HKirito / CVE-2022-33980View external linksLinks
CVE
☆32Oct 20, 2022Updated 3 years ago
Alternatives and similar repositories for CVE-2022-33980
Users that are interested in CVE-2022-33980 are comparing it to the libraries listed below
Sorting:
- Cobalt Strike RCE CVE-2022-39197☆17Sep 25, 2022Updated 3 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- ☆15Oct 27, 2022Updated 3 years ago
- ☆13Sep 15, 2024Updated last year
- A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.☆116Jan 31, 2025Updated last year
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container☆15Dec 16, 2017Updated 8 years ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆41May 14, 2022Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Cs-Sleep-Mask-Fiber☆18May 16, 2025Updated 9 months ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- spring4shell | CVE-2022-22965☆23Jun 30, 2022Updated 3 years ago
- C# Codedom example / builder☆24Mar 8, 2020Updated 5 years ago
- nps内网穿透代理服务器未授权访问漏洞扫描利用工具☆28Apr 19, 2023Updated 2 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆177Aug 1, 2022Updated 3 years ago
- M1 bare metal project in Rust☆31Sep 1, 2022Updated 3 years ago
- WordPress WP_Query SQL Injection POC☆28Mar 11, 2023Updated 2 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆64May 2, 2020Updated 5 years ago
- Remote command shell application written in C# targeting the .NET runtime.☆29Feb 7, 2026Updated last week
- Download payload to disk and install it to startup then melt.☆35Apr 9, 2019Updated 6 years ago
- Security Research☆36Dec 23, 2021Updated 4 years ago
- ☆32Aug 9, 2019Updated 6 years ago
- ☆10Sep 3, 2021Updated 4 years ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 5 months ago
- ☆10Aug 9, 2024Updated last year
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆16Dec 23, 2024Updated last year
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Jul 5, 2022Updated 3 years ago
- 快速遍历目标目录中所有指定后缀文件中包含的敏感信息☆138Aug 7, 2022Updated 3 years ago
- Debug CVEs!☆37Aug 13, 2023Updated 2 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- CVE-2022-1388 F5 BIG-IP RCE 批量检测☆92May 9, 2022Updated 3 years ago
- A prototype to explore different file recovery techniques for the UFS2 filesystem. Specifically for use with PS3/4.☆12Jul 24, 2022Updated 3 years ago
- SPI MITM for the Arty S7-50☆14Dec 24, 2022Updated 3 years ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- Good code.☆17Nov 18, 2018Updated 7 years ago