D3N14LD15K / CVE-2024-11680_PoC_Exploit
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw due Privilege Misconfiguration issues.
☆13Updated 2 months ago
Alternatives and similar repositories for CVE-2024-11680_PoC_Exploit:
Users that are interested in CVE-2024-11680_PoC_Exploit are comparing it to the libraries listed below
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 11 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- LNK-Dropper Builder☆22Updated 3 weeks ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆11Updated 3 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆31Updated 2 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆20Updated last year
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Updated 8 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 8 months ago
- Auto exploitation tool for CVE-2024-24401.☆34Updated 7 months ago
- ☆13Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆41Updated this week
- CVE-2023-6875 PoC☆25Updated last year
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 7 months ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- Tool to retrieve Config from Redline C2 servers☆16Updated 2 years ago
- Scripts permettant de contourner la protection antivirale de Windows Defender via la technique de Direct Syscalls avec une injection de s…☆27Updated 2 years ago
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆44Updated 6 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆24Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆63Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆34Updated 4 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆75Updated last month
- CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection☆13Updated last week
- ☆14Updated last week
- Google Chrome Cookies Stealer. Steals Chrome cookies☆43Updated last year
- aiohttp LFI (CVE-2024-23334)☆26Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 7 months ago