FDlucifer / mybb_1832_LFI_RCEView external linksLinks
MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...
☆14Oct 17, 2023Updated 2 years ago
Alternatives and similar repositories for mybb_1832_LFI_RCE
Users that are interested in mybb_1832_LFI_RCE are comparing it to the libraries listed below
Sorting:
- Implementation of Max Kellermann's exploit for CVE-2022-0847☆12Mar 8, 2022Updated 3 years ago
- Cryptocurrency wallet decryption program written in C# .NET 7.0☆20Dec 9, 2024Updated last year
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆22Feb 2, 2026Updated 2 weeks ago
- ☆38Jan 13, 2023Updated 3 years ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆34Feb 6, 2026Updated last week
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Oct 3, 2023Updated 2 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- ☆75Apr 8, 2024Updated last year
- ☆40Oct 8, 2024Updated last year
- Send Bulk fake poll votes with your accounts by this tool.☆12Oct 14, 2025Updated 4 months ago
- Checker de cuentas Blim para android [TERMUX]☆11Jan 21, 2019Updated 7 years ago
- Lightweight File Integrity Monitoring Tool☆33Apr 20, 2024Updated last year
- ☆41Mar 12, 2025Updated 11 months ago
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Mar 13, 2022Updated 3 years ago
- Scape firmware metadata from 18 vendors and download corresponding firmware images. Save in MySQL database for InfoSec research purposes.☆12Feb 17, 2023Updated 2 years ago
- SnailLoad Demo Webserver☆38Feb 5, 2025Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆36Nov 16, 2023Updated 2 years ago
- Telegram forwarder☆10Jan 20, 2023Updated 3 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆39Jan 12, 2026Updated last month
- ☆11Jan 14, 2021Updated 5 years ago
- You can create a virus for a Laptop or phone with this command bell☆10Mar 3, 2021Updated 4 years ago
- An online marketplace that allows users to buy and sell products. Users can register for an account, browse products, add products to the…☆11Aug 24, 2024Updated last year
- CredFlow is a full-stack Loan Management System built using React, Node.js, and MongoDB. The application provides a complete loan lifecy…☆15Dec 30, 2025Updated last month
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Living off the False Positive!☆41Jan 31, 2025Updated last year
- ☆12Feb 4, 2025Updated last year
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 5 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Aug 22, 2024Updated last year
- ☆46Nov 10, 2025Updated 3 months ago
- Simple login application in Flask for user session management without login extensions.☆11Mar 8, 2022Updated 3 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- simple and clean ip look up with bootstrap template☆131Sep 30, 2020Updated 5 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- Scraping LegiFrance naturalisation decrees for fun and OSINT profit☆11May 27, 2023Updated 2 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Antlr4 / Javascript example☆10Mar 3, 2018Updated 7 years ago