IppSec / evil-cups
☆41Updated 7 months ago
Alternatives and similar repositories for evil-cups
Users that are interested in evil-cups are comparing it to the libraries listed below
Sorting:
- CVE-2023-2255 Libre Office☆58Updated last year
- Script to retrieve the master password of a keepass database <= 2.53.1☆100Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 7 months ago
- KeePass 2.X dumper (CVE-2023-32784)☆19Updated last year
- Openfire Console Authentication Bypass Vulnerability with RCE plugin☆51Updated last year
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆118Updated last month
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆47Updated 10 months ago
- A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam☆44Updated 6 years ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆72Updated 8 months ago
- ☆58Updated last year
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆84Updated this week
- Vulnerabilities Exploitation On Ubuntu 22.04☆40Updated last year
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆124Updated last year
- ☆32Updated last year
- POC for CVE-2021-41091☆65Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆86Updated last year
- WonderCMS Authenticated RCE - CVE-2023-41425☆25Updated 4 months ago
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆73Updated last year
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆106Updated last month
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆51Updated 4 months ago
- This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220☆24Updated 9 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆53Updated 8 months ago
- Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection☆39Updated 11 months ago
- Some tips for Bug Bounty using LibreOffice☆46Updated 2 months ago
- A cheatsheet for NetExec☆118Updated 3 months ago
- LimeSurvey Authenticated RCE☆19Updated last year
- Exploit to dump ipmi hashes☆34Updated 2 years ago
- A list of all Active Directory machines from HackTheBox☆58Updated 2 weeks ago
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆48Updated 6 months ago