Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)
☆29Mar 27, 2025Updated 11 months ago
Alternatives and similar repositories for CVE-2025-24071
Users that are interested in CVE-2025-24071 are comparing it to the libraries listed below
Sorting:
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆17May 27, 2023Updated 2 years ago
- LimeSurvey Authenticated RCE☆23Jul 16, 2023Updated 2 years ago
- CTF Writeups Backup☆13Nov 4, 2024Updated last year
- Proof of Concept demonstrating Remote Code Execution through insecure deserialization in Roundcube (CVE-2025-49113).☆91Jun 6, 2025Updated 9 months ago
- Grafana RCE exploit (CVE-2024-9264)☆39Oct 21, 2024Updated last year
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆130Aug 20, 2018Updated 7 years ago
- IECS213 微處理機系統☆12Dec 12, 2025Updated 2 months ago
- Ardumoto Motor Driver Shield for Arduino, created by and available from SparkFun Electronics☆10Aug 13, 2019Updated 6 years ago
- ☆13Aug 15, 2024Updated last year
- ☆10Dec 19, 2024Updated last year
- Ma dotfiles <3☆10Dec 30, 2025Updated 2 months ago
- A Windows and Office KMS Enabler.☆12Oct 13, 2025Updated 4 months ago
- ☆23Apr 8, 2025Updated 11 months ago
- ☆12Jun 25, 2021Updated 4 years ago
- Default repositories for MacForge☆12Jun 22, 2020Updated 5 years ago
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- A card with 4MB NVRAM for Apple ][ compatible computers which is a ProDOS compliant R/W device☆13Jan 20, 2026Updated last month
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆12Jan 19, 2024Updated 2 years ago
- pXLabs.WindowsUpdateTool is a user-friendly, WPF-based PowerShell utility designed to simplify and enhance the management of Windows Upda…☆15Jun 5, 2025Updated 9 months ago
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆15Jul 10, 2025Updated 7 months ago
- 一個關於資訊社群的集散地☆13Sep 17, 2023Updated 2 years ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆13May 25, 2025Updated 9 months ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆41Jan 31, 2026Updated last month
- ☆10Apr 13, 2025Updated 10 months ago
- ☆13Sep 14, 2022Updated 3 years ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- Slides and material from my conference presentations☆16Mar 30, 2024Updated last year
- Hacking the Apple Time Capsule to run modern Samba☆44Sep 12, 2025Updated 5 months ago
- Proof of Concept for CVE-2025-24367☆30Dec 8, 2025Updated 3 months ago
- Squid SSL Proxy with SSL Bump for intercepting SSL traffic☆10Sep 10, 2025Updated 5 months ago
- PoC for Paper: BunnyHop Exploiting the Instruction Prefetcher (USENIX Security 2023)☆14Aug 17, 2023Updated 2 years ago
- Automation for the rev/pwn experience in GDB☆14Feb 19, 2024Updated 2 years ago
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- ✏️ Personal collection of dotfiles☆12Jul 8, 2019Updated 6 years ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 3 months ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)☆11Apr 15, 2022Updated 3 years ago
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago