adhikara13 / CVE-2022-4510-WalkingPathLinks
A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell options. Exploits are saved in PNG format. Ideal for testing and demonstrations.
☆14Updated 2 years ago
Alternatives and similar repositories for CVE-2022-4510-WalkingPath
Users that are interested in CVE-2022-4510-WalkingPath are comparing it to the libraries listed below
Sorting:
- PrintNightmare (CVE-2021-34527) PoC Exploit☆116Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 8 months ago
- POC for DLL Proxying / Hijacking☆62Updated 4 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆47Updated 2 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆52Updated 2 years ago
- ☆59Updated 11 months ago
- Quicky serve files over http or https using flask.☆35Updated 8 months ago
- ☆25Updated 3 years ago
- Duplicate not owned Token from Running Process☆72Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- Automate converting webshells into reverse shells.☆70Updated last week
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- ☆39Updated 2 years ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Updated last year
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 8 months ago
- Windows Privilege Escalation☆69Updated 3 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 3 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- A little cheatsheet for NetExec☆27Updated last year
- ☆47Updated 3 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- ☆44Updated 3 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆64Updated 10 months ago
- Repo for all my exploits/PoCs☆53Updated 5 months ago
- Automated exploitation of MSSQL servers at scale☆120Updated this week
- An open-source process injection enumeration tool written in C#☆173Updated 2 years ago
- Discord C2 Profile for Mythic☆32Updated 7 months ago