adhikara13 / CVE-2022-4510-WalkingPath
A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell options. Exploits are saved in PNG format. Ideal for testing and demonstrations.
☆14Updated last year
Alternatives and similar repositories for CVE-2022-4510-WalkingPath:
Users that are interested in CVE-2022-4510-WalkingPath are comparing it to the libraries listed below
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆28Updated last year
- ☆29Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- ☆26Updated last year
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Updated 2 years ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆27Updated 11 months ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆26Updated 6 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- ☆27Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆59Updated 3 months ago
- Windows Privilege Escalation☆56Updated 2 years ago
- ☆54Updated 4 months ago
- Discord C2 Profile for Mythic☆28Updated last month
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆50Updated 7 months ago
- ☆38Updated 2 years ago
- CVE-2023-21554 Windows MessageQueuing PoC,分析见 https://www.zoemurmure.top/posts/cve_2023_21554/☆56Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆37Updated 2 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆13Updated last year
- ☆38Updated 2 months ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆22Updated 3 years ago
- ☆52Updated last year
- ☆47Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- Get SYSTEM via SeDebugPrivilege☆20Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 2 months ago