MaherAzzouzi / ZTE-F660-Exploit
ZTE F660 Routers Authentication Bypass Leading to RCE.
☆15Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for ZTE-F660-Exploit
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆11Updated last year
- A simple website to act as a store for havoc modules and extensions☆22Updated 6 months ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- Dump Linux keyrings☆15Updated 4 months ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Updated 8 months ago
- 🐍 Python Exploit for CVE-2022-23935☆13Updated last year
- OSED Practice binary☆24Updated 11 months ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆20Updated last month
- ☆18Updated last year
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 4 months ago
- My nim learning experiments☆11Updated 2 years ago
- Adobe Reader DC Information Leak Exploit☆22Updated 2 years ago
- MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...☆15Updated last year
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆23Updated 2 years ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆35Updated 2 months ago
- ☆12Updated 2 years ago
- ☆25Updated last year
- ManageEngine ADManager Command Injection☆12Updated last year
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆22Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated last year
- Remotely dump NT hashes through Windows Crash dumps☆26Updated 3 weeks ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆20Updated 3 months ago
- some sploits☆17Updated 2 months ago
- Parent Process ID Spoofing, coded in CGo.☆21Updated 4 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆30Updated last year