MaherAzzouzi / ZTE-F660-Exploit
ZTE F660 Routers Authentication Bypass Leading to RCE.
☆18Updated last year
Alternatives and similar repositories for ZTE-F660-Exploit
Users that are interested in ZTE-F660-Exploit are comparing it to the libraries listed below
Sorting:
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆15Updated last year
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- ☆18Updated 5 months ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆21Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 2 years ago
- ☆18Updated 4 months ago
- Dump Linux keyrings☆19Updated 10 months ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆17Updated 11 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated last year
- Tomcat backdoor based on CS blog☆27Updated last year
- some sploits☆17Updated 7 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆32Updated last year
- Simple POC of Voice C2 using Speech Recognition☆13Updated 3 years ago
- Beacon Object Files used for Cobalt Strike☆18Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆12Updated last month
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- OSED Practice binary☆24Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 9 months ago
- Parent Process ID Spoofing, coded in CGo.☆22Updated 3 weeks ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 7 months ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆21Updated last year
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3.☆20Updated last year
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆40Updated 2 years ago
- My nim learning experiments☆11Updated 2 years ago
- ☆19Updated 2 years ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆24Updated 8 months ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 7 months ago