☆13Mar 23, 2024Updated last year
Alternatives and similar repositories for CVE-2023-40028
Users that are interested in CVE-2023-40028 are comparing it to the libraries listed below
Sorting:
- LimeSurvey Authenticated RCE☆23Jul 16, 2023Updated 2 years ago
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆29Mar 27, 2025Updated 11 months ago
- Proof of Concept demonstrating Remote Code Execution through insecure deserialization in Roundcube (CVE-2025-49113).☆91Jun 6, 2025Updated 9 months ago
- Grafana RCE exploit (CVE-2024-9264)☆39Oct 21, 2024Updated last year
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆130Aug 20, 2018Updated 7 years ago
- ☆21Jul 25, 2017Updated 8 years ago
- ☆13Jan 17, 2025Updated last year
- Tool for enumerate subdomains by Brute-force, or by using different options while grabbing results.☆14Sep 7, 2023Updated 2 years ago
- Two simple plugins for wireshark that can help in Network Forensics CTFs☆12Apr 21, 2025Updated 10 months ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- A simple JIT library in Rust☆19Dec 7, 2014Updated 11 years ago
- A look at how different email closings correlate with response rate.☆12Jan 31, 2017Updated 9 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 9 months ago
- No-nonsense Python server library☆11Dec 7, 2024Updated last year
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Proof of Concept for CVE-2025-24367☆30Dec 8, 2025Updated 3 months ago
- Analysis of Istanbul Shopping Malls☆13Apr 23, 2024Updated last year
- YAMPA is Yet Another Mitm Proxy for use in A/D CTFs☆16Jul 11, 2024Updated last year
- XSSInspector can defeat any WAF in the world with its AI and 96 filter set. This open-source solution simplifies XSS vulnerability identi…☆12Sep 8, 2025Updated 6 months ago
- Transparent dark theme for uLauncher, using Adwaita blue as a contrasting color☆11May 18, 2024Updated last year
- Software defined radio transmitter for EAchine E012 mini quadcopter☆16Jul 22, 2017Updated 8 years ago
- Vulnerabilities Exploitation On Ubuntu 22.04☆49May 16, 2023Updated 2 years ago
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆15Feb 25, 2021Updated 5 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Quadrature sampling down converter software defined radio☆16Jun 11, 2021Updated 4 years ago
- ☆13May 30, 2024Updated last year
- Pyload RCE with js2py sandbox escape☆17Oct 26, 2024Updated last year
- Random perl scripts from 2007 that may be usefull☆15Nov 21, 2015Updated 10 years ago
- Store my 'Useful Commands' for HTB/OSCP and additional notes from my Obisidan. Merge into Obsidian for direct formatting. Also check out …☆16Aug 16, 2023Updated 2 years ago
- Full Source Code of Jedi Knight II: Jedi Outcast ready to use (1.02, 1.03 and 1.04 versions)☆15Updated this week
- an asynchronous API wrapper for Warframe.☆14Nov 11, 2023Updated 2 years ago
- Integrated keylogger with telegram☆18Oct 29, 2024Updated last year
- Repository containing slides for conferences I have spoken at.☆16Sep 28, 2024Updated last year
- dji drone id sync demod example☆17Nov 14, 2022Updated 3 years ago
- Implementation of PHP Console for WordPress 📟☆14Jun 9, 2025Updated 9 months ago
- poc☆17May 18, 2024Updated last year
- Templates for developing your own listeners and agents for AdaptixC2.☆46Feb 28, 2026Updated last week