A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell options. Exploits are saved in PNG format. Ideal for testing and demonstrations.
☆14Jun 27, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2022-4510-WalkingPath
Users that are interested in CVE-2022-4510-WalkingPath are comparing it to the libraries listed below
Sorting:
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 4 months ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A terminal plugin to make Kali Linux objectively better - compatible with ohmyzsh☆18Jan 23, 2024Updated 2 years ago
- A PoC of a privilege escalation vulnerability in the Realtek rtkio64 Windows driver.☆20Jul 6, 2020Updated 5 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated 2 years ago
- Hiding SSH public keys in SSH server using a kernel agent☆23Dec 24, 2020Updated 5 years ago
- ImageMagick LFI PoC [CVE-2022-44268]☆52Nov 6, 2023Updated 2 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- ☆29Aug 24, 2025Updated 6 months ago
- A First Look at Conventional Commits Classification☆12Nov 18, 2024Updated last year
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具☆39Jan 6, 2024Updated 2 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- Automatially unzip files added to a specified directory☆14Mar 12, 2022Updated 4 years ago
- making printf work for you☆15Nov 10, 2025Updated 4 months ago
- This is similar to GdrvLoader but it works on EAC (& BE but same for GdrvLoader) with included gdrv.sys (cert)☆32Dec 8, 2025Updated 3 months ago
- Code with Windows Hacker☆12Oct 14, 2022Updated 3 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- ☆12Jun 22, 2022Updated 3 years ago
- Attempt to use WFP for proxy interception☆10Jan 13, 2019Updated 7 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- ☆11Apr 1, 2025Updated 11 months ago
- Command line language server protocol client (LSPC)☆11Jul 31, 2018Updated 7 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- fork from A-Protect☆10Nov 26, 2018Updated 7 years ago
- ☆15Oct 27, 2022Updated 3 years ago
- oh no oh no this is not good very bad very good☆11Mar 8, 2023Updated 3 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- 一款用于记录终端软件使用时间的开发套件☆12Feb 26, 2022Updated 4 years ago