JorianWoltjer / nodejs-file-write-rce
NodeJS File Write to RCE on a read-only filesystem using a ROP chain in libuv
☆14Updated last month
Related projects ⓘ
Alternatives and complementary repositories for nodejs-file-write-rce
- 一款基于James Forshaw的.NET Remoting反序列化 工具升级版在TypeFilterLevel.Low模式无文件payload任意代码执行poc的开发心得☆28Updated 2 months ago
- POC for Spring Kafka Deserialization Vulnerability CVE-2023-34040☆44Updated last year
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆33Updated last year
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆27Updated 5 months ago
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆52Updated 6 months ago
- Poc of CVE-2022-22980☆32Updated 2 years ago
- CS http Dynamic Encrypt Bridge.☆43Updated 3 years ago
- BOF内存运行exe☆26Updated last year
- Silently Install Chrome Extension For Persistence☆43Updated 4 months ago
- ☆33Updated 2 years ago
- Exchange ProxyRelay POC☆36Updated 2 years ago
- My security presentations☆26Updated last year
- Exploit for CVE-2024-29847☆16Updated 2 months ago
- ☆16Updated 7 months ago
- PolicyKit CVE-2021-3560 Exploit (Authentication Agent)☆117Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 2 years ago
- lazy way to create CVE-2023-38831 winrar file for testing☆91Updated last year
- Py写的tsh的流量加解密过程。☆28Updated 2 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆77Updated 2 years ago
- 利用wasm静态免杀的demo☆17Updated 7 months ago
- redshift-jdbc-RCE proof☆1Updated 2 years ago
- ☆46Updated 2 years ago
- MSSQL CLR for pentest.☆53Updated last year
- Spring-Kafka-Deserialization-Remote-Code-Execution☆30Updated last year
- CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered)☆37Updated 3 years ago
- PoC of Spring AMQP Deserialization Vulnerability (CVE-2023-34050)☆12Updated 9 months ago
- ☆15Updated 2 years ago
- ☆14Updated 2 years ago
- Exploit ONLYOFFICE Implementations☆23Updated last year