BridgerAlderson / CVE-2025-27591-PoCLinks
CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0
☆30Updated 3 months ago
Alternatives and similar repositories for CVE-2025-27591-PoC
Users that are interested in CVE-2025-27591-PoC are comparing it to the libraries listed below
Sorting:
- Malicious Macro Generator for LibreOffice/OpenOffice☆55Updated 2 years ago
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆74Updated last year
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆153Updated last year
- GitLab User Enumeration☆43Updated 10 months ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆113Updated 7 years ago
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆14Updated 2 years ago
- Bruteforce Keepass databases (KDBX 4.x format)☆122Updated last year
- Kerberoast with ACL abuse capabilities☆577Updated 10 months ago
- Joomla login bruteforce☆90Updated last year
- ☆29Updated 7 months ago
- Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection☆40Updated last year
- Hack The Box CPTS, CWES, CDSA, CWEE, CAPE, CJCA Exam and Lab Reporting / Note-Taking Tool☆286Updated last month
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆208Updated 8 months ago
- ☆123Updated 2 years ago
- Root shell PoC for CVE-2021-3156☆70Updated 4 years ago
- A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam☆44Updated 6 years ago
- A Python tool to crack solar putty session backups☆22Updated 11 months ago
- eval() Exploit POC for Searchor 2.4.2 and lower☆11Updated 2 years ago
- Updated GNU Screen 4.5.0 Exploit: This repository hosts an enhanced exploit for GNU Screen 4.5.0, optimized for Kali Linux 2024. It inclu…☆16Updated last year
- Cover's the top 10 "OWASP" security principle☆94Updated 5 years ago
- Create a list of possible usernames for bruteforcing☆78Updated last year
- Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim. Docker version of WiFiChallenge La…☆313Updated 2 weeks ago
- CVE-2023-46818 IPSConfig Python exploit☆18Updated last year
- Aliases and scripts to make common tasks easier.☆161Updated last year
- my kali desktop setup☆318Updated last year
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆135Updated last month
- SSTI Payload Generator☆92Updated 3 years ago
- Aspx reverse shell☆118Updated 5 years ago
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆19Updated 2 years ago
- CVE-2019-1388 Abuse UAC Windows Certificate Dialog☆20Updated 4 years ago