BridgerAlderson / CVE-2025-27591-PoCView external linksLinks
CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0
☆31Jul 16, 2025Updated 7 months ago
Alternatives and similar repositories for CVE-2025-27591-PoC
Users that are interested in CVE-2025-27591-PoC are comparing it to the libraries listed below
Sorting:
- WAV to MMV converter. You can then use the MMV file in input of MSSTV to decode Slow Scan Television (SSTV) sound signals.☆23Jan 31, 2025Updated last year
- Curso optativo de Deep Learning para UNICEN☆11Aug 25, 2021Updated 4 years ago
- Driverless two wheel drive car with an ultrasonic sound sensor to measure distance, a servo to move the sensor between three positions an…☆10Jul 27, 2019Updated 6 years ago
- Source code repository for Digital History Hacks☆23Jun 16, 2013Updated 12 years ago
- POC for netdata ndsudo vulnerability - CVE-2024-32019☆21Aug 3, 2025Updated 6 months ago
- A Geographical Information System, workbench and repository to retrieve, collect, create, enrich and preserve historical temporalized spa…☆18Dec 4, 2024Updated last year
- Hiding a message in a data table such as a CSV or parquet file☆12Jun 3, 2025Updated 8 months ago
- Proof of Concept for CVE-2025-24367☆28Dec 8, 2025Updated 2 months ago
- A very simple Flask application that demonstrates how to integrate OpenID connect into user session management.☆12Jul 5, 2018Updated 7 years ago
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- ☆12Oct 18, 2019Updated 6 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- Proyecto de visualización de estadísticas sobre nombres de nacimientos argentinos de 1922 a 2015☆11Oct 1, 2020Updated 5 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆16Jun 11, 2024Updated last year
- A toolkit for analyzing gendered language across sets of documents☆12Sep 24, 2021Updated 4 years ago
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆15Feb 25, 2021Updated 4 years ago
- Checker for QNAP pre-auth root RCE (CVE-2019-7192 ~ CVE-2019-7195)☆13Jun 10, 2021Updated 4 years ago
- Proof of Concept demonstrating Remote Code Execution through insecure deserialization in Roundcube (CVE-2025-49113).☆91Jun 6, 2025Updated 8 months ago
- This is a sample playground application used for demo for my GoogleIOExtendedNairobi (2022) session☆13Jun 7, 2022Updated 3 years ago
- A Kotlin Multiplatform weather app using MVI and fully tested in each layer.☆12Feb 5, 2024Updated 2 years ago
- Python scripts that demonstrate how to create a reverse shell. A reverse shell is a type of shell that connects back to an attacker-contr…☆18May 13, 2023Updated 2 years ago
- A reverse shell wrapper for tor servers. Get a shell over tor via socat.☆13Dec 10, 2015Updated 10 years ago
- A tool to generate wordlists based on case☆30Nov 24, 2025Updated 2 months ago
- Shellcode runner to execute malicious payload and bypass AV☆14Nov 28, 2021Updated 4 years ago
- Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit☆14May 28, 2022Updated 3 years ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 4 months ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- Smart contract of honeypot token☆15Apr 17, 2023Updated 2 years ago
- Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning☆18Mar 16, 2022Updated 3 years ago
- Documentation of main privilege escalation vulnerabilities affecting Active Directory.☆15Dec 6, 2025Updated 2 months ago
- ☆13Jun 5, 2014Updated 11 years ago
- XSS Fuzz Swiss Knife on any URI☆15Aug 3, 2019Updated 6 years ago
- ☆19Nov 28, 2024Updated last year
- 🚓 Crime dataset for the City of Buenos Aires, Argentina☆42Jul 11, 2022Updated 3 years ago
- ☆17Aug 21, 2018Updated 7 years ago
- This tool automates and facilitates an AES CBC BitFlip attack☆18Jan 17, 2024Updated 2 years ago
- Reverse Shell for Android☆24Apr 12, 2014Updated 11 years ago
- Find Cve Exploits/POC from github☆17Jul 6, 2021Updated 4 years ago