Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
☆52Jul 14, 2025Updated 9 months ago
Alternatives and similar repositories for CVE-2025-47812-poc
Users that are interested in CVE-2025-47812-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Zero Setup is a Bash script that automates the installation process of all the personal tools and software you need on your system. It s…☆13Nov 19, 2023Updated 2 years ago
- BreachHunter is a powerful OSINT (Open Source Intelligence) tool designed for cybersecurity professionals, investigators, and ethical hac…☆27Sep 26, 2025Updated 7 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆28May 14, 2025Updated 11 months ago
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)☆32Jul 11, 2025Updated 9 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)☆50Oct 2, 2024Updated last year
- A WordPress plugin that provides reverse shell functionality with a graphical user interface (GUI) for configuration. This plugin allows …☆64Feb 24, 2026Updated 2 months ago
- ☆49Nov 19, 2025Updated 5 months ago
- A C implementation for a stealth injection method☆38Jan 30, 2026Updated 3 months ago
- "闪紫"(英文名shiningZ)社工字典生成工具,支持ABC自定义排列组合、ABC列字典AI扩展、AI提示词联想字典、自定义AI提示、字典去重、结果导出等☆33Oct 27, 2025Updated 6 months ago
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆51Jan 16, 2025Updated last year
- Keycloak admin API allows low privilege users to use administrative functions☆29Oct 12, 2024Updated last year
- A C Implementation for using a new method to invoke undetectable indirect syscalls☆20Dec 2, 2025Updated 5 months ago
- This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.☆41Sep 11, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆27May 21, 2024Updated last year
- An LLM Based Research Paper Generator☆12Mar 16, 2025Updated last year
- ☆15Mar 21, 2025Updated last year
- Grafana RCE exploit (CVE-2024-9264)☆38Oct 21, 2024Updated last year
- Just "Harmless" Google dorks for bug hunters☆23Nov 25, 2024Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Updated this week
- CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection☆23Apr 8, 2024Updated 2 years ago
- Library and tools to access the Common Log File System (CLFS)☆26Dec 4, 2025Updated 5 months ago
- Windows Internals 7th book but free (PDF)☆23Dec 3, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This script dynamically decodes and executes a Base64 encoded Mimikatz script, allowing users to bypass security measures and run specifi…☆21Jul 9, 2024Updated last year
- Mihomo任意文件写,可通过写SSH密钥、cron任务等实现RCE☆13May 21, 2025Updated 11 months ago
- ☆17Feb 3, 2023Updated 3 years ago
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆17May 27, 2023Updated 2 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- PoC for CVE-2024-42327 / ZBX-25623☆18Dec 3, 2024Updated last year
- 对原版JNDIExploit进行修改增加线程和JMX注入内存马☆17Apr 23, 2025Updated last year
- 钉钉数据库解密工具,支持 WEB UI 展示 | DingTalk Database Decryption Tool with Web UI Visualization.☆60Jan 20, 2026Updated 3 months ago
- https://www.nu11secur1ty.com☆24Apr 27, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 读取dump向日葵&Todesk进程的文件获得连接信息☆17Sep 27, 2024Updated last year
- 个人漏洞收集项目,包括复现环境、POC、EXP等☆31Mar 14, 2025Updated last year
- From C to binary shellcode converter.☆56Nov 11, 2025Updated 5 months ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Feb 8, 2025Updated last year
- POC of CVE-2023-35086 only DoS☆44Jul 25, 2023Updated 2 years ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆22Jun 28, 2024Updated last year
- 添加识别与检测异步js逻辑☆24Aug 26, 2025Updated 8 months ago