/Log4Shell-Sandbox-Signature
- https://github.com/lukepasek/log4jjndilookupremove
- https://github.com/BobTheShoplifter/CVE-2021-45046-Info
- https://github.com/X1pe0/Log4J-Scan-Win
- https://github.com/tejas-nagchandi/CVE-2021-45046
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/log4shell_scanner.rb
- https://github.com/pravin-pp/log4j2-CVE-2021-45046
- https://github.com/mergebase/log4j-samples
- https://github.com/lijiejie/log4j2_vul_local_scanner
- https://github.com/taise-hub/log4j-poc
- https://github.com/cckuailong/Log4j_CVE-2021-45046
- https://github.com/Yuji-Kakeya/log4j-CVE-2021-45046-poc
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-45046.yaml
- https://github.com/ludy-dev/cve-2021-45046
- https://github.com/g30rgyth3d4rk/cve-2021-45043
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-45043.yaml
- https://github.com/cckuailong/log4j_RCE_CVE-2021-44832
- https://github.com/DanielRuf/CVE-2021-44832
- https://github.com/name/log4j
- https://github.com/mr-r3b00t/CVE-2021-44228
- https://github.com/rgl/log4j-log4shell-playground
- https://github.com/y35uishere/Log4j2-CVE-2021-44228
- https://github.com/marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/log4shell_scanner.rb
- https://github.com/Apipia/log4j-pcap-activity
- https://github.com/s-retlaw/l4s_poc
- https://github.com/codiobert/log4j-scanner
- https://github.com/gcmurphy/chk_log4j
- https://github.com/shamo0/CVE-2021-44228
- https://github.com/lucab85/log4j-cve-2021-44228
- https://github.com/manuel-alvarez-alvarez/log4j-cve-2021-44228
- https://github.com/bsigouin/log4shell-vulnerable-app
- https://github.com/kanitan/log4j2-web-vulnerable
- https://github.com/kali-dass/CVE-2021-44228-log4Shell
- https://github.com/mss/log4shell-hotfix-side-effect
- https://github.com/gitlab-de/log4j-resources
- https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228
- https://github.com/Nikolas-Charalambidis/cve-2021-44228
- https://github.com/snapattack/damn-vulnerable-log4j-app
- https://github.com/inettgmbh/checkmk-log4j-scanner
- https://github.com/TheInterception/Log4J-Simulation-Tool
- https://github.com/alexandreroman/cve-2021-44228-workaround-buildpack
- https://github.com/christophetd/log4shell-vulnerable-app
- https://github.com/m0rath/detect-log4j-exploitable
- https://github.com/sudo6/l4shunter
- https://github.com/isuruwa/Log4j
- https://github.com/ahmad4fifz/CVE-2021-44228
- https://github.com/datadavev/test-44228
- https://github.com/stripe/log4j-remediation-tools
- https://github.com/grimch/log4j-CVE-2021-44228-workaround
- https://github.com/jeffli1024/log4j-rce-test
- https://github.com/mn-io/log4j-spring-vuln-poc
- https://github.com/rejupillai/log4j2-hack-springboot
- https://github.com/sassoftware/loguccino
- https://github.com/BabooPan/Log4Shell-CVE-2021-44228-Demo
- https://github.com/tslenter/RS4LOGJ-CVE-2021-44228
- https://github.com/yesspider-hacker/log4j-payload-generator
- https://github.com/NitinGavhane/CVE-2021-44228---Log4J
- https://github.com/4jfinder/4jfinder.github.io
- https://github.com/kannthu/CVE-2021-44228-Apache-Log4j-Rce
- https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit
- https://github.com/michaelsanford/Log4Shell-Honeypot
- https://github.com/JagarYousef/log4j-dork-scanner
- https://github.com/wheez-y/CVE-2021-44228-kusto
- https://github.com/unlimitedsola/log4j2-rce-poc
- https://github.com/vulhub/vulhub/tree/master/log4j/CVE-2021-44228
- https://github.com/DANSI/PowerShell-Log4J-Scanner
- https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector
- https://github.com/Ghost-chu/CVE-2021-44228-quickfix-script
- https://github.com/suniastar/scan-log4shell
- https://github.com/ben-smash/l4j-info
- https://github.com/shivakumarjayaraman/log4jvulnerability-CVE-2021-44228
- https://github.com/Aschen/log4j-patched
- https://github.com/tobiasoed/log4j-CVE-2021-44228
- https://github.com/0xDexter0us/Log4J-Scanner
- https://github.com/bhprin/log4j-vul
- https://github.com/shakeman8/log4j_getshell
- https://github.com/HynekPetrak/log4shell-finder
- https://github.com/lhotari/pulsar-docker-images-patch-CVE-2021-44228
- https://github.com/KeysAU/Get-log4j-Windows-local
- https://github.com/maximofernandezriera/CVE-2021-44228
- https://github.com/anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228
- https://github.com/mergebase/log4j-detector
- https://github.com/Rk-000/Log4j_scan_Advance
- https://github.com/back2root/log4shell-rex
- https://github.com/tuyenee/Log4shell
- https://github.com/justakazh/Log4j-CVE-2021-44228
- https://github.com/ssl/scan4log4j
- https://github.com/alexpena5635/CVE-2021-44228_scanner-main-Modified-
- https://github.com/infiniroot/nginx-mitigate-log4shell
- https://github.com/mazhar-hassan/log4j-vulnerability
- https://github.com/NorthwaveSecurity/log4jcheck
- https://github.com/ceyhuncamli/Log4j_Attacker_IPList
- https://github.com/mitiga/log4shell-cloud-scanner
- https://github.com/greymd/CVE-2021-44228
- https://github.com/municipalparkingservices/CVE-2021-44228-Scanner
- https://github.com/ArkAngeL43/f-for-java
- https://github.com/sunnyvale-it/CVE-2021-44228-PoC
- https://github.com/lucab85/ansible-role-log4shell
- https://github.com/MeterianHQ/log4j-vuln-coverage-check
- https://github.com/Szczurowsky/Log4j-0Day-Fix
- https://github.com/hozyx/log4shell
- https://github.com/Vulnmachines/log4jshell_CVE-2021-44228
- https://github.com/b-abderrahmane/CVE-2021-44228-playground
- https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent
- https://github.com/spasam/log4j2-exploit
- https://github.com/madCdan/JndiLookup
- https://github.com/strawhatasif/log4j-test
- https://github.com/snow0715/log4j-Scan-Burpsuite
- https://github.com/mr-vill4in/log4j-fuzzer
- https://github.com/a5tra/log4j-exploit-builder
- https://github.com/LemonCraftRu/JndiRemover
- https://github.com/lwsnz/log4j-win-quick
- https://github.com/ToxicEnvelope/XSYS-Log4J2Shell-Ex
- https://github.com/0-x-2-2/CVE-2021-44228
- https://github.com/roticagas/CVE-2021-44228-Demo
- https://github.com/rv4l3r3/log4v-vuln-check
- https://github.com/urholaukkarinen/docker-log4shell
- https://github.com/CERTCC/CVE-2021-44228_scanner
- https://github.com/jacobtread/L4J-Vuln-Patch
- https://github.com/0xThiebaut/CVE-2021-44228
- https://github.com/gauthamg/log4j2021_vul_test
- https://github.com/M1ngGod/CVE-2021-44228-Log4j-lookup-Rce
- https://github.com/logpresso/CVE-2021-44228-Scanner
- https://github.com/uint0/cve-2021-44228-helpers
- https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept
- https://github.com/asyzdykov/cve-2021-44228-fix-jars
- https://github.com/simonis/Log4jPatch
- https://github.com/immunityinc/Log4j-JNDIServer
- https://github.com/cybersecurityworks553/log4j-shell-csw
- https://github.com/Camphul/log4shell-spring-framework-research
- https://github.com/trevalkov/log4j2-prosecutor
- https://github.com/zzzz0317/log4j2-vulnerable-spring-app
- https://github.com/cryptoforcecommand/log4j-cve-2021-44228
- https://github.com/trickyearlobe/inspec-log4j
- https://github.com/f0ng/log4j2burpscanner
- https://github.com/otaviokr/log4j-2021-vulnerability-study
- https://github.com/benarculus/detecting-cve-2021-44228
- https://github.com/tica506/Siem-queries-for-CVE-2021-44228
- https://github.com/WatchGuard-Threat-Lab/log4shell-iocs
- https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch
- https://github.com/lov3r/cve-2021-44228-log4j-exploits
- https://github.com/Glease/Healer
- https://github.com/sinakeshmiri/log4jScan
- https://github.com/kkyehit/log4j_CVE-2021-44228
- https://github.com/lfama/log4j_checker
- https://github.com/marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.
- https://github.com/mzlogin/CVE-2021-44228-Demo
- https://github.com/cyberxml/log4j-poc
- https://github.com/cado-security/log4shell
- https://github.com/alenazi90/log4j
- https://github.com/c4dr01d/CVE-2021-44228-poc
- https://github.com/MalwareTech/Log4jTools
- https://github.com/jas502n/Log4j2-CVE-2021-44228
- https://github.com/1in9e/Apache-Log4j2-RCE
- https://github.com/razz0r/CVE-2021-44228-Mass-RCE
- https://github.com/redhuntlabs/Log4JHunt
- https://github.com/LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228
- https://github.com/Pengfei-Lu/CVE-2021-44228-Apache-Log4j-Rce
- https://github.com/palominoinc/cve-2021-44228-log4j-mitigation
- https://github.com/vorburger/Log4j_CVE-2021-44228
- https://github.com/lhotari/log4shell-mitigation-tester
- https://github.com/avwolferen/Sitecore.Solr-log4j-mitigation
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-44228.yaml
- https://github.com/Diverto/nse-log4shell
- https://github.com/Kr0ff/CVE-2021-44228
- https://github.com/Woahd/log4j-urlscanner
- https://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228
- https://github.com/OopsieWoopsie/mc-log4j-patcher
- https://github.com/BinaryDefense/log4j-honeypot-flask
- https://github.com/helsecert/CVE-2021-44228
- https://github.com/RK800-DEV/apache-log4j-poc
- https://github.com/chilit-nl/log4shell-example
- https://github.com/uint0/cve-2021-44228--spring-hibernate
- https://github.com/chandru-gunasekaran/log4j-fix-CVE-2021-44228
- https://github.com/alexandre-lavoie/python-log4rce
- https://github.com/hackinghippo/log4shell_ioc_ips
- https://github.com/cungts/VTI-IOCs-CVE-2021-44228
- https://github.com/DragonSurvivalEU/RCE
- https://github.com/jeffbryner/log4j-docker-vaccine
- https://github.com/sebiboga/jmeter-fix-cve-2021-44228-windows
- https://github.com/yanghaoi/CVE-2021-44228_Log4Shell
- https://github.com/dmitsuo/log4shell-war-fixer
- https://github.com/bchaber/CVE-2021-44228
- https://github.com/0x3SC4L4T3/Apache-Log4j-POC
- https://github.com/DXC-StrikeForce/Burp-Log4j-HammerTime
- https://github.com/corelight/cve-2021-44228
- https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228
- https://github.com/RenYuH/log4j-lookups-vulnerability
- https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs
- https://github.com/c4dr01d/CVE-2021-44228
- https://github.com/jan-muhammad-zaidi/Log4j-CVE-2021-44228
- https://github.com/Ravid-CheckMarx/CVE-2021-44228-Apache-Log4j-Rce-main
- https://github.com/leetxyz/CVE-2021-44228-Advisories
- https://github.com/nkoneko/VictimApp
- https://github.com/twseptian/Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab
- https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832
- https://github.com/ossie-git/log4shell_sentinel
- https://github.com/roxas-tan/CVE-2021-44228
- https://github.com/JustinDPerkins/C1-WS-LOG4SHELL
- https://github.com/fullhunt/log4j-scan
- https://github.com/erickrr-bd/TekiumLog4jApp
- https://github.com/dpomnean/log4j_scanner_wrapper
- https://github.com/thecyberneh/Log4j-RCE-Exploiter
- https://github.com/axisops/CVE-2021-44228
- https://github.com/0xRyan/log4j-nullroute
- https://github.com/p3dr16k/log4j-1.2.15-mod
- https://github.com/TheArqsz/CVE-2021-44228-PoC
- https://github.com/yanicksenn/CVE-2021-44228
- https://github.com/wortell/log4j
- https://github.com/suuhm/log4shell4shell
- https://github.com/Mormoroth/log4j-vulnerable-app-cve-2021-44228-terraform
- https://github.com/pedrohavay/exploit-CVE-2021-44228
- https://github.com/andrii-kovalenko-celonis/log4j-vulnerability-demo
- https://github.com/byteboycn/CVE-2021-44228-Apache-Log4j-Rce
- https://github.com/AnYi-Sec/Log4j-CVE-2021-44228-EXP
- https://github.com/cbuschka/log4j2-rce-recap
- https://github.com/avirahul007/CVE-2021-44228
- https://github.com/zhangxvx/Log4j-Rec-CVE-2021-44228
- https://github.com/dbgee/CVE-2021-44228
- https://github.com/claranet/ansible-role-log4shell
- https://github.com/MkTech-0-8YT3/CVE-2021-44228
- https://github.com/Occamsec/log4j-checker
- https://github.com/honeynet/log4shell-data
- https://github.com/mufeedvh/log4jail
- https://github.com/puzzlepeaches/Log4jUnifi
- https://github.com/alexbakker/log4shell-tools
- https://github.com/PwnC00re/Log4J_0day_RCE
- https://github.com/VNYui/CVE-2021-44228
- https://github.com/xsultan/log4jshield
- https://github.com/fox-it/log4j-finder
- https://github.com/fireflyingup/log4j-poc
- https://github.com/toramanemre/log4j-rce-detect-waf-bypass
- https://github.com/wajda/log4shell-test-exploit
- https://github.com/ChandanShastri/Log4j_Vulnerability_Demo
- https://github.com/js-on/jndiRep
- https://github.com/AlexandreHeroux/Fix-CVE-2021-44228
- https://github.com/dotPY-hax/log4py
- https://github.com/ubitech/cve-2021-44228-rce-poc
- https://github.com/Nanitor/log4fix
- https://github.com/ShaneKingBlog/org.shaneking.demo.cve.y2021.s44228
- https://github.com/dtact/divd-2021-00038--log4j-scanner
- https://github.com/rakutentech/jndi-ldap-test-server
- https://github.com/romanutti/log4shell-vulnerable-app
- https://github.com/axelcurmi/log4shell-docker-lab
- https://github.com/solitarysp/Log4j-CVE-2021-44228
- https://github.com/Crane-Mocker/log4j-poc
- https://github.com/myyxl/cve-2021-44228-minecraft-poc
- https://github.com/Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs
- https://github.com/MarceloLeite2604/log4j-vulnerability
- https://github.com/mklinkj/log4j2-test
- https://github.com/puzzlepeaches/Log4jHorizon
- https://github.com/sdogancesur/log4j_github_repository
- https://github.com/JiuBanSec/Log4j-CVE-2021-44228
- https://github.com/perryflynn/find-log4j
- https://github.com/kossatzd/log4j-CVE-2021-44228-test
- https://github.com/xx-zhang/apache-log4j2-CVE-2021-44228
- https://github.com/roswellit/CVE-2021-44228
- https://github.com/archongum/cve-2021-44228-log4j
- https://github.com/1lann/log4shelldetect
- https://github.com/racoon-rac/CVE-2021-44228
- https://github.com/rohankumardubey/CVE-2021-44228_scanner
- https://github.com/nu11secur1ty/CVE-2021-44228-VULN-APP
- https://github.com/flxhaas/Scan-CVE-2021-44228
- https://github.com/34zY/JNDI-Exploit-1.2-log4shell
- https://github.com/korteke/log4shell-demo
- https://github.com/giterlizzi/nmap-log4shell
- https://github.com/KainsRache/anti-jndi
- https://github.com/djungeldan/Log4Me
- https://github.com/momos1337/Log4j-RCE
- https://github.com/many-fac3d-g0d/apache-tomcat-log4j
- https://github.com/Y0-kan/Log4jShell-Scan
- https://github.com/gyaansastra/CVE-2021-44228
- https://github.com/scheibling/py-log4shellscanner
- https://github.com/jyotisahu98/logpresso-CVE-2021-44228-Scanner
- https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell
- https://github.com/Contrast-Security-OSS/CVE-2021-44228
- https://github.com/ReynerGonzalez/Security-Log4J-Tester
- https://github.com/r00thunter/Log4Shell-Scanner
- https://github.com/jrocia/Search-log4Jvuln-AppScanSTD
- https://github.com/Hydragyrum/evil-rmi-server
- https://github.com/Jeromeyoung/log4j2burpscanner
- https://github.com/binganao/Log4j2-RCE
- https://github.com/StandB/CVE-2021-44228-poc
- https://github.com/creamIcec/CVE-2021-44228-Apache-Log4j-Rce__review
- https://github.com/darkarnium/Log4j-CVE-Detect
- https://github.com/saharNooby/log4j-vulnerability-patcher-agent
- https://github.com/OlafHaalstra/log4jcheck
- https://github.com/kubearmor/log4j-CVE-2021-44228
- https://github.com/seamus-dev/CVE-2021-44228
- https://github.com/sandarenu/log4j2-issue-check
- https://github.com/metodidavidovic/log4j-quick-scan
- https://github.com/mschmnet/Log4Shell-demo
- https://github.com/zjx/CVE-2021-44228
- https://github.com/Gyrfalc0n/scanlist-log4j
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/log4shell_header_injection.rb
- https://github.com/Labout/log4shell-rmi-poc
- https://github.com/sud0x00/log4j-CVE-2021-44228
- https://github.com/GroupePSA/log4shell-honeypot
- https://github.com/halibobor/log4j2
- https://github.com/markuman/aws-log4j-mitigations
- https://github.com/tasooshi/horrors-log4shell
- https://github.com/bumheehan/cve-2021-44228-log4j-test
- https://github.com/lohanichaten/log4j-cve-2021-44228
- https://github.com/mute1997/CVE-2021-44228-research
- https://github.com/suhtiva/log4noshell
- https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228
- https://github.com/kal1gh0st/MyLog4Shell
- https://github.com/recanavar/vuln_spring_log4j2
- https://github.com/0xInfection/LogMePwn
- https://github.com/dbzoo/log4j_scanner
- https://github.com/puzzlepeaches/Log4jCenter
- https://github.com/Fazmin/vCenter-Server-Workaround-Script-CVE-2021-44228
- https://github.com/qingtengyun/cve-2021-44228-qingteng-patch
- https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
- https://github.com/ab0x90/CVE-2021-44228_PoC
- https://github.com/authomize/log4j-log4shell-affected
- https://github.com/andalik/log4j-filescan
- https://github.com/guardicode/CVE-2021-44228_IoCs
- https://github.com/kimobu/cve-2021-44228
- https://github.com/BJLIYANLIANG/log4j-scanner
- https://github.com/jeremyrsellars/CVE-2021-44228_scanner
- https://github.com/NatteeSetobol/Log4JPOC
- https://github.com/Grupo-Kapa-7/CVE-2021-44228-Log4j-PoC-RCE
- https://github.com/atnetws/fail2ban-log4j
- https://github.com/VerveIndustrialProtection/CVE-2021-44228-Log4j
- https://github.com/corneacristian/Log4J-CVE-2021-44228-RCE
- https://github.com/111coding/log4j_temp_CVE-2021-44228
- https://github.com/rwincey/CVE-2021-44228-Log4j-Payloads
- https://github.com/snatalius/log4j2-CVE-2021-44228-poc-local
- https://github.com/bigsizeme/Log4j-check
- https://github.com/psychose-club/Saturn
- https://github.com/CreeperHost/Log4jPatcher
- https://github.com/nix-xin/vuln4japi
- https://github.com/kozmer/log4j-shell-poc
- https://github.com/Adikso/minecraft-log4j-honeypot
- https://github.com/Joefreedy/Log4j-Windows-Scanner
- https://github.com/phoswald/sample-ldap-exploit
- https://github.com/boundaryx/cloudrasp-log4j2
- https://github.com/threatmonit/Log4j-IOCs
- https://github.com/lonecloud/CVE-2021-44228-Apache-Log4j
- https://github.com/Panyaprach/Proof-CVE-2021-44228
- https://github.com/LiveOverflow/log4shell
- https://github.com/pravin-pp/log4j2-CVE-2021-44228
- https://github.com/fireeye/CVE-2021-44228
- https://github.com/obscuritylabs/log4shell-poc-lab
- https://github.com/eliadbz/log4shell
- https://github.com/thomaspatzke/Log4Pot
- https://github.com/ycdxsb/Log4Shell-CVE-2021-44228-ENV
- https://github.com/izzyacademy/log4shell-mitigation
- https://github.com/sourcegraph/log4j-cve-code-search-resources
- https://github.com/alpacamybags118/log4j-cve-2021-44228-sample
- https://github.com/guerzon/log4shellpoc
- https://github.com/LinkMJB/log4shell_scanner
- https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes
- https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes
- https://github.com/nccgroup/log4j-jndi-be-gone
- https://github.com/r00thunter/Log4Shell
- https://github.com/ankur-katiyar/log4j-docker
- https://github.com/RrUZi/Awesome-CVE-2021-44228
- https://github.com/didoatanasov/cve-2021-44228
- https://github.com/intel-xeon/CVE-2021-44228---detection-with-PowerShell
- https://github.com/kek-Sec/log4j-scanner-CVE-2021-44228
- https://github.com/ainrm/log4j-scan
- https://github.com/jxerome/log4shell
- https://github.com/zlepper/CVE-2021-44228-Test-Server
- https://github.com/Koupah/MC-Log4j-Patcher
- https://github.com/sysadmin0815/Fix-Log4j-PowershellScript
- https://github.com/zane00/CVE-2021-44228
- https://github.com/Vulnmachines/log4j-cve-2021-44228
- https://github.com/blake-fm/vcenter-log4j
- https://github.com/pmontesd/log4j-cve-2021-44228
- https://github.com/corretto/hotpatch-for-apache-log4j2
- https://github.com/maxant/log4j2-CVE-2021-44228
- https://github.com/Heliferepo/log4j
- https://github.com/CrashOverflow/Log4Shell_PoC
- https://github.com/UltraVanilla/LogJackFix
- https://github.com/taurusxin/CVE-2021-44228
- https://github.com/julian911015/Log4j-Scanner-Exploit
- https://github.com/DiCanio/CVE-2021-44228-docker-example
- https://github.com/rubo77/log4j_checker_beta
- https://github.com/zsolt-halo/Log4J-Log4Shell-CVE-2021-44228-Spring-Boot-Test-Service
- https://github.com/KosmX/CVE-2021-44228-example
- https://github.com/takito1812/log4j-detect
- https://github.com/chilliwebs/CVE-2021-44228_Example
- https://github.com/VinniMarcon/Log4j-Updater
- https://github.com/KeysAU/Get-log4j-Windows.ps1
- https://github.com/j3kz/CVE-2021-44228-PoC
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/manageengine_servicedesk_plus_cve_2021_44077.rb
- https://github.com/horizon3ai/CVE-2021-44077
- https://github.com/gixxyboy/CVE-2021-43798
- https://github.com/k3rwin/CVE-2021-43798-Grafana-
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/grafana_plugin_traversal.rb
- https://github.com/rnsss/CVE-2021-43798-poc
- https://github.com/vulhub/vulhub/tree/master/grafana/CVE-2021-43798
- https://github.com/light-Life/CVE-2021-43798
- https://github.com/Ryze-T/CVE-2021-43798
- https://github.com/Mr-xn/CVE-2021-43798
- https://github.com/julesbozouklian/CVE-2021-43798
- https://github.com/MzzdToT/Grafana_fileread
- https://github.com/LongWayHomie/CVE-2021-43798
- https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp
- https://github.com/s1gh/CVE-2021-43798
- https://github.com/halencarjunior/grafana-CVE-2021-43798
- https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC
- https://github.com/JiuBanSec/Grafana-CVE-2021-43798
- https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798
- https://github.com/culprits/Grafana_POC-CVE-2021-43798
- https://github.com/fanygit/Grafana-CVE-2021-43798Exp
- https://github.com/Awrrays/Grafana-CVE-2021-43798
- https://github.com/taythebot/CVE-2021-43798
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-43798.yaml
- https://github.com/j-jasson/CVE-2021-43798-grafana_fileread
- https://github.com/jas502n/Grafana-CVE-2021-43798
- https://github.com/gps1949/CVE-2021-43798
- https://github.com/lfz97/CVE-2021-43798-Grafana-File-Read
- https://github.com/z3n70/CVE-2021-43798
- https://github.com/rodpwn/CVE-2021-43798-mass_scanner
- https://github.com/kenuosec/grafanaExp
- https://github.com/zer0yu/CVE-2021-43798
- https://github.com/A-D-Team/grafanaExp
- https://github.com/AK-blank/CVE-2021-43778
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-43778.yaml
- https://github.com/longofo/Apache-Dubbo-Hessian2-CVE-2021-43297
- https://github.com/bitterzzZZ/CVE-2021-43297-POC
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-43287.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/gocd-cve-2021-43287.yml
- https://github.com/maweil/bidi_char_detector
- https://github.com/hffaust/CVE-2021-42574_and_CVE-2021-42694
- https://github.com/js-on/CVE-2021-42574
- https://github.com/waseeld/CVE-2021-42574
- https://github.com/pierDipi/unicode-control-characters-action
- https://github.com/shiomiyan/CVE-2021-42574
- https://github.com/vulhub/vulhub/tree/master/goahead/CVE-2021-42342
- https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-
- https://github.com/Mr-xn/CVE-2021-42342
- https://github.com/DarkSprings/CVE-2021-42321
- https://github.com/timb-machine-mirrors/CVE-2021-42321_poc
- https://github.com/ly4k/Pachine
- https://github.com/cybersecurityworks553/noPac-detection
- https://github.com/WazeHell/sam-the-admin
- https://github.com/waterrr/noPac
- https://github.com/Ridter/noPac
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/gather/billquick_txtid_sqli.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-42258.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-42237.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/sitecore_xp_cve_2021_42237.rb
- https://github.com/PinkDev1/CVE-2021-42237
- https://github.com/asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp
- https://github.com/TheLastVvV/CVE-2021-42013
- https://github.com/ahmad4fifz/CVE-2021-42013
- https://github.com/TheLastVvV/CVE-2021-42013_Reverse-Shell
- https://github.com/rnsss/CVE-2021-42013
- https://github.com/LayarKacaSiber/CVE-2021-42013
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-42013.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/apache_normalize_path_rce.rb
- https://github.com/andrea-mattioli/apache-exploit-CVE-2021-42013
- https://github.com/vulhub/vulhub/tree/master/httpd/CVE-2021-42013
- https://github.com/Vulnmachines/cve-2021-42013
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/apache_normalize_path.rb
- https://github.com/twseptian/CVE-2021-42013-Docker-Lab
- https://github.com/xMohamed0/CVE-2021-42013-ApacheRCE
- https://github.com/walnutsecurity/cve-2021-42013
- https://github.com/robotsense1337/CVE-2021-42013
- https://github.com/mohwahyudi/cve-2021-41773
- https://github.com/Zeop-CyberSec/apache_normalize_path
- https://github.com/LudovicPatho/CVE-2021-41773
- https://github.com/vida00/Scanner-CVE-2021-41773
- https://github.com/kubota/POC-CVE-2021-41773
- https://github.com/TishcaTpx/POC-CVE-2021-41773
- https://github.com/theLSA/apache-httpd-path-traversal-checker
- https://github.com/i6c/MASS_CVE-2021-41773
- https://github.com/LetouRaphael/Poc-CVE-2021-41773
- https://github.com/apapedulimu/Apachuk
- https://github.com/iilegacyyii/PoC-CVE-2021-41773
- https://github.com/wolf1892/CVE-2021-41773
- https://github.com/ranggaggngntt/CVE-2021-41773
- https://github.com/walnutsecurity/cve-2021-41773
- https://github.com/0xAlmighty/CVE-2021-41773-PoC
- https://github.com/cloudbyteelias/CVE-2021-41773
- https://github.com/vulf/CVE-2021-41773_42013
- https://github.com/TAI-REx/cve-2021-41773-nse
- https://github.com/ZephrFish/CVE-2021-41773-PoC
- https://github.com/blasty/CVE-2021-41773
- https://github.com/5gstudent/cve-2021-41773-and-cve-2021-42013
- https://github.com/shellreaper/CVE-2021-41773
- https://github.com/Vulnmachines/cve-2021-41773
- https://github.com/superzerosec/CVE-2021-41773
- https://github.com/b1tsec/CVE-2021-41773
- https://github.com/habibiefaried/CVE-2021-41773-PoC
- https://github.com/xMohamed0/CVE-2021-41773
- https://github.com/vinhjaxt/CVE-2021-41773-exploit
- https://github.com/BlueTeamSteve/CVE-2021-41773
- https://github.com/thomsdev/CVE-2021-41773
- https://github.com/n3k00n3/CVE-2021-41773
- https://github.com/shiomiyan/CVE-2021-41773
- https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt
- https://github.com/HightechSec/scarce-apache2
- https://github.com/cgddgc/CVE-2021-41773-42013
- https://github.com/vulhub/vulhub/tree/master/httpd/CVE-2021-41773
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/apache-httpd-cve-2021-41773-path-traversal.yml
- https://github.com/BabyTeam1024/CVE-2021-41773
- https://github.com/ksanchezcld/httpd-2.4.49
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/apache-httpd-cve-2021-41773-rce.yml
- https://github.com/TheLastVvV/CVE-2021-41773
- https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013
- https://github.com/jheeree/Simple-CVE-2021-41773-checker
- https://github.com/itsecurityco/CVE-2021-41773
- https://github.com/norrig/CVE-2021-41773-exploiter
- https://github.com/jhye0n/CVE-2021-41773
- https://github.com/fnatalucci/CVE-2021-41773-RCE
- https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013
- https://github.com/corelight/CVE-2021-41773
- https://github.com/lopqto/CVE-2021-41773_Honeypot
- https://github.com/Ming119/CVE-2021-41773_Exploit
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/apache_normalize_path_rce.rb
- https://github.com/MrCl0wnLab/SimplesApachePathTraversal
- https://github.com/EagleTube/CVE-2021-41773
- https://github.com/AssassinUKG/CVE-2021-41773
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/apache_normalize_path.rb
- https://github.com/r00tVen0m/CVE-2021-41773
- https://github.com/mr-exo/CVE-2021-41773
- https://github.com/qwutony/CVE-2021-41773
- https://github.com/im-hanzou/apachrot
- https://github.com/masahiro331/CVE-2021-41773
- https://github.com/1nhann/CVE-2021-41773
- https://github.com/knqyf263/CVE-2021-41773
- https://github.com/lorddemon/CVE-2021-41773-PoC
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/apache-path-traversal-cve-2021-41773.yaml
- https://github.com/numanturle/CVE-2021-41773
- https://github.com/Hydragyrum/CVE-2021-41773-Playground
- https://github.com/scarmandef/CVE-2021-41773
- https://github.com/zeronine9/CVE-2021-41773
- https://github.com/Balgogan/CVE-2021-41773
- https://github.com/jbovet/CVE-2021-41773
- https://github.com/twseptian/CVE-2021-41773
- https://github.com/MazX0p/CVE-2021-41773
- https://github.com/Sakura-nee/CVE-2021-41773
- https://github.com/0xRar/CVE-2021-41773
- https://github.com/PentesterGuruji/CVE-2021-41773
- https://github.com/LayarKacaSiber/CVE-2021-41773
- https://github.com/IcmpOff/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit
- https://github.com/creadpag/CVE-2021-41773-POC
- https://github.com/ComdeyOverflow/CVE-2021-41773
- https://github.com/justakazh/mass_cve-2021-41773
- https://github.com/ahmad4fifz/CVE-2021-41773
- https://github.com/RyouYoo/CVE-2021-41773
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-41773.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-41653.yaml
- https://github.com/ohnonoyesyes/CVE-2021-41653
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-41649.yaml
- https://github.com/MobiusBinary/CVE-2021-41649
- https://github.com/MobiusBinary/CVE-2021-41648
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-41648.yaml
- https://github.com/Net-hunter121/CVE-2021-41381
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-41381.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/exchange-cve-2021-41349-xss.yml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-41349.yaml
- https://github.com/exploit-io/CVE-2021-41349
- https://github.com/sasukeourad/CVE-2021-41277_SSRF
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-41277.yaml
- https://github.com/tahtaciburak/CVE-2021-41277
- https://github.com/zer0yu/CVE-2021-41277
- https://github.com/z3n70/CVE-2021-41277
- https://github.com/kaizensecurity/CVE-2021-41277
- https://github.com/Henry4E36/Metabase-cve-2021-41277
- https://github.com/Seals6/CVE-2021-41277
- https://github.com/kap1ush0n/CVE-2021-41277
- https://github.com/Vulnmachines/Metabase_CVE-2021-41277
- https://github.com/TheLastVvV/CVE-2021-41277
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-41174.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/grafana-dom-xss-cve-2021-41174.yaml
- https://github.com/nisdn/CVE-2021-40978
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-40978.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-40875.yaml
- https://github.com/SakuraSamuraii/derailed
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-40870.yaml
- https://github.com/JoyGhoshs/CVE-2021-40870
- https://github.com/thomsdev/CVE-2021-40870
- https://github.com/0xAgun/CVE-2021-40870
- https://github.com/419066074/CVE-2021-40859
- https://github.com/pussycat0x/CVE-2021-40859
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-40859.yaml
- https://github.com/dorkerdevil/CVE-2021-40859
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/manageengine_adselfservice_plus_cve_2021_40539.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-40539.yaml
- https://github.com/DarkSprings/CVE-2021-40539
- https://github.com/synacktiv/CVE-2021-40539
- https://github.com/Kristal-g/CVE-2021-40449_poc
- https://github.com/hakivvi/CVE-2021-40449
- https://github.com/CppXL/cve-2021-40449-poc
- https://github.com/KaLendsi/CVE-2021-40449-Exploit
- https://github.com/ly4k/CallbackHell
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/local/cve_2021_40449.rb
- https://github.com/TiagoSergio/CVE-2021-40444
- https://github.com/mansk1es/Caboom
- https://github.com/KnoooW/CVE-2021-40444-docx-Generate
- https://github.com/bambooqj/CVE-2021-40444_EXP_JS
- https://github.com/amartinsec/MSHTMHell
- https://github.com/fengjixuchui/CVE-2021-40444-docx-Generate
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/word_mshtml_rce.rb
- https://github.com/Immersive-Labs-Sec/cve-2021-40444-analysis
- https://github.com/Udyz/CVE-2021-40444-Sample
- https://github.com/Alexcot25051999/CVE-2021-40444
- https://github.com/LazarusReborn/Docx-Exploit-2021
- https://github.com/aslitsecurity/CVE-2021-40444_builders
- https://github.com/ozergoker/CVE-2021-40444
- https://github.com/vysecurity/CVE-2021-40444
- https://github.com/zaneGittins/CVE-2021-40444-evtx
- https://github.com/k8gege/CVE-2021-40444
- https://github.com/Udyz/CVE-2021-40444-CAB
- https://github.com/H0j3n/CVE-2021-40444
- https://github.com/lisinan988/CVE-2021-40444-exp
- https://github.com/0xK4gura/CVE-2021-40444-POC
- https://github.com/rfcxv/CVE-2021-40444-POC
- https://github.com/factionsypho/TIC4301_Project
- https://github.com/Edubr2020/CVE-2021-40444--CABless
- https://github.com/vanhohen/MSHTML-CVE-2021-40444
- https://github.com/lockedbyte/CVE-2021-40444
- https://github.com/js-on/CVE-2021-40444
- https://github.com/Zeop-CyberSec/word_mshtml
- https://github.com/34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit
- https://github.com/khoaduynu/CVE-2021-40444
- https://github.com/klezVirus/CVE-2021-40444
- https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives
- https://github.com/MRacumen/CVE-2021-40444
- https://github.com/gh0stxplt/CVE-2021-40444-URL-Extractor
- https://github.com/jamesrep/cve-2021-40444
- https://github.com/nightrelax/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx
- https://github.com/DarkSprings/CVE-2021-40444
- https://github.com/ericmann/apache-cve-poc
- https://github.com/xiaojiangxl/CVE-2021-40438
- https://github.com/sixpacksecurity/CVE-2021-40438
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/apache-httpd-cve-2021-40438-ssrf.yml
- https://github.com/BabyTeam1024/CVE-2021-40438
- https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-40438-exploitation-attempt
- https://github.com/vulhub/vulhub/tree/master/httpd/CVE-2021-40438
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-40438.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/apache-mod-proxy-ssrf-cve-2021-40438.yaml
- https://github.com/Vulnmachines/HAProxy_CVE-2021-40346
- https://github.com/knqyf263/CVE-2021-40346
- https://github.com/donky16/CVE-2021-40346-POC
- https://github.com/alikarimi999/CVE-2021-40346
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/wp_bulletproofsecurity_backups.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-39327.yaml
- https://github.com/anggoroexe/Mass_CVE-2021-39316
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-39316.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-38704.yaml
- https://github.com/sudonoodle/CVE-2021-38704
- https://github.com/corelight/CVE-2021-38647
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/misc/cve_2021_38647_omigod.rb
- https://github.com/abousteif/cve-2021-38647
- https://github.com/marcosimioni/omigood
- https://github.com/AlteredSecurity/CVE-2021-38647
- https://github.com/midoxnet/CVE-2021-38647
- https://github.com/horizon3ai/CVE-2021-38647
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-38647.yaml
- https://github.com/m1thryn/CVE-2021-38647
- https://github.com/Immersive-Labs-Sec/cve-2021-38647
- https://github.com/SimenBai/CVE-2021-38647-POC-and-Demo-environment
- https://github.com/Vulnmachines/OMIGOD_cve-2021-38647
- https://github.com/fr34kyy/omigod
- https://github.com/craig-m-unsw/omigod-lab
- https://github.com/shubhayu-64/CVE-2021-38314
- https://github.com/thomsdev/CVE-2021-38314
- https://github.com/phrantom/cve-2021-38314
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-38314.yaml
- https://github.com/Peterpan0927/TFC-Chrome-v8-bug-CVE-2021-38001-poc
- https://github.com/maldiohead/TFC-Chrome-v8-bug-CVE-2021-38001-poc
- https://github.com/Wing-song/CVE-2021-37580
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-37580.yaml
- https://github.com/Liang2580/CVE-2021-37580
- https://github.com/fengwenhua/CVE-2021-37580
- https://github.com/Osyanina/westone-CVE-2021-37580-scanner
- https://github.com/rabbitsafe/CVE-2021-37580
- https://github.com/ZororoZ/CVE-2021-37580
- https://github.com/HuskyHacks/ShadowSteal
- https://github.com/JoranSlingerland/CVE-2021-36934
- https://github.com/cube0x0/CVE-2021-36934
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/post/windows/gather/credentials/windows_sam_hivenightmare.rb
- https://github.com/websecnl/CVE-2021-36934
- https://github.com/zwlsix/apache_druid_CVE-2021-36749
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-36749.yaml
- https://github.com/dorkerdevil/CVE-2021-36749
- https://github.com/BrucessKING/CVE-2021-36749
- https://github.com/Sma11New/PocList
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/apache-druid-cve-2021-36749.yml
- https://github.com/Jun-5heng/CVE-2021-36749
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-3654.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/novnc-url-redirection-cve-2021-3654.yml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/hikvision-unauthenticated-rce-cve-2021-36260.yml
- https://github.com/rabbitsafe/CVE-2021-36260
- https://github.com/tuntin9x/CheckHKRCE
- https://github.com/Aiminsun/CVE-2021-36260
- https://github.com/TaroballzChen/CVE-2021-36260-metasploit
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-36260.yaml
- https://github.com/aancw/polkit-auto-exploit
- https://github.com/iSTARLabs/CVE-2021-3560_PoC
- https://github.com/Almorabea/Polkit-exploit
- https://github.com/swapravo/polkadots
- https://github.com/AssassinUKG/Polkit-CVE-2021-3560
- https://github.com/secnigma/CVE-2021-3560-Polkit-Privilege-Esclation
- https://github.com/hakivvi/CVE-2021-3560
- https://github.com/curtishoughton/CVE-2021-3560
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/polkit_dbus_auth_bypass.rb
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/cve_2021_35464_forgerock_openam.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-35464.yaml
- https://github.com/vulhub/vulhub/tree/master/django/CVE-2021-35042
- https://github.com/r4vi/CVE-2021-35042
- https://github.com/mrlihd/CVE-2021-35042
- https://github.com/oneoy/CVE-2021-3493
- https://github.com/cerodah/overlayFS-CVE-2021-3493
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/cve_2021_3493_overlayfs.rb
- https://github.com/puckiestyle/CVE-2021-3493
- https://github.com/Abdennour-py/CVE-2021-3493
- https://github.com/Ishan3011/CVE-2021-3493
- https://github.com/AmIAHuman/OverlayFS-CVE-2021-3493
- https://github.com/briskets/CVE-2021-3493
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/cve_2021_3490_ebpf_alu32_bounds_check_lpe.rb
- https://github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/admin/dcerpc/cve_2021_1675_printnightmare.rb
- https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527
- https://github.com/Amaranese/CVE-2021-34527
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/exchange_proxyshell_rce.rb
- https://github.com/mithridates1313/ProxyShell_POC
- https://github.com/jrgdiaz/ProxyShell-CVE-2021-34473
- https://github.com/horizon3ai/proxyshell
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/exchange_proxyshell_rce.rb
- https://github.com/je6k/CVE-2021-34473-Exchange-ProxyShell
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-34473.yaml
- https://github.com/ColdFusionX/CVE-2021-34429
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-34429.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/gather/jetty_web_inf_disclosure.rb
- https://github.com/vulhub/vulhub/tree/master/jetty/CVE-2021-34429
- https://github.com/vulhub/vulhub/tree/master/neo4j/CVE-2021-34371
- https://github.com/zwjjustdoit/CVE-2021-34371.jar
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-3378.yaml
- https://github.com/erberkan/fortilogger_arbitrary_fileupload
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/fortilogger-lfi-cve-2021-3378.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/fortilogger_arbitrary_fileupload.rb
- https://github.com/giwon9977/CVE-2021-33739_PoC_Analysis
- https://github.com/freeide2017/CVE-2021-33739-POC
- https://github.com/dorkerdevil/CVE-2021-33564
- https://github.com/mlr0p/CVE-2021-33564
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/geutebruck_cmdinject_cve_2021_335xx.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33544.yaml
- https://github.com/dorkerdevil/CVE-2021-33044
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33044.yaml
- https://github.com/bp2008/DahuaLoginBypass
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/dahua-cve-2021-33044-authentication-bypass.yml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-32819.yaml
- https://github.com/Abady0x1/CVE-2021-32819
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-3223.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/node-red-dashboard-file-read-cve-2021-3223.yml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-31862.yaml
- https://github.com/RobertDra/CVE-2021-31862
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-31856.yaml
- https://github.com/ssst0n3/CVE-2021-31856
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-31602.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/pentaho-cve-2021-31602-authentication-bypass.yml
- https://github.com/donghyunlee00/CVE-2021-3156
- https://github.com/JureGrinffin/CVE-2021-3156
- https://github.com/gmldbd94/cve-2021-3156
- https://github.com/Ashish-dawani/CVE-2021-3156-Patch
- https://github.com/redhawkeye/sudo-exploit
- https://github.com/mbcrump/CVE-2021-3156
- https://github.com/ymrsmns/CVE-2021-3156
- https://github.com/stong/CVE-2021-3156
- https://github.com/nobodyatall648/CVE-2021-3156
- https://github.com/voidlsd/CVE-2021-3156
- https://github.com/mr-r3b00t/CVE-2021-3156
- https://github.com/musergi/CVE-2021-3156
- https://github.com/ph4ntonn/CVE-2021-3156
- https://github.com/elbee-cyber/CVE-2021-3156-PATCHER
- https://github.com/kal1gh0st/CVE-2021-3156
- https://github.com/dinhbaouit/CVE-2021-3156
- https://github.com/password520/CVE-2021-3156
- https://github.com/kernelzeroday/CVE-2021-3156-Baron-Samedit
- https://github.com/Nokialinux/CVE-2021-3156
- https://github.com/Rvn0xsy/CVE-2021-3156-plus
- https://github.com/Q4n/CVE-2021-3156
- https://github.com/blasty/CVE-2021-3156
- https://github.com/ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build
- https://github.com/lmol/CVE-2021-3156
- https://github.com/oneoy/CVE-2021-3156
- https://github.com/TheSerialiZator/CTF-2021
- https://github.com/LiveOverflow/pwnedit
- https://github.com/0xdevil/CVE-2021-3156
- https://github.com/cdeletre/Serpentiel-CVE-2021-3156
- https://github.com/capturingcats/CVE-2021-3156
- https://github.com/teamtopkarl/CVE-2021-3156
- https://github.com/reverse-ex/CVE-2021-3156
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/sudo_baron_samedit.rb
- https://github.com/jm33-m0/CVE-2021-3156
- https://github.com/r3k4t/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability
- https://github.com/worawit/CVE-2021-3156
- https://github.com/perlun/sudo-1.8.3p1-patched
- https://github.com/baka9moe/CVE-2021-3156-Exp
- https://github.com/TheFlash2k/CVE-2021-3156
- https://github.com/Bubleh21/CVE-2021-3156
- https://github.com/CptGibbon/CVE-2021-3156
- https://github.com/0x7183/CVE-2021-3156
- https://github.com/1N53C/CVE-2021-3156-PoC
- https://github.com/SantiagoSerrao/ScannerCVE-2021-3156
- https://github.com/apogiatzis/docker-CVE-2021-3156
- https://github.com/Y3A/CVE-2021-3156
- https://github.com/freeFV/CVE-2021-3156
- https://github.com/nexcess/sudo_cve-2021-3156
- https://github.com/binw2018/CVE-2021-3156-SCRIPT
- https://github.com/yaunsky/cve-2021-3156
- https://github.com/ambionics/laravel-exploits
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-3129.yaml
- https://github.com/nth347/CVE-2021-3129_exploit
- https://github.com/simonlee-hello/CVE-2021-3129
- https://github.com/knqyf263/CVE-2021-3129
- https://github.com/vulhub/vulhub/tree/master/laravel/CVE-2021-3129
- https://github.com/Erikten/CVE-2021-3129
- https://github.com/SNCKER/CVE-2021-3129
- https://github.com/crisprss/Laravel_CVE-2021-3129_EXP
- https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP
- https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/laravel-cve-2021-3129.yml
- https://github.com/zhzyker/CVE-2021-3129
- https://github.com/corelight/CVE-2021-31166
- https://github.com/Frankmock/CVE-2021-31166-detection-rules
- https://github.com/bgsilvait/WIn-CVE-2021-31166
- https://github.com/ConMiko/CVE-2021-31166-exploit
- https://github.com/antx-code/CVE-2021-31166
- https://github.com/zha0gongz1/CVE-2021-31166
- https://github.com/zecopro/CVE-2021-31166
- https://github.com/0vercl0k/CVE-2021-31166
- https://github.com/Udyz/CVE-2021-31166
- https://github.com/shubham0d/CVE-2021-30657
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/osx/browser/osx_gatekeeper_bypass.rb
- https://github.com/Al1ex/CVE-2021-30461
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-30461.yaml
- https://github.com/daedalus/CVE-2021-30461
- https://github.com/Vulnmachines/CVE-2021-30461
- https://github.com/Aoyuh/cve-2021-3019
- https://github.com/0xf4n9x/CVE-2021-3019
- https://github.com/Maksim-venus/CVE-2021-3019
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/lanproxy-cve-2021-3019-lfi.yml
- https://github.com/B1anda0/CVE-2021-3019
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-3019.yaml
- https://github.com/murataydemir/CVE-2021-3019
- https://github.com/givemefivw/CVE-2021-3019
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/prometheous-open-redirect-cve-2021-29622.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/prometheus-url-redirection-cve-2021-29622.yml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-29622.yaml
- https://github.com/MyBlackManba/CVE-2021-29505
- https://github.com/vulhub/vulhub/tree/master/xstream/CVE-2021-29505
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/jellyfin-cve-2021-29490.yml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-29490.yaml
- https://github.com/motikan2010/CVE-2021-29447
- https://github.com/dnr6419/CVE-2021-29447
- https://github.com/Vulnmachines/wordpress_cve-2021-29447
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-29441.yaml
- https://github.com/vulhub/vulhub/tree/master/nacos/CVE-2021-29441
- https://github.com/hh-hunter/nacos-cve-2021-29441
- https://github.com/guidepointsecurity/CVE-2021-29156
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-29156.yaml
- https://github.com/Shadow0ps/CVE-2021-28482-Exchange-POC
- https://github.com/timb-machine-mirrors/CVE-2021-28482
- https://github.com/KevinWorst/CVE-2021-28482_Exploit
- https://github.com/bluefrostsecurity/CVE-2021-28476
- https://github.com/australeo/CVE-2021-28476
- https://github.com/0vercl0k/CVE-2021-28476
- https://github.com/vulhub/vulhub/tree/master/jetty/CVE-2021-28169
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-28169.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/gather/jetty_web_inf_disclosure.rb
- https://github.com/vulhub/vulhub/tree/master/jetty/CVE-2021-28164
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-28164.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/jetty-cve-2021-28164.yml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-28073.yaml
- https://github.com/vulhub/vulhub/tree/master/ntopng/CVE-2021-28073
- https://github.com/Henry4E36/Solr-SSRF
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-27905.yaml
- https://github.com/W2Ning/Solr-SSRF
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-27850.yaml
- https://github.com/kahla-sec/CVE-2021-27850_POC
- https://github.com/dorkerdevil/CVE-2021-27850_POC
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/gather/cve_2021_27850_apache_tapestry_hmac_key.rb
- https://github.com/Vulnmachines/CVE-2021-27651
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-27651.yaml
- https://github.com/samwcyo/CVE-2021-27651-PoC
- https://github.com/thomsdev/CVE-2021-27651
- https://github.com/ArianeBlow/CVE-2021-27513-CVE-2021-27514
- https://github.com/ArianeBlow/CVE-2021-27513
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/exchange_proxylogon_rce.rb
- https://github.com/adamrpostjr/cve-2021-27065
- https://github.com/sirpedrotavares/Proxylogon-exploit
- https://github.com/cryptolakk/ProxyLogon-Mass-RCE
- https://github.com/thau0x01/poc_proxylogon
- https://github.com/0xAbdullah/CVE-2021-26855
- https://github.com/shacojx/CVE-2021-26855-exploit-Exchange
- https://github.com/SotirisKar/CVE-2021-26855
- https://github.com/RickGeex/ProxyLogon
- https://github.com/h4x0r-dz/CVE-2021-26855
- https://github.com/charlottelatest/CVE-2021-26855
- https://github.com/mil1200/ProxyLogon-CVE-2021-26855
- https://github.com/raheel0x01/CVE-2021-26855
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/exchange_proxylogon.rb
- https://github.com/conjojo/Microsoft_Exchange_Server_SSRF_CVE-2021-26855
- https://github.com/cert-lv/exchange_webshell_detection
- https://github.com/Immersive-Labs-Sec/ProxyLogon
- https://github.com/TaroballzChen/ProxyLogon-CVE-2021-26855-metasploit
- https://github.com/Nick-Yin12/106362522
- https://github.com/Yt1g3r/CVE-2021-26855_SSRF
- https://github.com/dwisiswant0/proxylogscan
- https://github.com/KotSec/CVE-2021-26855-Scanner
- https://github.com/hakivvi/proxylogon
- https://github.com/ZephrFish/Exch-CVE-2021-26855
- https://github.com/alt3kx/CVE-2021-26855_PoC
- https://github.com/yaoxiaoangry3/Flangvik
- https://github.com/praetorian-inc/proxylogon-exploit
- https://github.com/soteria-security/HAFNIUM-IOC
- https://github.com/mauricelambert/ExchangeWeaknessTest
- https://github.com/evilashz/ExchangeSSRFtoRCEExploit
- https://github.com/p0wershe11/ProxyLogon
- https://github.com/srvaccount/CVE-2021-26855-PoC
- https://github.com/hictf/CVE-2021-26855-CVE-2021-27065
- https://github.com/hackerschoice/CVE-2021-26855
- https://github.com/r0ckysec/CVE-2021-26855_Exchange
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/gather/exchange_proxylogon_collector.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-26855.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/exchange-cve-2021-26855-ssrf.yml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/exchange-ssrf-probe-cve-2021-26855.yaml
- https://github.com/pussycat0x/CVE-2021-26855-SSRF
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/exchange_proxylogon_rce.rb
- https://github.com/Flangvik/SharpProxyLogon
- https://github.com/Mr-xn/CVE-2021-26855-d
- https://github.com/Th3eCrow/CVE-2021-26855-SSRF-Exchange
- https://github.com/shacojx/Scan-Vuln-CVE-2021-26855
- https://github.com/DCScoder/Exchange_IOC_Hunter
- https://github.com/sgnls/exchange-0days-202103
- https://github.com/mekhalleh/exchange_proxylogon
- https://github.com/SCS-Labs/HAFNIUM-Microsoft-Exchange-0day
- https://github.com/hosch3n/ProxyVulns
- https://github.com/paolorabbito/Internet-Security-Project---CVE-2021-26814
- https://github.com/WickdDavid/CVE-2021-26814
- https://github.com/CYS4srl/CVE-2021-26814
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/apache_ofbiz_deserialization_soap.rb
- https://github.com/coolyin001/CVE-2021-26295--
- https://github.com/rakjong/CVE-2021-26295-Apache-OFBiz
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-26295.yaml
- https://github.com/yumusb/CVE-2021-26295
- https://github.com/S0por/CVE-2021-26295-Apache-OFBiz-EXP
- https://github.com/r0ckysec/CVE-2021-26295
- https://github.com/yuaneuro/ofbiz-poc
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/jira-limited-lfi-cve-2021-26086.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-26086.yaml
- https://github.com/ColdFusionX/CVE-2021-26086
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/confluence-cve-2021-26085-arbitrary-file-read.yml
- https://github.com/ColdFusionX/CVE-2021-26085
- https://github.com/zeroc00I/CVE-2021-26085
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-26085.yaml
- https://github.com/1ZRR4H/CVE-2021-26084
- https://github.com/thomsdev/CVE-2021-26084
- https://github.com/GlennPegden2/cve-2021-26084-confluence
- https://github.com/dorkerdevil/CVE-2021-26084
- https://github.com/toowoxx/docker-confluence-patched
- https://github.com/nizarbamida/CVE-2021-26084-patch-
- https://github.com/ludy-dev/CVE-2021-26084_PoC
- https://github.com/vulhub/vulhub/tree/master/confluence/CVE-2021-26084
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-26084.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/atlassian_confluence_webwork_ognl_injection.rb
- https://github.com/z0edff0x3d/CVE-2021-26084-Confluence-OGNL
- https://github.com/h3v0x/CVE-2021-26084_Confluence
- https://github.com/Jun-5heng/CVE-2021-26084
- https://github.com/wdjcy/CVE-2021-26084
- https://github.com/antx-code/CVE-2021-26084
- https://github.com/lleavesl/CVE-2021-26084
- https://github.com/Udyz/CVE-2021-26084
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/confluence-cve-2021-26084.yml
- https://github.com/quesodipesto/conflucheck
- https://github.com/wolf1892/confluence-rce-poc
- https://github.com/rootsmadi/CVE-2021-26084
- https://github.com/taythebot/CVE-2021-26084
- https://github.com/march0s1as/CVE-2021-26084
- https://github.com/dock0d1/CVE-2021-26084_Confluence
- https://github.com/Yang0615777/PocList
- https://github.com/lp008/CVE-2021-25646
- https://github.com/givemefivw/CVE-2021-25646
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/apache-druid-rce-cve-2021-25646.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/apache_druid_js_rce.rb
- https://github.com/yaunsky/cve-2021-25646
- https://github.com/AirEvan/CVE-2021-25646-GUI
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-25646.yaml
- https://github.com/j2ekim/CVE-2021-25646
- https://github.com/Vulnmachines/Apache-Druid-CVE-2021-25646
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/saltstack-cve-2021-25282-file-write.yml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/saltstack_salt_wheel_async_rce.rb
- https://github.com/Immersive-Labs-Sec/CVE-2021-25281
- https://github.com/SkyBulk/CVE-2021-25281
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-25281.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/saltstack_salt_wheel_async_rce.rb
- https://github.com/SecCoder-Security-Lab/jdbc-sqlxml-xxe
- https://github.com/DrunkenShells/CVE-2021-2471
- https://github.com/cckuailong/CVE-2021-2471
- https://github.com/hh-hunter/cve-2021-24499
- https://github.com/RyouYoo/CVE-2021-24499
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-24499.yaml
- https://github.com/exploitblizzard/WindowsMDM-LPE-0Day
- https://github.com/ohnonoyesyes/CVE-2021-24084
- https://github.com/yaunsky/CVE-202122986-EXP
- https://github.com/Osyanina/westone-CVE-2021-22986-scanner
- https://github.com/S1xHcL/f5_rce_poc
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/f5-cve-2021-22986.yml
- https://github.com/ZephrFish/CVE-2021-22986_Check
- https://github.com/dorkerdevil/CVE-2021-22986-Poc
- https://github.com/Tas9er/CVE-2021-22986
- https://github.com/dotslashed/CVE-2021-22986
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/f5_icontrol_rest_ssrf_rce.rb
- https://github.com/Udyz/CVE-2021-22986-SSRF2RCE
- https://github.com/safesword/F5_RCE
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-22986.yaml
- https://github.com/Al1ex/CVE-2021-22986
- https://github.com/vulhub/vulhub/tree/master/rocketchat/CVE-2021-22911
- https://github.com/CsEnox/CVE-2021-22911
- https://github.com/jayngng/CVE-2021-22911
- https://github.com/ZephrFish/CVE-2021-22893_HoneyPoC2
- https://github.com/Mad-robot/CVE-2021-22893
- https://github.com/thomsdev/CVE-2021-22893
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/revive-adserver-open-redirect-cve-2021-22873.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-22873.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/netfilter_xtables_heap_oob_write_priv_esc.rb
- https://github.com/daletoniris/CVE-2021-22555-esc-priv
- https://github.com/r0ckysec/CVE-2021-22214
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/gitlab-ssrf-cve-2021-22214.yml
- https://github.com/Vulnmachines/gitlab-cve-2021-22214
- https://github.com/kh4sh3i/GitLab-SSRF-CVE-2021-22214
- https://github.com/antx-code/CVE-2021-22214
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-22214.yaml
- https://github.com/devdanqtuan/CVE-2021-22205
- https://github.com/X1pe0/Automated-Gitlab-RCE
- https://github.com/XTeam-Wing/CVE-2021-22205
- https://github.com/pizza-power/Golang-CVE-2021-22205-POC
- https://github.com/vulhub/vulhub/tree/master/gitlab/CVE-2021-22205
- https://github.com/c0okB/CVE-2021-22205
- https://github.com/inspiringz/CVE-2021-22205
- https://github.com/Al1ex/CVE-2021-22205
- https://github.com/findneo/GitLab-preauth-RCE_CVE-2021-22205
- https://github.com/shang159/CVE-2021-22205-getshell
- https://github.com/faisalfs10x/GitLab-CVE-2021-22205-scanner
- https://github.com/runsel/GitLab-CVE-2021-22205-
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-22205.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/gitlab_exif_rce.rb
- https://github.com/ahmad4fifz/CVE-2021-22205
- https://github.com/Seals6/CVE-2021-22205
- https://github.com/AkBanner/CVE-2021-22205
- https://github.com/r0eXpeR/CVE-2021-22205
- https://github.com/gardenWhy/Gitlab-CVE-2021-22205
- https://github.com/antx-code/CVE-2021-22205
- https://github.com/hh-hunter/cve-2021-22205
- https://github.com/DIVD-NL/GitLab-cve-2021-22205-nse
- https://github.com/mr-r3bot/Gitlab-CVE-2021-22205
- https://github.com/whwlsfb/CVE-2021-22205
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/fileformat/exiftool_djvu_ant_perl_injection.rb
- https://github.com/se162xg/CVE-2021-22204
- https://github.com/Asaad27/CVE-2021-22204-RSE
- https://github.com/convisolabs/CVE-2021-22204-exiftool
- https://github.com/AssassinUKG/CVE-2021-22204
- https://github.com/ph-arm/CVE-2021-22204-Gitlab
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/gitlab_exif_rce.rb
- https://github.com/bilkoh/POC-CVE-2021-22204
- https://github.com/trganda/CVE-2021-22204
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-22145.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/elasctic-memory-leak-cve-2021-22145.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-22122.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/fortiweb-xss-cve-2021-22122.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-22053.yaml
- https://github.com/Vulnmachines/CVE-2021-22053
- https://github.com/SecCoder-Security-Lab/spring-cloud-netflix-hystrix-dashboard-cve-2021-22053
- https://github.com/X1pe0/VMWare-CVE-Check
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/vmware_vcenter_analytics_file_upload.rb
- https://github.com/1ZRR4H/CVE-2021-22005
- https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-22005-scanning-activity
- https://github.com/TiagoSergio/CVE-2021-22005
- https://github.com/Jun-5heng/CVE-2021-22005
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-22005.yaml
- https://github.com/r0ckysec/CVE-2021-22005
- https://github.com/5gstudent/CVE-2021-22005-
- https://github.com/TaroballzChen/CVE-2021-22005-metasploit
- https://github.com/rwincey/CVE-2021-22005
- https://github.com/shmilylty/cve-2021-22005-exp
- https://github.com/timb-machine-mirrors/CVE-2021-22005
- https://github.com/RedTeamExp/CVE-2021-22005_PoC
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-21985.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/vmware_vcenter_vsan_health_rce.rb
- https://github.com/onSec-fr/CVE-2021-21985-Checker
- https://github.com/r0ckysec/CVE-2021-21985
- https://github.com/xnianq/cve-2021-21985_exp
- https://github.com/mauricelambert/CVE-2021-21985
- https://github.com/alt3kx/CVE-2021-21985_PoC
- https://github.com/daedalus/CVE-2021-21985
- https://github.com/sknux/CVE-2021-21985_PoC
- https://github.com/bigbroke/CVE-2021-21985
- https://github.com/testanull/Project_CVE-2021-21985_PoC
- https://github.com/skytina/CVE-2021-21978
- https://github.com/me1ons/CVE-2021-21978
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/vmware_view_planner_4_6_uploadlog_rce.rb
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/vmware-view-planner-rce-cve-2021-21978-probe.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-21978.yaml
- https://github.com/GreyOrder/CVE-2021-21978
- https://github.com/Henry4E36/VMWare-vRealize-SSRF
- https://github.com/dorkerdevil/CVE-2021-21975
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/vmware-vrealize-cve-2021-21975-ssrf.yml
- https://github.com/Al1ex/CVE-2021-21975
- https://github.com/Vulnmachines/VMWare-CVE-2021-21975
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-21975.yaml
- https://github.com/TheTh1nk3r/exp_hub
- https://github.com/murataydemir/CVE-2021-21975
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/vrealize-ssrf-cve-2021-21975.yaml
- https://github.com/rabidwh0re/REALITY_SMASHER
- https://github.com/GuayoyoCyber/CVE-2021-21975
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/vmware_vrops_mgr_ssrf_rce.rb
- https://github.com/psc4re/NSE-scripts
- https://github.com/robwillisinfo/VMware_vCenter_CVE-2021-21972
- https://github.com/stevenp322/cve-2021-21972
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/vmware_vcenter_uploadova_rce.rb
- https://github.com/L-pin/CVE-2021-21972
- https://github.com/password520/CVE-2021-21972
- https://github.com/JMousqueton/Detect-CVE-2021-21972
- https://github.com/d3sh1n/cve-2021-21972
- https://github.com/milo2012/CVE-2021-21972
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/vmware-vcenter-unauthorized-rce-cve-2021-21972.yml
- https://github.com/GuayoyoCyber/CVE-2021-21972
- https://github.com/Osyanina/westone-CVE-2021-21972-scanner
- https://github.com/Udyz/CVE-2021-21972
- https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972
- https://github.com/TaroballzChen/CVE-2021-21972
- https://github.com/yaunsky/CVE-2021-21972
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/vcenter-rce-cve-2021-21972-probe.yaml
- https://github.com/horizon3ai/CVE-2021-21972
- https://github.com/B1anda0/CVE-2021-21972
- https://github.com/thomsdev/CVE-2021-21972
- https://github.com/ByZain/CVE-2021-21972
- https://github.com/murataydemir/CVE-2021-21972
- https://github.com/renini/CVE-2021-21972
- https://github.com/Ma1Dong/vcenter_rce
- https://github.com/pettyhacks/vSphereyeeter
- https://github.com/alt3kx/CVE-2021-21972
- https://github.com/NS-Sp4ce/CVE-2021-21972
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-21972.yaml
- https://github.com/QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC
- https://github.com/mzakocs/CVE-2021-21551-POC
- https://github.com/mathisvickie/CVE-2021-21551
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/local/cve_2021_21551_dbutil_memmove.rb
- https://github.com/arnaudluti/PS-CVE-2021-21551
- https://github.com/waldo-irc/CVE-2021-21551
- https://github.com/ch3rn0byl/CVE-2021-21551
- https://github.com/ihack4falafel/Dell-Driver-EoP-CVE-2021-21551
- https://github.com/CsEnox/CVE-2021-21425
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/gravcms_exec.rb
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/jellyfin-file-read-cve-2021-21402.yml
- https://github.com/jiaocoll/CVE-2021-21402-Jellyfin
- https://github.com/MzzdToT/CVE-2021-21402
- https://github.com/givemefivw/CVE-2021-21402
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/jellyfin-lfi-cve-2021-21402.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-21402.yaml
- https://github.com/somatrasss/CVE-2021-21402
- https://github.com/HoangKien1020/CVE-2021-21389
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-21389.yaml
- https://github.com/xMohamed0/CVE-2021-21315-POC
- https://github.com/cherrera0001/CVE-2021-21315v2
- https://github.com/Ki11i0n4ir3/CVE-2021-21315
- https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC
- https://github.com/alikarimi999/CVE-2021-21315
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-21315.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/lucee_admin_imgprocess_file_write.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-21307.yaml
- https://github.com/AlkenePan/CVE-2021-21300
- https://github.com/tao-sun2/CVE-2021-21300
- https://github.com/0ahu/CVE-2021-21300
- https://github.com/danshuizhangyu/CVE-2021-21300
- https://github.com/Faisal78123/CVE-2021-21300
- https://github.com/1uanWu/CVE-2021-21300
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/git_lfs_clone_command_exec.rb
- https://github.com/erranfenech/CVE-2021-21300
- https://github.com/Kirill89/CVE-2021-21300
- https://github.com/ETOCheney/cve-2021-21300
- https://github.com/fengzhouc/CVE-2021-21300
- https://github.com/Maskhe/CVE-2021-21300
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-21287.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/minio-ssrf-cve-2021-21287.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-21234.yaml
- https://github.com/xiaojiangxl/CVE-2021-21234
- https://github.com/PwCNO-CTO/CVE-2021-21234
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/spring-log-viewer-lfi-cve-2021-21234.yaml
- https://github.com/security-dbg/CVE-2021-21220
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/browser/chrome_cve_2021_21220_v8_insufficient_validation.rb
- https://github.com/yuaneuro/CVE-2021-2109_poc
- https://github.com/rabbitsafe/CVE-2021-2109
- https://github.com/Al1ex/CVE-2021-2109
- https://github.com/thomsdev/CVE-2021-20837
- https://github.com/Cosemz/CVE-2021-20837
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-20837.yaml
- https://github.com/ghost-nemesis/cve-2021-20837-poc
- https://github.com/ohnonoyesyes/CVE-2021-20837
- https://github.com/jbaines-r7/badblood
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-20038.yaml
- https://github.com/Pai-Po/CVE-2021-1732
- https://github.com/KaLendsi/CVE-2021-1732-Exploit
- https://github.com/k-k-k-k-k/CVE-2021-1732
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/local/cve_2021_1732_win32k.rb
- https://github.com/BeneficialCode/CVE-2021-1732
- https://github.com/linuxdy/CVE-2021-1732_exp
- https://github.com/oneoy/CVE-2021-1732-Exploit
- https://github.com/exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732
- https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare
- https://github.com/puckiestyle/CVE-2021-1675
- https://github.com/fumamatar/NimNightmare
- https://github.com/kondah/patch-cve-2021-1675
- https://github.com/cube0x0/CVE-2021-1675
- https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare
- https://github.com/Wra7h/SharpPN
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/admin/dcerpc/cve_2021_1675_printnightmare.rb
- https://github.com/yu2u/CVE-2021-1675
- https://github.com/ly4k/PrintNightmare
- https://github.com/LaresLLC/CVE-2021-1675
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/cisco_hyperflex_file_upload_rce.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-1499.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/cisco_hyperflex_hx_data_platform_cmd_exec.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-1498.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-1497.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/cisco_hyperflex_hx_data_platform_cmd_exec.rb
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/post/osx/escalate/tccbypass.rb
- https://github.com/mattshockl/CVE-2020-9934
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-9757.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/craftcms-seomatic-cve-2020-9757-rce.yml
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-9757_-_SEOmatic_3.3.0_Server-Side_Template_Injection.sh
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/seomatic-ssti-cve-2020-9757.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/apache_ofbiz_deserialization.rb
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/apache-ofbiz-desr-cve-2020-9496.yaml
- https://github.com/g33xter/CVE-2020-9496
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/apache-ofbiz-cve-2020-9496-xml-deserialization.yml
- https://github.com/cyber-niz/CVE-2020-9496
- https://github.com/dwisiswant0/CVE-2020-9496
- https://github.com/vulhub/vulhub/tree/master/ofbiz/CVE-2020-9496
- https://github.com/s4dbrd/CVE-2020-9496
- https://github.com/Vulnmachines/apache-ofbiz-CVE-2020-9496
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/apache-ofbiz-xss-cve-2020-9496.yaml
- https://github.com/yuaneuro/ofbiz-poc
- https://github.com/ambalabanov/CVE-2020-9496
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-9496.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-9484.yaml
- https://github.com/masahiro331/CVE-2020-9484
- https://github.com/qerogram/CVE-2020-9484
- https://github.com/anjai94/CVE-2020-9484-exploit
- https://github.com/PenTestical/CVE-2020-9484
- https://github.com/VICXOR/CVE-2020-9484
- https://github.com/DXY0411/CVE-2020-9484
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/apache-tomcat-rce-cve-2020-9484.yaml
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-9484_-_Apache_Tomcat_RCE_by_deserialization.sh
- https://github.com/IdealDreamLast/CVE-2020-9484
- https://github.com/AssassinUKG/CVE-2020-9484
- https://github.com/threedr3am/tomcat-cluster-session-sync-exp
- https://github.com/osamahamad/CVE-2020-9484-Mass-Scan
- https://github.com/RepublicR0K/CVE-2020-9484
- https://github.com/Xslover/CVE-2020-9484-Scanner
- https://github.com/Neko2sh1ro/CVE-2020-9483
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/skywalking-cve-2020-9483-sqli.yml
- https://github.com/shanika04/apache_skywalking
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-9483.yaml
- https://github.com/vulhub/vulhub/tree/master/django/CVE-2020-9402
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-9402.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-9376.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/dlink-cve-2020-9376-dump-credentials.yml
- https://github.com/renatoalencar/dlink-dir610-exploits
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-9344.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/jira-xss-cve-2020-9344.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/oracle-iplanet-improper-authorization-cve-2020-9315.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-9315.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/zyxel-nas-rce-cve-2020-9054.yaml
- https://github.com/darrenmartyn/CVE-2020-9054
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-9054.yaml
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-9054_-_ZyXEL_NAS_Remote_Code_Execution.sh
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-9047.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/exacqvision-web-service-rce-cve-2020-9047.yaml
- https://github.com/norrismw/CVE-2020-9047
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-9047_-_exacqVision_Web_Service_Remote_Code_Execution.sh
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/citrix-sharefile-path-traversal-cve-2020-8982.yaml
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-8982_-_Citrix_ShareFile_StorageZones_Unauthenticated_Arbitrary_File_Read.sh
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-8982.yaml
- https://github.com/dpredrag/CVE-2020-8840
- https://github.com/fairyming/CVE-2020-8840
- https://github.com/Wfzsec/FastJson1.2.62-RCE
- https://github.com/Blyth0He/CVE-2020-8840
- https://github.com/jas502n/jackson-CVE-2020-8840
- https://github.com/Veraxy00/CVE-2020-8840
- https://github.com/SplendidSky/CVE-2020-8835
- https://github.com/Prabhashaka/IT19147192-CVE-2020-8835
- https://github.com/digamma-ai/CVE-2020-8835-verification
- https://github.com/snappyJack/Rick_write_exp_CVE-2020-8835
- https://github.com/zilong3033/CVE-2020-8835
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/http/pihole_dhcp_mac_exec.rb
- https://github.com/cybervaca/CVE-2020-8816
- https://github.com/MartinSohn/CVE-2020-8816
- https://github.com/team0se7en/CVE-2020-8816
- https://github.com/AndreyRainchik/CVE-2020-8816
- https://github.com/hexcowboy/CVE-2020-8813
- https://github.com/m4udSec/Cacti-CVE-2020-8813
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-8813.yaml
- https://github.com/mhaskar/CVE-2020-8813
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-8772_-_IfiniteWP_Client_1.9.4.5_Authentication_Bypass_1.sh
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/infinitewp-improper-authentication-cve-2020-8772.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/dos/dns/bind_tsig_badtime.rb
- https://github.com/knqyf263/CVE-2020-8617
- https://github.com/rmkn/cve-2020-8617
- https://github.com/Dilan-Diaz/Point-to-Point-Protocol-Daemon-RCE-Vulnerability-CVE-2020-8597-
- https://github.com/WinMin/CVE-2020-8597
- https://github.com/marcinguy/CVE-2020-8597
- https://github.com/lakwsh/CVE-2020-8597
- https://github.com/twistlock/k8s-cve-2020-8554-mitigations
- https://gitlab.com/mike-ensor/mitigating-cve-2020-8554
- https://github.com/jrmurray000/CVE-2020-8554
- https://github.com/Dviejopomata/CVE-2020-8554
- https://github.com/alebedev87/gatekeeper-cve-2020-8554
- https://github.com/rancher/externalip-webhook
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-8515.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/draytek-cve-2020-8515.yml
- https://github.com/truerandom/nmap_draytek_rce
- https://github.com/darrenmartyn/CVE-2020-8515
- https://github.com/imjdl/CVE-2020-8515-PoC
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/icewrap-xss-cve-2020-8512.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-8512.yaml
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-8512_-_IceWarp_WebMail_XSS.sh
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/icewarp-webmail-xss-cve-2020-8512.yaml
- https://github.com/waleweewe12/CVE-2020-8417
- https://github.com/Rapidsafeguard/codesnippets_CVE-2020-8417
- https://github.com/vulncrate/wp-codesnippets-cve-2020-8417
- https://github.com/Vulnmachines/WordPress_CVE-2020-8417
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-8209.yaml
- https://github.com/B1anda0/CVE-2020-8209
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-8209_-_Citrix_XenMobile_Server_Path_Traversal.sh
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/citrix-xenmobile-lfi-cve-2020-8209.yaml
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-8209_-_XenMobile-Citrix_Endpoint_Management_Config_Password_Disclosure.sh
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-8209_-_XenMobile-Citrix_Endpoint_Management_Path_Traversal.sh
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/citrix-xenmobile-cve-2020-8209.yml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/citrix-code-injection-cve-2020-8194.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-8194.yaml
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-8194_-_Citrix_ADC_NetScaler_Gateway_Reflected_Code_Injection.sh
- https://github.com/Airboi/Citrix-ADC-RCE-CVE-2020-8193
- https://github.com/PR3R00T/CVE-2020-8193-Citrix-Scanner
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-8193_-_Citrix_Unauthenticated_LFI.sh
- https://github.com/ctlyz123/CVE-2020-8193
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/citrix-adc-lfi-cve-2020-8193.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-8193.yaml
- https://github.com/jas502n/CVE-2020-8193
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/citrix-cve-2020-8193-unauthorized.yml
- https://github.com/Zeop-CyberSec/citrix_adc_netscaler_lfi
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-8191.yaml
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-8191_-_Citrix_ADC_NetScaler_Gateway_Reflected_XSS.sh
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/citrix-reflected-xss-cve-2020-8191.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/citrix-cve-2020-8191-xss.yml
- https://github.com/progfay/CVE-2020-8165
- https://github.com/hybryx/CVE-2020-8165
- https://github.com/umiterkol/CVE-2020-8165--Auto-Shell
- https://github.com/masahiro331/CVE-2020-8165
- https://github.com/taipansec/CVE-2020-8165
- https://github.com/danielklim/cve-2020-8165-demo
- https://github.com/AssassinUKG/CVE-2020-8165
- https://github.com/h4ms1k/CVE-2020-8163
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-8163.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/rails-rce-cve-2020-8163.yaml
- https://github.com/lucasallan/CVE-2020-8163
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-8163_-_Rails_5.0.1_Remote_Code_Execution.sh
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-8115.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/revive-adserver-xss-cve-2020-8115.yaml
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-8115_-_Revive_Adserver_XSS.sh
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-8115_-_Revive_Adserver_XSS.py
- https://github.com/wetw0rk/Exploit-Development
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/nimsoft/nimcontroller_bof.rb
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/satellian-cve-2020-7980-rce.yml
- https://github.com/Xh4H/Satellian-CVE-2020-7980
- https://github.com/wcxxxxx/CVE-2020-7961
- https://github.com/shacojx/GLiferay-CVE-2020-7961-golang
- https://github.com/thelostworldFree/CVE-2020-7961-payloads
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-7961.yaml
- https://github.com/shacojx/LifeRCEJsonWSTool-POC-CVE-2020-7961-Gui
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/liferay_java_unmarshalling.rb
- https://github.com/vulhub/vulhub/tree/master/liferay-portal/CVE-2020-7961
- https://github.com/shacojx/POC-CVE-2020-7961-Token-iterate
- https://github.com/ShutdownRepo/CVE-2020-7961
- https://github.com/mzer0one/CVE-2020-7961-POC
- https://github.com/Udyz/CVE-2020-7961-Mass
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/citrix-path-traversal-cve-2020-7473.yaml
- https://github.com/DimitriNL/CTX-CVE-2020-7473
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-7473_Citrix_ShareFile_StorageZones.disabled
- https://github.com/victomteng1997/cve-2020-7471-Time_Blind_SQLi-
- https://github.com/huzaifakhan771/CVE-2020-7471-Django
- https://github.com/Tempuss/CTF_CVE-2020-7471
- https://github.com/mrlihd/CVE-2020-7471
- https://github.com/Saferman/CVE-2020-7471
- https://github.com/secoba/DjVul_StringAgg
- https://github.com/SNCKER/CVE-2020-7471
- https://github.com/nikhil1232/CVE-2020-7384
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/fileformat/metasploit_msfvenom_apk_template_cmd_injection.rb
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/local/gog_galaxyclientservice_privesc.rb
- https://github.com/szerszen199/PS-CVE-2020-7352
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-7247.yaml
- https://github.com/f4T1H21/CVE-2020-7247
- https://github.com/vulhub/vulhub/tree/master/opensmtpd/CVE-2020-7247
- https://github.com/superzerosec/cve-2020-7247
- https://github.com/QTranspose/CVE-2020-7247-exploit
- https://github.com/Sergio928/OpenSMTPD-6.6.1---Remote-Code-Execution---Linux-remote-Exploit
- https://github.com/SimonSchoeni/CVE-2020-7247-POC
- https://github.com/jopraveen/CVE-2020-7247
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/smtp/opensmtpd_mail_from_rce.rb
- https://github.com/r0lh/CVE-2020-7247
- https://github.com/FiroSolutions/cve-2020-7247-exploit
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-7246_-_qdPM_Authenticated_Remote_Code_Execution.sh
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/qdpm-authenticated-rce-cve-2020-7246.yaml
- https://github.com/lnxcrew/CVE-2020-7246
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-7209.yaml
- https://github.com/awsassets/CVE-2020-7209
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-7209_-_LinuxKI_Toolset_6.01_Remote_Command_Execution.sh
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/linuxki_rce.rb
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/linuxki-rce-cve-2020-7209.yaml
- https://github.com/alexfrancow/CVE-2020-7200
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/hpe_sim_76_amf_deserialization.rb
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-7048_-_WP_Database_Reset_3.15_Unauthenticated_Database_Reset.sh
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/wordpress-db-reset-cve-2020-7048.yaml
- https://github.com/ElmouradiAmine/CVE-2020-7048
- https://github.com/ChoKyuWon/CVE-2020-6418
- https://github.com/Goyotan/CVE-2020-6418-PoC
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/browser/chrome_jscreate_sideeffect.rb
- https://github.com/InitRoot/CVE-2020-6308-PoC
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-6308.yaml
- https://github.com/TheMMMdev/CVE-2020-6308
- https://github.com/freeFV/CVE-2020-6308-mass-exploiter
- https://github.com/chipik/SAP_RECON
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-6287_-_Create_an_Administrative_User_in_SAP_NetWeaver_AS_JAVA.sh
- https://github.com/ynsmroztas/CVE-2020-6287-Sap-Add-User
- https://github.com/Onapsis/CVE-2020-6287_RECON-scanner
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-6287.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/admin/sap/cve_2020_6287_ws_add_user.rb
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/sap-netweaver-improper-authentication-cve-2020-6287.yaml
- https://github.com/murataydemir/CVE-2020-6287
- https://github.com/duc-nt/CVE-2020-6287-exploit
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-6207.yaml
- https://github.com/chipik/SAP_EEM_CVE-2020-6207
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/sap/cve_2020_6207_solman_rs.rb
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/admin/sap/cve_2020_6207_solman_rce.rb
- https://github.com/d4rk007/F5-Big-IP-CVE-2020-5902-mass-exploiter
- https://github.com/JSec1337/RCE-CVE-2020-5902
- https://github.com/wdlid/CVE-2020-5902-fix
- https://github.com/theLSA/f5-bigip-rce-cve-2020-5902
- https://github.com/rwincey/CVE-2020-5902-NSE
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/f5-bigip-rce-cve-2020-5902.yaml
- https://github.com/yassineaboukir/CVE-2020-5902
- https://github.com/superzerosec/cve-2020-5902
- https://github.com/corelight/CVE-2020-5902-F5BigIP
- https://github.com/sv3nbeast/CVE-2020-5902_RCE
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-5902_-_F5_BIG-IP_XSS.sh
- https://github.com/ludy-dev/BIG-IP-F5-TMUI-RCE-Vulnerability
- https://github.com/freeFV/CVE-2020-5902-fofa-scan
- https://github.com/Shu1L/CVE-2020-5902-fofa-scan
- https://github.com/Any3ite/CVE-2020-5902-F5BIG
- https://github.com/Al1ex/CVE-2020-5902
- https://github.com/Zinkuth/F5-BIG-IP-CVE-2020-5902
- https://github.com/Un4gi/CVE-2020-5902
- https://github.com/0xAbdullah/CVE-2020-5902
- https://github.com/dwisiswant0/CVE-2020-5902
- https://github.com/ar0dd/CVE-2020-5902
- https://github.com/pwnhacker0x18/CVE-2020-5902-Mass
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/f5_bigip_tmui_rce.rb
- https://github.com/halencarjunior/f5scan
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-5902.yaml
- https://github.com/qlkwej/poc-CVE-2020-5902
- https://github.com/inho28/CVE-2020-5902-F5-BIGIP
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-5902_-_F5_BIG-IP_Remote_Code_Execution_1.sh
- https://github.com/jas502n/CVE-2020-5902
- https://github.com/yasserjanah/CVE-2020-5902
- https://github.com/GoodiesHQ/F5-Patch
- https://github.com/dunderhay/CVE-2020-5902
- https://github.com/k3nundrum/CVE-2020-5902
- https://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner
- https://github.com/haisenberg/CVE-2020-5902
- https://github.com/itsjeffersonli/CVE-2020-5902
- https://github.com/TheCyberViking/CVE-2020-5902-Vuln-Checker
- https://github.com/f5devcentral/cve-2020-5902-ioc-bigip-checker
- https://github.com/momika233/cve-2020-5902
- https://github.com/dnerzker/CVE-2020-5902
- https://github.com/jiansiting/CVE-2020-5902
- https://github.com/murataydemir/CVE-2020-5902
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/f5-tmui-cve-2020-5902-rce.yml
- https://github.com/rockmelodies/CVE-2020-5902-rce-gui
- https://github.com/r0ttenbeef/cve-2020-5902
- https://github.com/GovindPalakkal/EvilRip
- https://github.com/PushpenderIndia/CVE-2020-5902-Scanner
- https://github.com/aqhmal/CVE-2020-5902-Scanner
- https://github.com/ajdumanhug/CVE-2020-5902
- https://github.com/nsflabs/CVE-2020-5902
- https://github.com/zhzyker/CVE-2020-5902
- https://github.com/lijiaxing1997/CVE-2020-5902-POC-EXP
- https://github.com/jinnywc/CVE-2020-5902
- https://github.com/cristiano-corrado/f5_scanner
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-5902_-_F5_BIG-IP_Remote_Code_Execution_2.sh
- https://github.com/renanhsilva/checkvulnCVE20205902
- https://github.com/deepsecurity-pe/GoF5-CVE-2020-5902
- https://github.com/MrCl0wnLab/checker-CVE-2020-5902
- https://github.com/cybersecurityworks553/scanner-CVE-2020-5902
- https://github.com/qiong-qi/CVE-2020-5902-POC
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/unraid_auth_bypass_exec.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-5847.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/nagios_xi_scanner.rb
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/nagios_xi_snmptrap_authenticated_rce.rb
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/nagios_xi_scanner.rb
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/nagios_xi_mibs_authenticated_rce.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-5777.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/magento-magmi-improper-authentication-cve-2020-5777.yaml
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-5412_-_Full-read_SSRF_in_Spring_Cloud_Netflix.sh
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/spring-cloud-ssrf-cve-2020-5412.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-5412.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/spring-cloud-path-traversal-cve-2020-5410.yaml
- https://github.com/mugisyahid/ki-vuln-cve-2020-5410
- https://github.com/osamahamad/CVE-2020-5410-POC
- https://github.com/dead5nd/config-demo
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-5410.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/springcloud_directory_traversal.rb
- https://github.com/thelostworldFree/SpringCloud-Config-CVE-2020-5410
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/spring-cloud-cve-2020-5410.yml
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-5405_-_Spring_Directory_Traversal_1.sh
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-5405_-_Spring_Directory_Traversal_3.sh
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-5405_-_Spring_Directory_Traversal_2.sh
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/spring-cloud-path-traversal-cve-2020-5405.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/spring-cloud-cve-2020-5405.yml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-5405.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/spring-mvc-rfd-cve-2020-5398.yaml
- https://github.com/motikan2010/CVE-2020-5398
- https://www.exploit-db.com/raw/47846
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-5307.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-5284.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/zeit-nodejs-cve-2020-5284-directory-traversal.yml
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-5284_-_Next_JS_Limited_Path_Traversal.sh
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/nextjs-path-traversal-cve-2020-5284.yaml
- https://github.com/brompwnie/cve-2020-5260
- https://github.com/sv3nbeast/CVE-2020-5260
- https://github.com/Asgavar/CVE-2020-5260
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-4463.yaml
- https://github.com/Ibonok/CVE-2020-4463
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/ibm-maximo-xxe-cve-2020-4463.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/ibm_drm_rce.rb
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/admin/http/ibm_drm_download.rb
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/ssh/ibm_drm_a3user.rb
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/ibm_drm_rce.rb
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/admin/http/ibm_drm_download.rb
- https://github.com/dgh05t/VMware_ESXI_OpenSLP_PoCs
- https://github.com/HynekPetrak/CVE-2019-5544_CVE-2020-3992
- https://github.com/Fa1c0n35/vmware_vcenter_cve_2020_3952
- https://github.com/commandermoon/CVE-2020-3952
- https://github.com/guardicore/vmware_vcenter_cve_2020_3952
- https://github.com/gelim/CVE-2020-3952
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/gather/ldap_hashdump.rb
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/vcenter-lfi-cve-2020-3952.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/admin/ldap/vmware_vcenter_vmdir_auth_bypass.rb
- https://github.com/avboy1337/CVE-2020-3952
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/gather/vmware_vcenter_vmdir_ldap.rb
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/jira-user-enum-cve-2020-36289.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-36289.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/cockpit_cms_rce.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-35847.yaml
- https://github.com/w33vils/CVE-2020-35847_CVE-2020-35848
- https://github.com/0z09e/CVE-2020-35846
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-35846.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/cockpit_cms_rce.rb
- https://github.com/JohnHammond/CVE-2020-35846
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/cockpit-cms-rce-cve-2020-35846.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-3580.yaml
- https://github.com/Hudi233/CVE-2020-3580
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/cisco-asa-post-xss-cve-2020-3580.yaml
- https://github.com/adarshvs/CVE-2020-3580
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/gateone-cve-2020-35736.yml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-35736.yaml
- https://github.com/Al1ex/CVE-2020-35729
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-35729.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/klog_server_authenticate_user_unauth_command_injection.rb
- https://github.com/Al1ex/CVE-2020-35713
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-35713.yaml
- https://github.com/puckiestyle/CVE-2020-35606
- https://github.com/anasbousselham/webminscan
- https://www.exploit-db.com/raw/49318
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/nagios_xi_plugins_filename_authenticated_rce.rb
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/nagios_xi_scanner.rb
- https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489
- https://github.com/dn9uy3n/Check-WP-CVE-2020-35489
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-35489.yaml
- https://github.com/GuillaumePetit84/CVE-2020-35488
- https://github.com/githubfoam/nxlog-ubuntu-githubactions
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-35476.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/opentsdb-cve-2020-35476-rce.yml
- https://github.com/vulhub/vulhub/tree/master/opentsdb/CVE-2020-35476
- https://github.com/paran0id34/CVE-2020-3452
- https://github.com/foulenzer/CVE-2020-3452
- https://github.com/sujaygr8/CVE-2020-3452
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-3452_-_Cisco_ASA-FTD_Arbitrary_File_Reading_Vulnerability.sh
- https://github.com/murataydemir/CVE-2020-3452
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/cisco-asa-path-traversal-cve-2020-3452.yaml
- https://github.com/Aviksaikat/CVE-2020-3452
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-3452.yaml
- https://github.com/Veids/CVE-2020-3452_auto
- https://github.com/grim3/CVE-2020-3452
- https://github.com/ludy-dev/Cisco-ASA-LFI
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/cisco-cve-2020-3452-readfile.yml
- https://github.com/3ndG4me/CVE-2020-3452-Exploit
- https://github.com/PR3R00T/CVE-2020-3452-Cisco-Scanner
- https://github.com/cygenta/CVE-2020-3452
- https://github.com/darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter
- https://github.com/0x5ECF4ULT/CVE-2020-3452
- https://github.com/mr-r3b00t/CVE-2020-3452
- https://github.com/faisalfs10x/Cisco-CVE-2020-3452-shodan-scanner
- https://github.com/fuzzlove/Cisco-ASA-FTD-Web-Services-Traversal
- https://github.com/Loneyers/cve-2020-3452
- https://github.com/XDev05/CVE-2020-3452-PoC
- https://github.com/Gh0st0ne/http-vuln-cve2020-3452.nse
- https://github.com/goichot/CVE-2020-3433
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/local/anyconnect_lpe.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-3187.yaml
- https://github.com/CrackerCat/CVE-2020-3187
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-3187_-_Citrix_Unauthenticated_File_Deletion.sh
- https://github.com/1337in/CVE-2020-3187
- https://github.com/sujaygr8/CVE-2020-3187
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/cisco-asa-path-traversal-cve-2020-3187.yaml
- https://github.com/raspberry-pie/CVE-2020-3153
- https://github.com/shubham0d/CVE-2020-3153
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/local/anyconnect_lpe.rb
- https://github.com/goichot/CVE-2020-3153
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-29453.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/jira-limited-lfi-cve-2020-29453.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-29164.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/PacsOne-Server-xss-cve-2020-29164.yaml
- https://github.com/nopdata/cve-2020-28948
- https://github.com/0x240x23elu/CVE-2020-28948-and-CVE-2020-28949
- https://github.com/Al1ex/CVE-2020-2883
- https://github.com/MagicZer0/Weblogic_CVE-2020-2883_POC
- https://github.com/Y4er/WebLogic-Shiro-shell
- https://github.com/Y4er/CVE-2020-2883
- https://github.com/FancyDoesSecurity/CVE-2020-2883
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/misc/weblogic_deserialize_badattr_extcomp.rb
- https://github.com/ZZZWD/CVE-2020-2883
- https://github.com/Qynklee/POC_CVE-2020-2883
- https://github.com/intrigueio/cve-2020-28653-poc
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/opmanager_sumpdu_deserialization.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-28351.yaml
- https://github.com/dievus/CVE-2020-28351
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/suitecrm_log_file_rce.rb
- https://github.com/mcorybillington/SuiteCRM-RCE
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-28188.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/terramaster-rce-cve-2020-28188.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/terramaster-tos-rce-cve-2020-28188.yml
- https://github.com/madstap/bouncy-castle-generative-test-poc
- https://github.com/kurenaif/CVE-2020-28052_PoC
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/sonarqube-cve-2020-27986-unauth.yml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-27986.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/icewrap-xss-cve-2020-27982.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-27982.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/git_lfs_rce.rb
- https://github.com/FrostsaberX/CVE-2020-27955
- https://github.com/yhsung/cve-2020-27955-poc
- https://github.com/williamgoulois/git-lfs-RCE-exploit-CVE-2020-27955-revshell
- https://github.com/Marsable/CVE-2020-27955-LFS
- https://github.com/SSRemex/CVE-2020-27955-TEST
- https://github.com/NeoDarwin/CVE-2020-27955
- https://github.com/nob0dy-3389/CVE-2020-27955
- https://github.com/HK69s/CVE-2020-27955
- https://github.com/DeeLMind/CVE-2020-27955-LFS
- https://github.com/r00t4dm/CVE-2020-27955
- https://github.com/shubham0d/CVE-2020-27955
- https://github.com/ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go
- https://github.com/qzyqzynb/CVE-2020-27955
- https://github.com/TheTh1nk3r/cve-2020-27955
- https://github.com/whitetea2424/CVE-2020-27955-LFS-main
- https://github.com/ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955
- https://github.com/IanSmith123/CVE-2020-27955
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-26948.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/emby_ssrf_scanner.rb
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/emby_version_ssrf.rb
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/gitlab-graphql-info-leak-cve-2020-26413.yml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-26413.yaml
- https://github.com/Al1ex/CVE-2020-26217
- https://github.com/novysodope/CVE-2020-26217-XStream-RCE-POC
- https://github.com/Maskhe/cve-2020-2555
- https://github.com/Y4er/CVE-2020-2555
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-2555_-_WebLogic_Server_Deserialization_RCE.sh
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/misc/weblogic_deserialize_badattrval.rb
- https://github.com/wsfengfan/CVE-2020-2555
- https://github.com/Hu3sky/CVE-2020-2555
- https://github.com/Qynklee/POC_CVE-2020-2555
- https://github.com/Uvemode/CVE-2020-2555
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-25540.yaml
- https://github.com/Schira4396/CVE-2020-25540
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/thinkadmin-path-traversal-cve-2020-25540.yaml
- https://github.com/jas502n/CVE-2020-2551
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-2551.yaml
- https://github.com/zzwlpx/weblogicPoc
- https://github.com/Dido1960/Weblogic-CVE-2020-2551-To-Internet
- https://github.com/hktalent/CVE-2020-2551
- https://github.com/0xlane/CVE-2020-2551
- https://github.com/0xn0ne/weblogicScanner
- https://github.com/Y4er/CVE-2020-2551
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-2551_-_Unauthenticated_Oracle_WebLogic_Server_Remote_Code_Execution.sh
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/oracle-weblogic-rce-cve-2020-2551.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/sophos_utm_webadmin_sid_cmd_injection.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-25223.yaml
- https://github.com/twentybel0w/CVE-2020-25223
- https://github.com/darrenmartyn/sophucked
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/wp_file_manager_rce.rb
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-25213.yaml
- https://github.com/forse01/CVE-2020-25213-Wordpress
- https://github.com/mansoorr123/wp-file-manager-CVE-2020-25213
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/wordpress-file-upload-cve-2020-25213.yaml
- https://github.com/kakamband/WPKiller
- https://github.com/0000000O0Oo/Wordpress-CVE-2020-25213
- https://github.com/piruprohacking/CVE-2020-25213
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-25213_-_WP_File_Manager_File_Upload.sh
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-25078.yaml
- https://github.com/S0por/CVE-2020-25078
- https://github.com/MzzdToT/CVE-2020-25078
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/dlink-cve-2020-25078-account-disclosure.yml
- https://github.com/chinaYozz/CVE-2020-25078
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-24949.yaml
- https://github.com/r90tpass/CVE-2020-24949
- https://github.com/trump88/CVE-2020-24765
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/imind-server-info-leak-cve-2020-24765.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/dlink-dsl-2888a-rce.yml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-24579.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-24571.yaml
- https://raw.githubusercontent.com/chaitin/xray/master/pocs/nexusdb-cve-2020-24571-path-traversal.yml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-24550.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/episerver-open-redirect-cve-2020-24550.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/wordpress-backup-leak-cve-2020-24312.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-24312.yaml
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-24223.yaml
- https://raw.githubusercontent.com/jaeles-project/jaeles-signatures/master/cves/mara-cms-reflective-xss-cve-2020-24223.yaml
- https://raw.githubusercontent.com/1N3/Sn1per/master/templates/active/CVE-2020-24223_-_Mara_CMS_7.5_Reflective_XSS.sh
- https://github.com/h3v0x/CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE
- https://github.com/meicookies/CVE-2020-24186
- https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2020/CVE-2020-24186.yaml
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/wp_wpdiscuz_unauthenticated_file_upload.rb