D3N14LD15K / CVE-2024-11680_PoC_Exploit
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw due Privilege Misconfiguration issues.
☆13Updated 2 months ago
Alternatives and similar repositories for CVE-2024-11680_PoC_Exploit:
Users that are interested in CVE-2024-11680_PoC_Exploit are comparing it to the libraries listed below
- LNK-Dropper Builder☆21Updated 6 months ago
- Auto exploitation tool for CVE-2024-24401.☆33Updated 6 months ago
- CVE-2023-6875 PoC☆25Updated last year
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆15Updated 2 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 10 months ago
- execute PE in memory Filelessly☆32Updated last month
- ☆13Updated 2 weeks ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 7 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- ☆18Updated this week
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 6 months ago
- hiding in plain sight: part 2☆44Updated 8 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆42Updated 9 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆32Updated this week
- ☆14Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆33Updated 3 months ago
- LiteSpeed Cache Privilege Escalation PoC☆17Updated 7 months ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆20Updated 7 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 6 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆18Updated 7 months ago
- POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692☆40Updated last week
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 3 months ago
- Telegram video (mp4) extension manipulation PoC☆79Updated 3 weeks ago
- Tool to retrieve Config from Redline C2 servers☆16Updated 2 years ago
- GitHub CVE Repository Hunt☆18Updated 8 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (…☆35Updated 4 months ago
- Make an Linux Kernel rootkit visible again.☆49Updated last month
- WooCommerce Payments: Unauthorized Admin Access Exploit☆38Updated last year