☆14Mar 20, 2025Updated last year
Alternatives and similar repositories for CVE-2023-37979
Users that are interested in CVE-2023-37979 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads.☆24Aug 28, 2025Updated 7 months ago
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Jul 29, 2023Updated 2 years ago
- PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability☆16Jul 16, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- ☆12Aug 31, 2018Updated 7 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.☆25Oct 1, 2023Updated 2 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆19Mar 18, 2023Updated 3 years ago
- advance web crawler to crawl urls from website using python.☆10Apr 24, 2023Updated 2 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆66Jul 1, 2024Updated last year
- offensive security scripts and documentation☆30Mar 9, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PCILeech HP iLO4 Service☆24Jan 9, 2019Updated 7 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Jul 2, 2025Updated 9 months ago
- Automated HTTP Request Repeating With Burp Suite☆39Apr 3, 2023Updated 3 years ago
- Cloudpanel 0-day Exploit☆56Jul 24, 2023Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 3 months ago
- Webdav Mass Exploiter With Python Programming Language☆13Jul 19, 2025Updated 9 months ago
- A collection of http fuzzing python scripts to fuzz HTTP servers for bugs.☆16Oct 1, 2023Updated 2 years ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆18Mar 22, 2023Updated 3 years ago
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆18Jun 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Manjaro LPE☆34Jul 6, 2023Updated 2 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Feb 15, 2024Updated 2 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 6 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Sep 20, 2023Updated 2 years ago
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆21Mar 19, 2021Updated 5 years ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆17Mar 13, 2024Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Jul 18, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Hack Camera, Microphone, Location, Clipboard With Just a Link. Also, Get Many Details About Victim's Device. And So On...☆20Apr 8, 2022Updated 4 years ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the ta…☆13Jul 12, 2023Updated 2 years ago
- CVE-2023-4634☆47Mar 14, 2026Updated last month
- FortiOS 管理界面中的堆内存下溢导致远程代码执行☆23Jun 21, 2023Updated 2 years ago