☆13Mar 23, 2024Updated 2 years ago
Alternatives and similar repositories for CVE-2023-40028
Users that are interested in CVE-2023-40028 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆30Mar 27, 2025Updated last year
- NixOS configurations☆10Nov 11, 2024Updated last year
- Grafana RCE exploit (CVE-2024-9264)☆39Oct 21, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Proof of Concept demonstrating Remote Code Execution through insecure deserialization in Roundcube (CVE-2025-49113).☆89Jun 6, 2025Updated 9 months ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆131Aug 20, 2018Updated 7 years ago
- Unauthenticated Command Injection In Progress Kemp LoadMaster☆19Aug 26, 2025Updated 7 months ago
- Integrated keylogger with telegram☆18Oct 29, 2024Updated last year
- ☆12Feb 7, 2023Updated 3 years ago
- ☆21Jul 25, 2017Updated 8 years ago
- Zabbix CVE-2024-42327 PoC☆46Jan 3, 2025Updated last year
- Pyload RCE with js2py sandbox escape☆17Oct 26, 2024Updated last year
- A post-exploitation tool to decrypt SolarPutty's sessions files☆37Dec 8, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- gemastik-xvii-final public repository☆23Oct 24, 2024Updated last year
- Lightweight, multipurpose rust library for handling RTP streams.☆12Nov 17, 2023Updated 2 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Werkzeug password cracker☆19Nov 14, 2024Updated last year
- Tool for enumerate subdomains by Brute-force, or by using different options while grabbing results.☆14Sep 7, 2023Updated 2 years ago
- A look at how different email closings correlate with response rate.☆12Jan 31, 2017Updated 9 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Vulnerabilities Exploitation On Ubuntu 22.04☆49May 16, 2023Updated 2 years ago
- YAMPA is Yet Another Mitm Proxy for use in A/D CTFs☆16Jul 11, 2024Updated last year
- This is basic network scanner that can scan the all devices which are in the connected network and give their ip address and mac address …☆19Nov 14, 2019Updated 6 years ago
- A Complete SSRF (Server Side Request Forgery) Scanner.☆41Dec 1, 2025Updated 3 months ago
- www.planeshift.it☆13Apr 14, 2014Updated 11 years ago
- XSSInspector can defeat any WAF in the world with its AI and 96 filter set. This open-source solution simplifies XSS vulnerability identi…☆12Sep 8, 2025Updated 6 months ago
- Identify and extract files from container formats using unblob.☆26Nov 19, 2024Updated last year
- Foundry-like interface for interacting with the Ethereum application in python with extra features for solving CTF Challenges using the w…☆42Jul 31, 2025Updated 7 months ago
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆23Oct 31, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 9 months ago
- Full Source Code of Jedi Knight II: Jedi Outcast ready to use (1.02, 1.03 and 1.04 versions)☆16Mar 5, 2026Updated 3 weeks ago
- Repository containing slides for conferences I have spoken at.☆16Sep 28, 2024Updated last year
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 11 months ago
- A RISC-V ISA simulator written in Rust☆12Jan 7, 2017Updated 9 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆50Feb 28, 2026Updated last month
- Store my 'Useful Commands' for HTB/OSCP and additional notes from my Obisidan. Merge into Obsidian for direct formatting. Also check out …☆16Aug 16, 2023Updated 2 years ago