pussycat0x

Results 14 comments of pussycat0x

Hi @Jackey0, CVE-2020-1938 working fine with windows host and it's verified. Reason: sometimes remote machines/service returning invalid response. screenshot from actual python exploit. ![image](https://github.com/projectdiscovery/nuclei-templates/assets/65701233/dcd1e9ff-ffe4-4f40-b026-8cd34e558bc9) Tested on `Nuclei Engine Version: v2.9.4`...

Hello @Jackey0 , I am closing this issue now. If you are still experiencing the same problem, please feel free to reopen it. 🚀

Hi @lucasljm2001 Thanks for sharing this template 💯 . We are facing some issues in a vulnerable environment. So can you share the debug data?

On Hold Reason: need to validate with vulnerable environment.

Hi @impalanichamy Thank you for sharing this template with the community and for your contribution to this project 🚀 .i have updated the condition and severity, can you check and...

Hi @mastercho Thank you for sharing this template with the community and for your contribution to this project.

Hi @Puben Hi, I rewrote this template for Samba detection. Please review it and let me know your thoughts. ``` id: samba-detect info: name: Samba - Detection author: pussycat0x severity:...

Hi @lamrecognitions FYI : If the input is provided as 127.0.0.1:8034 or any other host, Nuclei will initially execute `HTTPX.` It will then determine whether to use HTTPS:// or HTTP://...

Hello @lamrecognitions , I trust you've found the solution you were seeking. I'll be marking this issue as resolved for now. Should you have any further questions or concerns, please...