☆22Jun 17, 2020Updated 5 years ago
Alternatives and similar repositories for Moodle_RCE
Users that are interested in Moodle_RCE are comparing it to the libraries listed below
Sorting:
- Course enrolments allowed privilege escalation from teacher role into manager role to RCE☆44Aug 1, 2021Updated 4 years ago
- Noodle [Moodle RCE] (v3.4.1) - CVE-2018-1133☆10Mar 15, 2019Updated 6 years ago
- A webshell plugin and interactive shell for pentesting a Moodle instance.☆39Feb 11, 2025Updated last year
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- ☆26Nov 25, 2025Updated 3 months ago
- ☆22Aug 11, 2021Updated 4 years ago
- Burp Suite extension for API security testing with 15 attack types, 108+ payloads, intelligent fuzzing, BOLA/IDOR detection, AI integrati…☆48Dec 30, 2025Updated 2 months ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆25Jul 26, 2024Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆66Updated this week
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- ☆50Jul 9, 2025Updated 8 months ago
- c# reverse shell poc☆26Dec 22, 2025Updated 2 months ago
- ☆81Jan 26, 2025Updated last year
- ☆33Feb 27, 2018Updated 8 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Apr 7, 2018Updated 7 years ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆39Nov 27, 2024Updated last year
- ☆40Nov 1, 2021Updated 4 years ago
- Convert MacOS plist password file to hash file for password crackers☆37Dec 3, 2018Updated 7 years ago
- ☆105Feb 11, 2026Updated 3 weeks ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- .NET project for writing files to local or remote hosts☆43Jan 27, 2020Updated 6 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- Security tool to encode/decode Golang web-frameworks' client-side session cookie which use `gorilla/securecookie` or `gorilla/sessions`, …☆36Oct 7, 2019Updated 6 years ago
- Building a 2D side-scrolling platform game in HTML5 from scratch.☆16Oct 25, 2023Updated 2 years ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 8 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- Azure Offensive Library☆17Oct 18, 2025Updated 4 months ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- Scripts aiding penetration testing of Splunk Enterprise systems☆10Jan 29, 2019Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago