D3N14LD15K / CVE-2024-11680_PoC_ExploitLinks
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw due Privilege Misconfiguration issues.
☆12Updated 7 months ago
Alternatives and similar repositories for CVE-2024-11680_PoC_Exploit
Users that are interested in CVE-2024-11680_PoC_Exploit are comparing it to the libraries listed below
Sorting:
- Telegram video (mp4) extension manipulation PoC☆94Updated 6 months ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆83Updated 4 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆185Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆109Updated 4 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆32Updated last month
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆80Updated 11 months ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆41Updated last week
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆139Updated 7 months ago
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆39Updated last year
- Find Real IPs hidden behind Cloudflare with Criminal IP(criminalip.io), security OSINT Tool.☆114Updated last year
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆49Updated 2 months ago
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Updated last year
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆45Updated 7 years ago
- POC | Steal user WhatsApp information/data☆71Updated 3 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆51Updated 4 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- WooCommerce Payments: Unauthorized Admin Access Exploit☆40Updated 2 years ago
- Windows And Ways To Break It☆99Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Updated 10 months ago
- This repository contains a few leaked files of HookBot.☆105Updated 2 years ago
- ZTrace 11 is Continuation of the zerotrace.☆21Updated 2 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated last year
- Here are +200 different rats some with source code☆112Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated 11 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆46Updated 2 months ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆23Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it