There are no reviews yet. Be the first to send feedback to the community and the maintainers!
voip-caller
Simple 5060 port exploit that calls to a receiver device with pre-setuped phrasecamera_dorks
This is Camera Dorks for your default browser by 1vere$k.cve-2022-26134
Just simple PoC for the Atlassian Jira exploit. Provides code execution for unauthorised user on a server.CVE-2022-29885
Apache Tomcat DoS (CVE-2022-29885) Exploitcve-2023-20198
1vere$k POC on the CVE-2023-20198cve-2022-30525
Initial POC for the CVE-2022-30525cve-mikrotik-cisco-zoo
Zoo of exploits used in my practisenvd-cve-parser
NVD parser for CVEs, CPEs and CWEs with all known used exploitscve-2018-19052
PoC for a security: potential path traversal with specific configs, if `mod_dirlisting` were enabled, which is not the default, this would result in listing the contents of the directory above the alias..cve-2022-1388-1veresk
Simple shell script for the exploitcve-2022-31749
Simple PoC-checker for CVE-2022-31749 by 1vere$kCVE-2022-40684
cve-2022-21907
Multithread Golang applicationcve-2022-1388-iveresk-command-shell
Improved POC for CVE-2022-1388 that affects multiple F5 products.cve-2022-21907-http.sys
An unauthenticated attacker can send an HTTP request with an "Accept-Encoding" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (http.sys) to process packets, resulting in a kernel crash.CVE-2023-22515
iveresk-CVE-2023-22515rtsp_autogrinder3
rtsp_authgrinder3.py - Brute forcing tool for RTSP Protocol. Copyright (C) 2022 re-written for Python3, bugs and logic issues fixed by 1vere$k. All creds go to Luke Stephens and Tek Security Group, LLCLove Open Source and this site? Check out how you can help us