cfreal / exploitsLinks
Some of my exploits.
☆594Updated 4 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆678Updated 6 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆529Updated last year
- [Linux] Two Privilege Escalation techniques abusing sudo token☆721Updated 6 years ago
- Bypassing disabled exec functions in PHP (c) CRLF☆404Updated 5 years ago
- ☆266Updated 6 years ago
- A collection of curated Java Deserialization Exploits☆590Updated 4 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆363Updated 5 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆582Updated 4 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆744Updated last year
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆380Updated 2 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆346Updated 4 years ago
- Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)☆590Updated 4 years ago
- 🔪Browser logic vulnerabilities☆698Updated 4 years ago
- There is no pre-auth RCE in Jenkins since May 2017, but this is the one!☆605Updated 6 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆393Updated 8 years ago
- Linux 4.10 < 5.1.17 PTRACE_TRACEME local root☆327Updated 6 years ago
- Vulnerability Labs for security analysis☆1,174Updated 4 years ago
- Apache Solr Injection Research☆578Updated 5 years ago
- Proof of concept for CVE-2019-0708☆1,183Updated 3 years ago
- SHELLING - a comprehensive OS command injection payload generator☆445Updated 5 years ago
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆733Updated 6 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆358Updated 8 months ago
- PoC for CVE-2018-15133 (Laravel unserialize vulnerability)☆254Updated last year
- Lesser Known Web Attack Lab☆331Updated 5 years ago
- A tiny and cute URL fuzzer☆400Updated 3 years ago
- A Burp Suite Pro extension which augments your proxy traffic by injecting non-invasive headers designed to reveal backend systems by caus…☆438Updated 7 months ago
- Public work for CVE-2019-0708☆292Updated 5 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆260Updated 2 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆817Updated 2 years ago
- kernel privilege escalation enumeration and exploitation framework☆697Updated 7 years ago