chebuya / CVE-2024-30851-jasmin-ransomware-path-traversal-poc
Jasmin ransomware web panel path traversal PoC
☆21Updated 9 months ago
Alternatives and similar repositories for CVE-2024-30851-jasmin-ransomware-path-traversal-poc:
Users that are interested in CVE-2024-30851-jasmin-ransomware-path-traversal-poc are comparing it to the libraries listed below
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated 10 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 5 months ago
- ☆56Updated 3 months ago
- Auto exploitation tool for CVE-2024-24401.☆30Updated 4 months ago
- ☆61Updated 9 months ago
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆30Updated 7 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated 11 months ago
- ☆58Updated 9 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆22Updated 6 months ago
- ☆36Updated 9 months ago
- A Moodle Scanner☆38Updated 2 months ago
- CVE-2023-7028☆59Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- PowerShell script to generate ShellCode in various formats☆41Updated 4 months ago
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆110Updated last year
- This is an AD pentest tools collection☆53Updated 6 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆29Updated 11 months ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 7 months ago
- A C2 framework built for my bachelors thesis☆55Updated 2 months ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆83Updated 2 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 7 months ago
- Fortinet FortiClient EMS SQL Injection☆46Updated 10 months ago
- ☆54Updated 2 months ago
- Windows Administrator level Implant.☆48Updated 4 months ago
- BloodHound PowerShell client☆49Updated this week
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆106Updated 2 months ago