adhikara13 / CVE-2022-4510-WalkingPathLinks
A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell options. Exploits are saved in PNG format. Ideal for testing and demonstrations.
☆14Updated last year
Alternatives and similar repositories for CVE-2022-4510-WalkingPath
Users that are interested in CVE-2022-4510-WalkingPath are comparing it to the libraries listed below
Sorting:
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆28Updated 2 years ago
- Discord C2 Profile for Mythic☆29Updated 3 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆40Updated this week
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 2 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Updated 2 years ago
- ☆38Updated 2 years ago
- vulnlab.com reaper writeup☆26Updated last year
- ☆52Updated last year
- ☆27Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 4 months ago
- ☆44Updated 11 months ago
- A collection of PoCs for different injection techniques on Windows!☆43Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 7 months ago
- Cobalt Strike BOFS☆16Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆61Updated 5 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆45Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- ☆48Updated 2 years ago
- A port of classic netcat to C#☆33Updated 2 years ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆26Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- A swiss army knife for pentesting networks☆26Updated 2 years ago