chebuya / CVE-2024-30851-jasmin-ransomware-path-traversal-poc
Jasmin ransomware web panel path traversal PoC
☆21Updated last year
Alternatives and similar repositories for CVE-2024-30851-jasmin-ransomware-path-traversal-poc:
Users that are interested in CVE-2024-30851-jasmin-ransomware-path-traversal-poc are comparing it to the libraries listed below
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 8 months ago
- ☆62Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Repo for all my exploits/PoCs☆50Updated 2 months ago
- Auto exploitation tool for CVE-2024-24401.☆34Updated 7 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- ☆58Updated 6 months ago
- backdoor exploit for vsftpd 2.3.4 on python☆15Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 3 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 8 months ago
- ☆34Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆65Updated 10 months ago
- PowerShell script to generate ShellCode in various formats☆41Updated 7 months ago
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆23Updated 9 months ago
- ☆51Updated 3 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated 3 weeks ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆82Updated last month
- quick and dirty proof-of-concept to hide shells in images☆49Updated 10 months ago
- Source code and examples for PassiveAggression☆54Updated 10 months ago
- ☆69Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆41Updated last year
- This is an AD pentest tools collection☆57Updated 9 months ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- ☆26Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated 11 months ago
- A Moodle Scanner☆40Updated 5 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year