D3N14LD15K / CVE-2024-11680_PoC_Exploit
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw due Privilege Misconfiguration issues.
☆13Updated 2 months ago
Alternatives and similar repositories for CVE-2024-11680_PoC_Exploit:
Users that are interested in CVE-2024-11680_PoC_Exploit are comparing it to the libraries listed below
- LNK-Dropper Builder☆21Updated 6 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 10 months ago
- Tool to retrieve Config from Redline C2 servers☆16Updated 2 years ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆42Updated 9 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 7 months ago
- execute PE in memory Filelessly☆32Updated last month
- Tool to parse Stealer Logs.☆16Updated last year
- ☆13Updated last week
- CVE-2023-6875 PoC☆25Updated last year
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Updated 7 months ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆14Updated 9 months ago
- UAdmin Phishlets for common sites☆14Updated 2 years ago
- ☆28Updated last year
- reverse engineering random malwares☆20Updated 2 months ago
- ☆18Updated this week
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆72Updated last month
- hiding in plain sight: part 2☆44Updated 8 months ago
- Telegram video (mp4) extension manipulation PoC☆79Updated 3 weeks ago
- Auto exploitation tool for CVE-2024-24401.☆33Updated 6 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆11Updated 9 months ago
- ☆32Updated last year
- RegStrike is a .reg payload generator☆58Updated last year
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 6 months ago
- Create and enumerate hidden desktops.☆90Updated last year
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆15Updated 2 years ago
- Ransomware written in go, encrypt - decrypt.☆20Updated 9 months ago
- ☆14Updated last year
- Make an Linux Kernel rootkit visible again.☆49Updated last month
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆33Updated 3 months ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago