D3N14LD15K / CVE-2024-11680_PoC_Exploit
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw due Privilege Misconfiguration issues.
☆12Updated 3 weeks ago
Alternatives and similar repositories for CVE-2024-11680_PoC_Exploit:
Users that are interested in CVE-2024-11680_PoC_Exploit are comparing it to the libraries listed below
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆42Updated 8 months ago
- LNK-Dropper Builder☆19Updated 5 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 9 months ago
- Auto exploitation tool for CVE-2024-24401.☆32Updated 5 months ago
- 🔮 Python Remote administration tool via telegram☆47Updated 11 months ago
- Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode☆56Updated 4 months ago
- Sryxen aka ThunderKitty.☆30Updated 2 weeks ago
- CVE-2023-6875 PoC☆25Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆22Updated 7 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆60Updated 6 months ago
- MacOS SX (Stealer) Free 🕵️♂️💻(Passwords, cookies, Google Auth, History) Grabber 📤(uploadcare API for exfiltration)☆23Updated last month
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Updated 6 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆21Updated 2 years ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆92Updated 3 months ago
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆43Updated 6 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆30Updated 2 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆11Updated 7 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- ☆13Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- ☆28Updated last year
- the assembly shell and backdoor Trojan☆18Updated 3 years ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆13Updated 8 months ago
- ☆14Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆65Updated 6 months ago
- 「🚪」The hidden hookless backdoor☆12Updated 2 months ago
- Make an Linux Kernel rootkit visible again.☆47Updated last month