ColdHeat / CTFd-Car-Hacking-Theme
☆31Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for CTFd-Car-Hacking-Theme
- Security Capture the Flag Platform☆31Updated last year
- ☆63Updated 5 years ago
- New Found 0-days!☆36Updated 4 years ago
- Some private tools i decided to release for public.☆49Updated 7 months ago
- Webshell for Razor Syntax (C#)☆20Updated 7 years ago
- CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE☆62Updated last year
- Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container☆43Updated 6 months ago
- The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813☆67Updated 4 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆57Updated 4 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Updated 4 years ago
- ☆15Updated 3 years ago
- Jackson Rce For CVE-2019-12384☆97Updated 5 years ago
- Elevation Of Privileges Proof of Concept for Windows (win7-win10)☆30Updated 4 years ago
- ☆23Updated 5 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆29Updated 2 years ago
- PoC exploits for CVE-2020-17382☆113Updated 4 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆74Updated 6 years ago
- PoC exploit code for CVE-2021-26855☆17Updated 3 years ago
- Privilege escalation using dmidecode☆19Updated 5 years ago
- guest→system(UAC手动提权)☆74Updated 4 years ago
- Security Research☆36Updated 2 years ago
- A Proof of concept for CVE-2021-27850 affecting Apache Tapestry and leading to unauthencticated remote code execution.☆5Updated last year
- CVE-2020–14882 by Jang☆29Updated 4 years ago
- ☆33Updated 2 years ago
- ☆69Updated 3 years ago
- ☆44Updated 2 years ago
- sploit☆67Updated 4 years ago
- ☆35Updated 4 years ago
- None of the exploit code or research is my own but all available in public domain☆27Updated 5 years ago