A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.
- http://packetstormsecurity.com/files/156930/SharePoint-Workflows-XOML-Injection.html
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Amar224/best_google_dorks_tool
- https://github.com/Ashadowkhan/BigBountyRecontoolsexe
- https://github.com/H4cksploit/bug-bounty-recon
- https://github.com/ManishJena007/google-dork
- https://github.com/NAVIN-HACSOCIETY/AdrishyaReconDorker
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/PreemptiveCyberSec/BigBountyRecon
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Th3l0newolf/AdvanceRecon-Dorks
- https://github.com/Vignesh2712/BigBountyRecon
- https://github.com/Viralmaniar/BigBountyRecon
- https://github.com/aftabkhan25/Tool2
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/kartikhunt3r/AdrishyaReconDorker
- https://github.com/lnick2023/nicenice
- https://github.com/michael101096/cs2020_msels
- https://github.com/preemptive-cyber-security/BigBountyRecon
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/scrumfox/BugBountyReconNet
- https://github.com/xbl3/awesome-cve-poc_qazbnm456