POC exploit for CVE-2015-10141
☆30Aug 11, 2025Updated 7 months ago
Alternatives and similar repositories for CVE-2015-10141
Users that are interested in CVE-2015-10141 are comparing it to the libraries listed below
Sorting:
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆25Aug 13, 2023Updated 2 years ago
- ☆15Oct 25, 2022Updated 3 years ago
- git clone https://github.com/thewhiteh4t/seeker.git cd seeker/ chmod 777 install.sh ./install.sh☆16Nov 12, 2020Updated 5 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- Automatic SQL injector web-forum based CMS☆15Jan 2, 2022Updated 4 years ago
- It's a bash (unix shell) encrypted, mutant and polymorphic virus.☆10Aug 23, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- ☆14Aug 7, 2023Updated 2 years ago
- HackToolKit☆24Nov 22, 2022Updated 3 years ago
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- ☆11Jul 16, 2022Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated 3 weeks ago
- ☆12Sep 22, 2022Updated 3 years ago
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Jul 5, 2022Updated 3 years ago
- IP Tracking☆10Jul 1, 2019Updated 6 years ago
- web network analyzer☆14Dec 3, 2023Updated 2 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Aug 5, 2022Updated 3 years ago
- JSONPath extension for BurpSuite☆30Nov 2, 2025Updated 4 months ago
- ☆12Apr 3, 2023Updated 2 years ago
- pyhtgen (formerly HTML.py) provides a few classes to easily generate HTML content such as tables and lists.☆12Apr 29, 2021Updated 4 years ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Jun 18, 2025Updated 9 months ago
- A framework to automate the OSINT process at night☆29Sep 30, 2020Updated 5 years ago
- Public exploits (re)writed while learning.☆14Aug 7, 2013Updated 12 years ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- A spaceshooter game in Bash☆27Feb 1, 2021Updated 5 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- A multifunctional Android RAT with GUI based Web Panel without port forwarding.☆11Dec 18, 2022Updated 3 years ago
- A script for automatize boolean-based blind SQL injections (MVP).☆54Aug 29, 2022Updated 3 years ago
- Android gallery spyware☆12Feb 7, 2023Updated 3 years ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Jan 13, 2022Updated 4 years ago
- A reverse TCP payload and listener both written in python3.☆30Jun 4, 2024Updated last year