MatheuZSecurity / Exploit-CVE-2025-24799Links
CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
☆26Updated 6 months ago
Alternatives and similar repositories for Exploit-CVE-2025-24799
Users that are interested in Exploit-CVE-2025-24799 are comparing it to the libraries listed below
Sorting:
- PDF dropper Red Team Scenairos☆224Updated last year
- Reverse shell that can bypass windows defender detection☆169Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆118Updated 4 months ago
- ☆59Updated 6 months ago
- Zimbra - Remote Command Execution (CVE-2024-45519)☆134Updated 7 months ago
- An aggressor script that can help automate payload building in Cobalt Strike☆118Updated last year
- PowerShell Obfuscator☆214Updated 2 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆124Updated 5 months ago
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692☆42Updated 7 months ago
- ☆24Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆359Updated 7 months ago
- Our Tips&Tricks☆126Updated 8 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆298Updated 2 months ago
- tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp☆85Updated 10 months ago
- Will attempt to retrieve DB details for FastAdmin instances☆67Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆140Updated 9 months ago
- SharePoint WebPart Injection Exploit Tool☆299Updated 3 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆188Updated last year
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆281Updated 7 months ago
- Proof of Concept demonstrating Remote Code Execution through insecure deserialization in Roundcube (CVE-2025-49113).☆81Updated 5 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆155Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- ☆89Updated 3 months ago
- AdaptixFramework Extension Kit☆291Updated last week
- TeamServer and Client of Exploration Command and Control Framework☆176Updated last week
- ☆77Updated 6 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆237Updated 4 months ago