Bo0oM / PHP_imap_open_exploitLinks
Bypassing disabled exec functions in PHP (c) CRLF
☆402Updated 4 years ago
Alternatives and similar repositories for PHP_imap_open_exploit
Users that are interested in PHP_imap_open_exploit are comparing it to the libraries listed below
Sorting:
- Some of my exploits.☆587Updated 4 years ago
- PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container☆403Updated 2 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year
- An exploit for Apache Struts CVE-2018-11776☆302Updated 6 years ago
- Nano is a family of PHP web shells which are code golfed for stealth.☆444Updated 5 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆391Updated 7 years ago
- Exploits for various CVEs☆210Updated 5 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆524Updated last year
- 💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002☆352Updated 6 years ago
- GTRS - Google Translator Reverse Shell☆616Updated 9 months ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆161Updated 7 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆363Updated 5 years ago
- A tiny and cute URL fuzzer☆397Updated 2 years ago
- PoC for CVE-2018-15133 (Laravel unserialize vulnerability)☆252Updated last year
- ☆207Updated 4 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆323Updated 7 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆412Updated 5 years ago
- An exploit for Apache Struts CVE-2017-9805☆250Updated 7 years ago
- St2-057 Poc Example☆312Updated 6 years ago
- Freedom Fighting Mode: open source hacking harness☆339Updated last year
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆426Updated 5 years ago
- Running CVE-2017-8759 exploit sample.☆256Updated 5 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆356Updated 4 months ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆257Updated last year
- Your interpreter isn’t safe anymore — The PHP module backdoor☆221Updated 6 years ago
- ☆265Updated 6 years ago
- ☆73Updated 6 years ago
- Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]☆369Updated 5 years ago
- An XSS reverse shell framework☆309Updated 6 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromgif()☆121Updated 10 years ago