brokendreamsclub / CVE-2025-3515View external linksLinks
WordPress File Upload RCE Exploit
☆17Sep 1, 2025Updated 5 months ago
Alternatives and similar repositories for CVE-2025-3515
Users that are interested in CVE-2025-3515 are comparing it to the libraries listed below
Sorting:
- Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071☆21Nov 5, 2025Updated 3 months ago
- ☆12Aug 24, 2025Updated 5 months ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Sep 16, 2025Updated 5 months ago
- CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection☆32Apr 15, 2025Updated 10 months ago
- badUSB ek0ms style with integrated c2☆44Oct 23, 2025Updated 3 months ago
- Sliver extension to bypass UAC via cmstp written in rust☆36Jun 4, 2024Updated last year
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated 3 weeks ago
- This lab seeks to put the pieces of information learned in my CCNP journey together and come up with a working topology☆11Jan 12, 2026Updated last month
- ☆11Apr 18, 2022Updated 3 years ago
- ☆14May 26, 2024Updated last year
- A repo for output of an intrusion prediction project☆11Feb 8, 2026Updated last week
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 8 months ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆35Feb 11, 2026Updated last week
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 2 years ago
- Implementation of Max Kellermann's exploit for CVE-2022-0847☆12Mar 8, 2022Updated 3 years ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- Simple Linux Kernel Module rootkit for 5.x/6.x x86/64 only☆13Apr 21, 2025Updated 9 months ago
- Changes the window titles of running processes.☆10Aug 15, 2019Updated 6 years ago
- ☆18Aug 15, 2025Updated 6 months ago
- Environment setup and automation fun with the Nexus9000v☆10Feb 15, 2019Updated 7 years ago
- 📱 Android app providing ⚡ REST API for call management - companion to SMSGate app 🔀☆26Jan 9, 2026Updated last month
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Passcode widget bypass for Telegram Desktop☆11Sep 21, 2022Updated 3 years ago
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆34Sep 22, 2025Updated 4 months ago
- Templtor is a bash script that will gather all the community Nuclei templates.☆29Dec 19, 2025Updated last month
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- Lightweight reflection scanner☆20Aug 31, 2025Updated 5 months ago
- Localroot Privelege escalation for linux☆13Aug 5, 2024Updated last year
- ☆33Dec 1, 2025Updated 2 months ago
- A "simplified" Docker setup script to deploy a local Supabase stack with minimal configuration.☆10Jun 17, 2025Updated 8 months ago
- ☆36Feb 3, 2026Updated 2 weeks ago
- Web Vulnerability Scanner.☆13Mar 30, 2022Updated 3 years ago
- JWT key confusion attack, i.e. re-sigining RS256 to HS256☆13May 4, 2022Updated 3 years ago
- Detection for CVE-2025-68613☆28Dec 22, 2025Updated last month
- ☆11Dec 22, 2023Updated 2 years ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Dec 1, 2025Updated 2 months ago
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆30Jan 11, 2026Updated last month
- Resolvalid is a Go tool that will generate or validate a list of DNS servers, providing you with a file containing only valid DNS servers…☆13Jul 4, 2025Updated 7 months ago