D3N14LD15K / CVE-2024-11680_PoC_ExploitLinks
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw due Privilege Misconfiguration issues.
☆12Updated 9 months ago
Alternatives and similar repositories for CVE-2024-11680_PoC_Exploit
Users that are interested in CVE-2024-11680_PoC_Exploit are comparing it to the libraries listed below
Sorting:
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆86Updated 6 months ago
- Telegram video (mp4) extension manipulation PoC☆97Updated 8 months ago
- Windows And Ways To Break It☆101Updated 2 years ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆53Updated 5 months ago
- Polymorphic Command & Control☆100Updated 8 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆139Updated 10 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆187Updated last year
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- CVE-2025-49144 PoC for security researchers to test and try.☆84Updated 4 months ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆112Updated this week
- Fetching passwords from the chrome browser database☆93Updated 2 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆103Updated last year
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆33Updated this week
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆57Updated 6 months ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆128Updated 6 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆42Updated 2 years ago
- Here are +200 different rats some with source code☆126Updated 2 years ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆54Updated 9 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- execute PE in memory Filelessly☆48Updated 9 months ago
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆60Updated last month
- WordPress Sites Vulnerability Checker for CVE-2020-35489 - "Educational Use Only"☆12Updated last year
- WordPress File Upload RCE Exploit☆16Updated 2 months ago
- Social Engineering Browser Update Attack.☆58Updated 2 years ago
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆44Updated 7 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- POC | Steal user WhatsApp information/data☆73Updated 6 months ago