aramosf / cve-2024-42327
cve-2024-42327 ZBX-25623
☆34Updated 3 months ago
Alternatives and similar repositories for cve-2024-42327:
Users that are interested in cve-2024-42327 are comparing it to the libraries listed below
- ☆42Updated 5 months ago
- GiveWP PHP Object Injection exploit☆54Updated last month
- CVE-2023-7028☆59Updated last year
- Auto exploitation tool for CVE-2024-24401.☆32Updated 5 months ago
- backdoor exploit for vsftpd 2.3.4 on python☆15Updated last year
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆84Updated 3 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆60Updated 6 months ago
- Authentication Bypass in GoAnywhere MFT☆61Updated last year
- PAN-OS auth bypass + RCE☆44Updated 3 months ago
- PoC for CVE-2024-42327 / ZBX-25623☆18Updated 3 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆94Updated last year
- Gmail/GSuite account enumeration tool☆53Updated last year
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- Dump Windows SAM hashes☆41Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆26Updated last year
- Jasmin ransomware web panel path traversal PoC☆21Updated 10 months ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆105Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆114Updated last year
- Bruteforces Fortinet SSL VPNs☆56Updated last year
- Encoder PHP webshell to bypass WAF using XOR operations.☆53Updated last year
- ☆61Updated 10 months ago
- Repo for all my exploits/PoCs☆47Updated last week
- Proof of Concept Exploit for CVE-2024-9464☆44Updated 4 months ago
- Exploit for the CVE-2024-5806☆43Updated 8 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated 11 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆48Updated 9 months ago
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆22Updated 7 months ago
- ☆38Updated last month
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆46Updated last month
- GeoServer Remote Code Execution☆76Updated 7 months ago