D3N14LD15K / CVE-2024-11680_PoC_ExploitLinks
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw due Privilege Misconfiguration issues.
☆12Updated 10 months ago
Alternatives and similar repositories for CVE-2024-11680_PoC_Exploit
Users that are interested in CVE-2024-11680_PoC_Exploit are comparing it to the libraries listed below
Sorting:
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆87Updated 7 months ago
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆44Updated 7 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆188Updated last year
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆24Updated last year
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆54Updated 6 months ago
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Updated last year
- Telegram video (mp4) extension manipulation PoC☆97Updated 9 months ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆115Updated 7 months ago
- Social Engineering Browser Update Attack.☆58Updated 2 years ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆34Updated 3 weeks ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆47Updated last year
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆32Updated 8 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- Windows And Ways To Break It☆101Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- CryptChat: Beyond Secure Messaging 🛡️☆72Updated 2 years ago
- PassBreaker☆65Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- POC | Steal user WhatsApp information/data☆74Updated 7 months ago
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆57Updated 10 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- Fetching passwords from the chrome browser database☆93Updated 2 years ago
- Dark-Shell is a Tool for Generating ReverShell File☆116Updated last month
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- Brute forcing login pages with SQL Injection queries with cURL☆17Updated 2 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago