0xjessie21 / CVE-2025-24016
CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)
☆33Updated last month
Alternatives and similar repositories for CVE-2025-24016:
Users that are interested in CVE-2025-24016 are comparing it to the libraries listed below
- ☆34Updated 6 months ago
- ☆28Updated last year
- Cobalt Strike BOFS☆15Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆26Updated last year
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆22Updated 3 months ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 5 months ago
- Docker container for running CobaltStrike 4.10☆36Updated 6 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 7 months ago
- Exploit for CVE-2024-5009☆13Updated 8 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 2 months ago
- ☆54Updated 4 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated 5 months ago
- ☆53Updated 5 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆51Updated 3 weeks ago
- Ivanti EPM SQL Injection Remote Code Execution Vulnerability☆22Updated 9 months ago
- A Moodle Scanner☆39Updated 4 months ago
- PoC for CVE-2024-42327 / ZBX-25623☆19Updated 3 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆44Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 7 months ago
- My POCs for CVEs & stuff☆48Updated 2 months ago
- List of some AD tools I frequently use☆46Updated last month
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- Tool to aid in dumping LSASS process remotely☆38Updated 8 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- command control framework☆21Updated last week
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- Dumping lsass without mimikatz with the exfiltration of the data using FAKE ntp packets☆79Updated this week
- Abusing SSRF to deliver an authenticated command injection payload☆28Updated last week
- Source code and examples for PassiveAggression☆55Updated 9 months ago