betab0t / cve-2017-7494
Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)
☆179Updated 7 years ago
Alternatives and similar repositories for cve-2017-7494:
Users that are interested in cve-2017-7494 are comparing it to the libraries listed below
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆175Updated 7 years ago
- ☆192Updated 7 years ago
- Running CVE-2017-8759 exploit sample.☆255Updated 5 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆207Updated 8 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 7 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 8 years ago
- ☆138Updated 7 years ago
- ☆112Updated 7 years ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 4 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 9 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆316Updated 6 years ago
- The first open source vulnerability scanner for firmwares☆195Updated 8 years ago
- UAC 0day, all day!☆277Updated 7 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆201Updated 7 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆324Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- Linux Memory Cryptographic Keys Extractor☆237Updated last year
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- Next Generation Firewall Audit and Bypass Tool☆264Updated 7 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- Modified dropbear server which acts as a client and allows authless login☆125Updated 6 years ago
- ☆73Updated 2 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆242Updated 10 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆314Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- some pocs for antivirus evasion☆130Updated last year
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 7 years ago
- ☆84Updated 8 years ago