Bypassing disabled exec functions in PHP (c) CRLF
☆406Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for PHP_imap_open_exploit
Users that are interested in PHP_imap_open_exploit are comparing it to the libraries listed below
Sorting:
- Some of my exploits.☆600Feb 25, 2021Updated 5 years ago
- CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability☆332Dec 30, 2018Updated 7 years ago
- 这是一个实验性的PHP扩展,加载这个扩展后,每次请求将可以执行一段自己的PHP代码。☆198Oct 22, 2018Updated 7 years ago
- PoC for CVE-2018-15133 (Laravel unserialize vulnerability)☆260Mar 10, 2024Updated last year
- PHP Runtime Vulnerability Detection☆480May 25, 2019Updated 6 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!☆297Jun 10, 2019Updated 6 years ago
- My CTF Challenges☆216Jan 4, 2026Updated last month
- exp of CVE-2018-15982☆181Jan 4, 2019Updated 7 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆732Apr 14, 2019Updated 6 years ago
- Multi-language web CGI interfaces exploits.☆399Aug 22, 2022Updated 3 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆364Jan 11, 2020Updated 6 years ago
- 一个各种方式突破Disable_functions达到命令执行的shell☆1,198Oct 17, 2023Updated 2 years ago
- FileReader Exploit☆256Mar 20, 2019Updated 6 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆682May 9, 2019Updated 6 years ago
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- CVE-2017-13089☆55Nov 15, 2017Updated 8 years ago
- JRE8u20_RCE_Gadget☆255Jul 1, 2016Updated 9 years ago
- MySQL fake server for read files of connected clients☆605Jul 23, 2017Updated 8 years ago
- 护网杯2018 easy_laravel Docker环境☆81Oct 14, 2018Updated 7 years ago
- procfs-based PHP sandbox bypass☆133Sep 19, 2018Updated 7 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Aug 17, 2017Updated 8 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Pwn stuff.☆1,805May 31, 2022Updated 3 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 8 years ago
- cve-2019-0604 SharePoint RCE exploit☆40Jun 26, 2019Updated 6 years ago
- poison and relay NTLM credentials☆176Nov 28, 2018Updated 7 years ago
- A PHP7 extension that can hook most functions/classes and parts of opcodes☆242Sep 17, 2021Updated 4 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- CVE-2018-8120 Windows LPE exploit☆500May 30, 2018Updated 7 years ago
- 🐱💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱💻☆153Feb 25, 2019Updated 7 years ago
- QAQ Just study unserialize vulnerabilities in Java :)☆196Aug 22, 2018Updated 7 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- A modified reGeorg for One-line PHP Shell.☆86Nov 18, 2018Updated 7 years ago
- Service Worker 安全探索☆74Nov 5, 2018Updated 7 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆160Nov 14, 2017Updated 8 years ago