D3N14LD15K / CVE-2024-11680_PoC_ExploitLinks
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw due Privilege Misconfiguration issues.
☆12Updated 7 months ago
Alternatives and similar repositories for CVE-2024-11680_PoC_Exploit
Users that are interested in CVE-2024-11680_PoC_Exploit are comparing it to the libraries listed below
Sorting:
- Telegram video (mp4) extension manipulation PoC☆95Updated 6 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆40Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Windows And Ways To Break It☆99Updated last year
- ZTrace 11 is Continuation of the zerotrace.☆23Updated 3 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆49Updated 3 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆80Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆185Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆139Updated 8 months ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆110Updated 4 months ago
- ZenScraper is an asynchronous scraper built with Python and Playwright designed for efficiently retrieving tweets from X.com (formerly Tw…☆14Updated 4 months ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆83Updated 4 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Updated 10 months ago
- Here are +200 different rats some with source code☆114Updated last year
- Fetching passwords from the chrome browser database☆92Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆35Updated last month
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆45Updated 7 years ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆119Updated last year
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆44Updated 2 months ago
- ☆27Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆41Updated this week
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- Helping you delete your old accounts☆87Updated 2 years ago
- Social Engineering Browser Update Attack.☆56Updated last year
- Polymorphic Command & Control☆92Updated 6 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated last year
- ☆135Updated last month