adhikara13 / CVE-2022-4510-WalkingPath
A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell options. Exploits are saved in PNG format. Ideal for testing and demonstrations.
☆14Updated last year
Alternatives and similar repositories for CVE-2022-4510-WalkingPath:
Users that are interested in CVE-2022-4510-WalkingPath are comparing it to the libraries listed below
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 2 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆42Updated 2 years ago
- ☆47Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- ☆38Updated 2 years ago
- ☆29Updated 2 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated last year
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated last year
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Updated 2 years ago
- ☆22Updated 3 years ago
- Windows Post-Exploitation tools wrapper☆12Updated 9 months ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 2 years ago
- ☆54Updated 4 months ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- Discord C2 Profile for Mythic☆28Updated last month
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last week
- Get SYSTEM via SeDebugPrivilege☆20Updated 2 years ago
- Modified version of PEAS client for offensive operations☆40Updated 2 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆33Updated last month
- A repository with my code snippets for research/education purposes.☆50Updated last year
- ☆43Updated 8 months ago
- My BloodHound custom queries☆23Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆28Updated 3 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year