At the date of 03/23/2020, a vulnerability report with its PoC was released in hackerone by William Bowling
With this vulnerability we can read any world readable files (with permission 444 or more) on the gitlab server like /etc/passwd and so on... (worldreadable files only)\
Notice that you should be authenticated user
I've tested it on gitlab version 21.9.0 (ubuntu 18.04) but it's OS independent
Many thanks to exploit-db team for publishing this exploit
Many thanks to William Bowling
vulnerability disclosed by : William Bowling of Biteable, a.k.a vakzz
G3nius-Tools Sploit is a powerfully user-friendly to Server, Client, Network, Signal exploitation tool. We've online support and updates.
This includes CVE-2022-22963, a Spring SpEL / Expression Resource Access Vulnerability, as well as CVE-2022-22965, the spring-webmvc/spring-webflux RCE termed "SpringShell".
Zabbix - SAML SSO Authentication Bypass
Some DLL Injection techniques in C++ implemented for both x86 and x64 windows OS processes
log4jshell vulnerability scanner for bug bounty
AndroRAT | Remote Administrator Tool for Android OS Hacking
Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)