CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0
☆31Jul 16, 2025Updated 7 months ago
Alternatives and similar repositories for CVE-2025-27591-PoC
Users that are interested in CVE-2025-27591-PoC are comparing it to the libraries listed below
Sorting:
- ☆96Jun 6, 2025Updated 9 months ago
- Driverless two wheel drive car with an ultrasonic sound sensor to measure distance, a servo to move the sensor between three positions an…☆10Jul 27, 2019Updated 6 years ago
- Script designed to clean cache and temporary files for 42 students with Linux/Ubuntu. Includes install.sh, uninstall.sh, process_name.sh…☆13Aug 27, 2024Updated last year
- POC for netdata ndsudo vulnerability - CVE-2024-32019☆21Aug 3, 2025Updated 7 months ago
- A Geographical Information System, workbench and repository to retrieve, collect, create, enrich and preserve historical temporalized spa…☆18Dec 4, 2024Updated last year
- Source code repository for Digital History Hacks☆23Jun 16, 2013Updated 12 years ago
- Hiding a message in a data table such as a CSV or parquet file☆12Mar 2, 2026Updated last week
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- Proof of Concept for CVE-2025-24367☆30Dec 8, 2025Updated 3 months ago
- A very simple Flask application that demonstrates how to integrate OpenID connect into user session management.☆12Jul 5, 2018Updated 7 years ago
- A toolkit for analyzing gendered language across sets of documents☆12Sep 24, 2021Updated 4 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- ☆12Oct 18, 2019Updated 6 years ago
- Checker for QNAP pre-auth root RCE (CVE-2019-7192 ~ CVE-2019-7195)☆13Jun 10, 2021Updated 4 years ago
- Proyecto de visualización de estadísticas sobre nombres de nacimientos argentinos de 1922 a 2015☆11Oct 1, 2020Updated 5 years ago
- Proof of Concept demonstrating Remote Code Execution through insecure deserialization in Roundcube (CVE-2025-49113).☆91Jun 6, 2025Updated 9 months ago
- ☆20Nov 14, 2024Updated last year
- Draw a timeline of average frame colors in a video☆12Feb 20, 2020Updated 6 years ago
- A reverse shell wrapper for tor servers. Get a shell over tor via socat.☆13Dec 10, 2015Updated 10 years ago
- Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit☆14May 28, 2022Updated 3 years ago
- Shellcode runner to execute malicious payload and bypass AV☆14Nov 28, 2021Updated 4 years ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 5 months ago
- Smart contract of honeypot token☆15Apr 17, 2023Updated 2 years ago
- ☆19Nov 28, 2024Updated last year
- ☆13Jun 5, 2014Updated 11 years ago
- A geolocation script for Omegle, Chatroulette and the like☆14Oct 26, 2017Updated 8 years ago
- XSS Fuzz Swiss Knife on any URI☆15Aug 3, 2019Updated 6 years ago
- 🚓 Crime dataset for the City of Buenos Aires, Argentina☆42Jul 11, 2022Updated 3 years ago
- Reverse Shell for Android☆24Apr 12, 2014Updated 11 years ago
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- Find Cve Exploits/POC from github☆17Jul 6, 2021Updated 4 years ago
- ☆17Aug 21, 2018Updated 7 years ago
- Revisiting a classic tool, the file pumper! 💦☆16Apr 16, 2020Updated 5 years ago
- SecDojo 23jan CTF writeup.☆14Jan 25, 2022Updated 4 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- Analyzes wpscan json output and checks for vulnerabilities☆22Sep 3, 2020Updated 5 years ago
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- CVE-2019-9978 - (PoC) RCE in Social WarFare Plugin (<=3.5.2)☆22Jun 26, 2021Updated 4 years ago