0dayNinja / 2021-25157
Aruba Instant (IAP) - Remote Code Execution Exploit
☆9Updated 3 years ago
Alternatives and similar repositories for 2021-25157:
Users that are interested in 2021-25157 are comparing it to the libraries listed below
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Updated 3 years ago
- Polkit D-Bus Authentication Bypass Exploit☆9Updated 3 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆13Updated 3 years ago
- Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)☆13Updated 3 years ago
- 0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)☆50Updated 3 years ago
- ☆10Updated 2 years ago
- a collection of bash script and python to automate ZAP Security Tests☆11Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- ProtOSINT is a Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses☆9Updated 2 years ago
- A semi-automatic osint/recon framework.☆24Updated 6 months ago
- Powerful script for logical obfuscation of powershell scripts☆28Updated 5 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Updated 2 years ago
- Log4j-rce☆34Updated 2 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆20Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 2 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆19Updated 2 years ago
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure☆14Updated 2 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- tool to bypass 403/401 pages ( helpful for bug hunting)☆18Updated last year
- Fingerprinting, Port Scanning, Directory Brute Forcing, it's got it all!☆15Updated 4 years ago
- Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046☆20Updated 2 years ago