D3N14LD15K / CVE-2024-11680_PoC_ExploitLinks
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw due Privilege Misconfiguration issues.
☆12Updated last year
Alternatives and similar repositories for CVE-2024-11680_PoC_Exploit
Users that are interested in CVE-2024-11680_PoC_Exploit are comparing it to the libraries listed below
Sorting:
- Telegram video (mp4) extension manipulation PoC☆96Updated 10 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆55Updated 7 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Windows And Ways To Break It☆100Updated this week
- A tool to dump exposed .git repositories☆74Updated 7 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- ☆143Updated last month
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆93Updated 8 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆59Updated 9 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 11 months ago
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆43Updated 7 years ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆117Updated last week
- Polymorphic Command & Control☆102Updated 10 months ago
- Fetching passwords from the chrome browser database☆90Updated 2 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- Here are +200 different rats some with source code☆144Updated 2 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 3 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Updated 2 years ago
- ☆33Updated last week
- CVE-2025-49144 PoC for security researchers to test and try.☆85Updated 7 months ago
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆13Updated 2 months ago
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆92Updated 2 weeks ago
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- Google Chrome Cookies Stealer. Steals Chrome cookies☆47Updated 2 years ago
- This repository contains a few leaked files of HookBot.☆106Updated 2 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆187Updated last year
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆51Updated 7 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆38Updated 6 months ago