MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...
☆14Oct 17, 2023Updated 2 years ago
Alternatives and similar repositories for mybb_1832_LFI_RCE
Users that are interested in mybb_1832_LFI_RCE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of Max Kellermann's exploit for CVE-2022-0847☆12Mar 8, 2022Updated 4 years ago
- go调用最大cpu内核数实现批量ip列表tcp端口快速扫描☆15Mar 20, 2020Updated 6 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆19Apr 9, 2018Updated 8 years ago
- A Modified version of TCC's Osprey poc framework......☆13Jan 4, 2022Updated 4 years ago
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆47Oct 3, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆38Jan 13, 2023Updated 3 years ago
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated 2 months ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated 2 months ago
- python to tax form compiler☆13Jun 6, 2022Updated 3 years ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- ☆42Mar 12, 2025Updated last year
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated 2 years ago
- IoM defualt mal package☆10Feb 22, 2026Updated last month
- ☆12Mar 28, 2022Updated 4 years ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- ☆42Oct 8, 2024Updated last year
- Exploit for CVE-2022-27226☆15Mar 19, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- ☆12Mar 10, 2024Updated 2 years ago
- Lightweight File Integrity Monitoring Tool☆33Apr 20, 2024Updated last year
- Challenge handouts, source code, and solutions for UofTCTF 2026☆41Jan 13, 2026Updated 3 months ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆12Dec 11, 2020Updated 5 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Mar 13, 2022Updated 4 years ago
- PWNable pyjail☆13Jan 13, 2025Updated last year
- WordPress version scanner written in Python.☆15Jun 18, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- Scape firmware metadata from 18 vendors and download corresponding firmware images. Save in MySQL database for InfoSec research purposes.☆12Feb 17, 2023Updated 3 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14May 26, 2022Updated 3 years ago
- ☆11Sep 1, 2023Updated 2 years ago
- ☆46Nov 10, 2025Updated 5 months ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)☆78Jun 6, 2024Updated last year