该系列是从 2014 年到 2022 年的历史漏洞
☆18Apr 3, 2023Updated 2 years ago
Alternatives and similar repositories for wordpress-exploits
Users that are interested in wordpress-exploits are comparing it to the libraries listed below
Sorting:
- This script make any windows compatible with RDP connection☆21Jul 28, 2025Updated 7 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Feb 9, 2024Updated 2 years ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- linux权限维持脚本☆41Mar 4, 2025Updated 11 months ago
- ☆38Dec 14, 2024Updated last year
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- 基于Java+Springboot+vue的高校就业系统 本项目前后端分离 本系统分为管理员、企业、辅导员、学生四种角色 - 学生 : 个人信息、查看企业岗位信息(应聘)、简历信息管理、我的应聘 - 辅导员 : 学生信息管理、三方协议书审核、查看班级就业统计信息 - 企业 …☆11Oct 14, 2023Updated 2 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Jun 30, 2022Updated 3 years ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆35Jul 24, 2023Updated 2 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- The standard implementation of EventBus for Java and Spring.☆10Apr 1, 2023Updated 2 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 9 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- llvm with customised obfuscation optimisations☆15Sep 25, 2024Updated last year
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 3 months ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 6 months ago
- IDA Pro Folder Management Made Easy☆18Dec 24, 2024Updated last year
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- My own tools for developing kernel modules☆15Sep 23, 2025Updated 5 months ago
- 免杀☆12May 6, 2024Updated last year
- SPIP BigUp Plugin Unauthenticated RCE☆16Sep 7, 2024Updated last year
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- ☆12Oct 19, 2024Updated last year
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated last year
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY☆12Aug 14, 2020Updated 5 years ago
- Ansible playbook for configuring Kali Linux to personal preferences☆10Oct 5, 2022Updated 3 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- custom bloodhound queries and knowledge base☆12Apr 16, 2024Updated last year
- OSCP preparation☆12Sep 18, 2025Updated 5 months ago