A PoC of CVE-2016-2098 (rails4.2.5.1 / view render)
-
Updated
Jun 7, 2016 - Ruby
A PoC of CVE-2016-2098 (rails4.2.5.1 / view render)
CVE-2021-31166: exploitation with Powershell, Python, Ruby, NMAP and Metasploit.
A simple tool to visualize VRT (Vulnerability Rating Taxonomy) from the CLI.
A ruby tool for finding heartbleed vulnerability on a server
Vulnerabilities discovered.
Vulnerabilities discovered.
CVE-2022-47986: Python, Ruby, NMAP and Metasploit modules to exploit the vulnerability.
These Nmap, Python and Ruby scripts detects and exploits CVE-2021-42013 with RCE and local file disclosure.
BIGIP CVE-2020-5902 Exploit POC and automation scanning vulnerability
w4b-file : WebFile Analyzer is an advanced command-line utility meticulously crafted for web developers, security professionals, and researchers.
These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.
Vulnerable Grade Management System
Ruby library for interacting with Bugcrowd's VRT
CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube.
Joomla! < 4.2.8 - Unauthenticated information disclosure
Gem vulnerability checker using rubysec/ruby-advisory-db
Coding samples using the Kenna Security Platform REST API. All the code samples in this GitHub repository are offered “as is” and include no warranty of any kind. Use them at your own risk. In no event will Kenna be liable to end user or any other party for damages of any kind arising from the use of these samples.
Add a description, image, and links to the vulnerability topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability topic, visit your repo's landing page and select "manage topics."