D3N14LD15K / CVE-2024-11680_PoC_ExploitLinks
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw due Privilege Misconfiguration issues.
☆13Updated 4 months ago
Alternatives and similar repositories for CVE-2024-11680_PoC_Exploit
Users that are interested in CVE-2024-11680_PoC_Exploit are comparing it to the libraries listed below
Sorting:
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆11Updated 5 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆46Updated 2 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated last year
- CVE-2023-6875 PoC☆25Updated last year
- the assembly shell and backdoor Trojan☆18Updated 3 years ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆26Updated 11 months ago
- ☆14Updated 3 months ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆39Updated last year
- Tool to retrieve Config from Redline C2 servers☆16Updated 2 years ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆20Updated 10 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- ☆14Updated last year
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆62Updated 4 months ago
- UAdmin Phishlets for common sites☆14Updated 2 weeks ago
- Perform With Massive Wordpress Enumeration☆11Updated last year
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆41Updated last month
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- Telegram video (mp4) extension manipulation PoC☆89Updated 3 months ago
- execute PE in memory Filelessly☆43Updated 4 months ago
- WordPress Sites Vulnerability Checker for CVE-2020-35489 - "Educational Use Only"☆10Updated last year
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆15Updated 3 years ago
- Auto exploitation tool for CVE-2024-24401.☆36Updated 9 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- Make an Linux Kernel rootkit visible again.☆52Updated 4 months ago
- web based c2 🏴☠️☆13Updated 10 months ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆13Updated 10 months ago
- ☆29Updated last year
- POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692☆40Updated 3 months ago