ambionics / cnext-exploitsLinks
Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()
☆474Updated 8 months ago
Alternatives and similar repositories for cnext-exploits
Users that are interested in cnext-exploits are comparing it to the libraries listed below
Sorting:
- A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.☆304Updated last year
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆216Updated 7 months ago
- CVE-2023-0386在ubuntu22.04上的提权☆394Updated last year
- CVE-2024-4367 & CVE-2024-34342 Proof of Concept☆164Updated 11 months ago
- ☆336Updated 2 years ago
- CVE-2023-32233: Linux内核中的安全漏洞☆371Updated 2 years ago
- Exploit for the vulnerability CVE-2024-43044 in Jenkins☆178Updated 8 months ago
- 80+ Gadgets(30 More than ysoserial). JNDI-Injection-Exploit-Plus is a tool for generating workable JNDI links and provide background serv…☆797Updated 11 months ago
- 🔍 Github CVE POC 信息监控推送 🚀☆338Updated this week
- ☆826Updated 2 years ago
- A tiny project for generating SnakeYAML deserialization payloads☆593Updated 6 years ago
- HopLa Burp Suite Extender plugin - Adds autocompletion support and useful payloads in Burp Suite☆749Updated 4 years ago
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆135Updated last year
- ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具☆243Updated last year
- Tools, utilities and scripts to help you write redis modules!☆280Updated 11 months ago
- Sudo Baron Samedit Exploit☆754Updated 3 years ago
- Afuzz is an automated web path fuzzing tool for the Bug Bounty projects.☆304Updated last year
- JMX enumeration and attacking tool.☆441Updated 2 months ago
- RCE exploit for CVE-2023-3519☆224Updated last year
- ☆334Updated last year
- a lightweight, flexible and novel open source poc verification framework☆235Updated 3 years ago
- Localroot-ALL-CVE~☆139Updated last year
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆271Updated 2 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆129Updated 5 years ago
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆283Updated 9 months ago
- A collection of Server-Side Prototype Pollution gadgets and exploits☆189Updated 4 months ago
- Challenges & author writeups from ZeroDays CTF 2025.☆150Updated 2 months ago
- Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)☆531Updated last year
- PoC. Severity critical.☆70Updated 9 months ago
- GameOver(lay) Ubuntu Privilege Escalation☆125Updated last year