CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0
☆31Jul 16, 2025Updated 9 months ago
Alternatives and similar repositories for CVE-2025-27591-PoC
Users that are interested in CVE-2025-27591-PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for recovering credentials from sniffed PPPoE, RADIUS and L2TPv2 CHAP authentications☆18Apr 25, 2016Updated 10 years ago
- Extract NFS files from wireshark capture (pcap)☆28Aug 5, 2024Updated last year
- ☆100Jun 6, 2025Updated 11 months ago
- POC for netdata ndsudo vulnerability - CVE-2024-32019☆21Aug 3, 2025Updated 9 months ago
- Proof of Concept for CVE-2025-31161 / CVE-2025-2825☆47Apr 8, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This tool automates and facilitates an AES CBC BitFlip attack☆21Jan 17, 2024Updated 2 years ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 7 months ago
- Local Privilege Escalation to Root via Sudo chroot in Linux☆459Jul 2, 2025Updated 10 months ago
- Source code repository for Digital History Hacks☆23Jun 16, 2013Updated 12 years ago
- A tool to generate wordlists based on case☆30Nov 24, 2025Updated 5 months ago
- Details for past classes, including date/time, description, requirements, and IRC logs☆13Oct 17, 2017Updated 8 years ago
- Python script that decodes inject.bin files for the hak5 USB rubber Duck.☆26May 17, 2015Updated 10 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆22Aug 20, 2024Updated last year
- Proof of Concept demonstrating Remote Code Execution through insecure deserialization in Roundcube (CVE-2025-49113).☆89Jun 6, 2025Updated 11 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Driverless two wheel drive car with an ultrasonic sound sensor to measure distance, a servo to move the sensor between three positions an…☆10Jul 27, 2019Updated 6 years ago
- A Geographical Information System, workbench and repository to retrieve, collect, create, enrich and preserve historical temporalized spa…☆18Dec 4, 2024Updated last year
- ☆24Apr 23, 2024Updated 2 years ago
- Curso optativo de Deep Learning para UNICEN☆11Aug 25, 2021Updated 4 years ago
- CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.☆72Aug 28, 2025Updated 8 months ago
- Documentation of main privilege escalation vulnerabilities affecting Active Directory.☆17Mar 4, 2026Updated 2 months ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- Interface files for the vault contracts☆10Jul 4, 2022Updated 3 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆65Nov 16, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- Proof of Concept for CVE-2025-24367☆36Dec 8, 2025Updated 5 months ago
- POC exploit for CVE-2015-10141☆30Aug 11, 2025Updated 8 months ago
- Proyecto de visualización de estadísticas sobre nombres de nacimientos argentinos de 1922 a 2015☆11Oct 1, 2020Updated 5 years ago
- Draw a timeline of average frame colors in a video☆12Feb 20, 2020Updated 6 years ago
- ☆27Apr 28, 2022Updated 4 years ago
- A very simple Flask application that demonstrates how to integrate OpenID connect into user session management.☆12Jul 5, 2018Updated 7 years ago
- A toolkit for analyzing gendered language across sets of documents☆12Apr 13, 2026Updated 3 weeks ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆55Jan 18, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Asynchronous signal handling☆25Apr 13, 2026Updated 3 weeks ago
- Hiding a message in a data table such as a CSV or parquet file☆15Mar 2, 2026Updated 2 months ago
- CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)☆10Apr 8, 2022Updated 4 years ago
- Svendsen Tech's Invoke-PsExec for PowerShell is a function that lets you execute PowerShell and batch/cmd.exe code asynchronously on targ…☆37Jan 7, 2019Updated 7 years ago
- Official Writeups for HackTheBox Business CTF 2025: Operation Blackout☆64Jun 5, 2025Updated 11 months ago
- Apache Tomcat Manager API WAR Shell Upload☆36Jul 9, 2020Updated 5 years ago
- 🚓 Crime dataset for the City of Buenos Aires, Argentina☆42Jul 11, 2022Updated 3 years ago