D3N14LD15K / CVE-2024-11680_PoC_Exploit
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw due Privilege Misconfiguration issues.
☆13Updated 2 months ago
Alternatives and similar repositories for CVE-2024-11680_PoC_Exploit:
Users that are interested in CVE-2024-11680_PoC_Exploit are comparing it to the libraries listed below
- Auto exploitation tool for CVE-2024-24401.☆33Updated 6 months ago
- LNK-Dropper Builder☆21Updated 6 months ago
- CVE-2023-6875 PoC☆25Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 10 months ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Updated 2 years ago
- ☆13Updated 2 weeks ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 6 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆42Updated 9 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆18Updated 7 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- ☆18Updated this week
- ☆24Updated last year
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆22Updated 3 months ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆23Updated 8 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 7 months ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆20Updated 7 months ago
- Web Penetration Testing Course Materials☆32Updated 10 months ago
- execute PE in memory Filelessly☆32Updated last month
- bypassing the twitter safety link firewall :)☆11Updated last year
- hiding in plain sight: part 2☆44Updated 8 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆49Updated last month
- Unauthorized Access to Metadata and User Data like CTF☆26Updated 4 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- ☆14Updated last year
- Basic script to generate reverse shell payloads, generally most used in ctf.☆28Updated last year
- PoC for Broken Access Control vulnerability in WordPress Elementor Pro Plugin. This vulnerability has been fixed in version 3.11.7.☆11Updated last year
- Telegram video (mp4) extension manipulation PoC☆79Updated 3 weeks ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆52Updated last week