ZTE F660 Routers Authentication Bypass Leading to RCE.
☆19Feb 18, 2024Updated 2 years ago
Alternatives and similar repositories for ZTE-F660-Exploit
Users that are interested in ZTE-F660-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pyload RCE with js2py sandbox escape☆17Oct 26, 2024Updated last year
- ☆10Jun 24, 2020Updated 5 years ago
- CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection☆17Sep 16, 2024Updated last year
- A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132☆17Jun 22, 2025Updated 9 months ago
- IMEI generator used in Huawei modified firmware☆13May 16, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆37Jan 4, 2026Updated 2 months ago
- ☆28Feb 6, 2024Updated 2 years ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆27May 21, 2024Updated last year
- Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。☆11Nov 28, 2022Updated 3 years ago
- ☆11Dec 3, 2019Updated 6 years ago
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50May 21, 2024Updated last year
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 11 months ago
- ☆18Jun 25, 2024Updated last year
- This is the official repository for the back end of the Andronix app 🚀. Here you can know all the scripts you're installing 😎☆13Apr 18, 2020Updated 5 years ago
- CVE-2023-26255_POC,CVE-2023-26256_POC☆32Aug 24, 2023Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- ☆13May 21, 2025Updated 10 months ago
- CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.☆72Aug 28, 2025Updated 7 months ago
- ☆11Sep 6, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12Jul 4, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆10Jun 15, 2024Updated last year
- A local privilege escalation vulnerability in VMware vCenter Server (and VMware Cloud Foundation) caused by a misconfiguration of sudo, a…☆57Jul 9, 2024Updated last year
- poc code for CVE-2024-38080☆30Sep 1, 2024Updated last year
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays☆13Feb 12, 2023Updated 3 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 11 months ago
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- A reverse shell with Telegram control panel written in Go☆12Oct 19, 2022Updated 3 years ago
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆32Jun 6, 2024Updated last year
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆14Mar 7, 2024Updated 2 years ago
- X-code Anti Admin adalah Program untuk untuk penghapusan jejak pada log di linux. Bisa digunakan dalam tahapan hacking ke 5 yaitu coverin…☆14May 15, 2022Updated 3 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆30Oct 26, 2025Updated 5 months ago