Jasmin ransomware web panel path traversal PoC
☆21Apr 9, 2024Updated 2 years ago
Alternatives and similar repositories for CVE-2024-30851-jasmin-ransomware-path-traversal-poc
Users that are interested in CVE-2024-30851-jasmin-ransomware-path-traversal-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CHAOS RAT web panel path RCE PoC☆30Apr 15, 2024Updated 2 years ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- ☆16May 29, 2024Updated last year
- Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-…☆16Apr 13, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- ☆32May 27, 2024Updated last year
- ☆20Jan 8, 2026Updated 3 months ago
- ☆11Dec 9, 2025Updated 4 months ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- ☆38Apr 1, 2024Updated 2 years ago
- Java Chains 插件编写 demo☆15Mar 5, 2025Updated last year
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆95Feb 12, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- AES-encrypted TCP/IP swiss army knife.☆11Nov 6, 2022Updated 3 years ago
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆26Jul 13, 2024Updated last year
- c3p0 new gadget☆28Apr 1, 2025Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆146Apr 2, 2024Updated 2 years ago
- ÜberDig - dig on steroids☆16Mar 19, 2026Updated last month
- Showcasing Serverless in Singapore☆16Jan 18, 2023Updated 3 years ago
- ☆42Jun 23, 2024Updated last year
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- CRLF Detection based on @BlackFan 's work See link below☆17Mar 14, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆14Feb 12, 2026Updated 2 months ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- World's First Haiku Ransomware/Malware☆16Dec 22, 2024Updated last year
- BoltWire v6.03 vulnerable to "Improper Access Control"☆14Oct 31, 2023Updated 2 years ago
- Multi Level Marketing - Refer & Earn System App. Built For Educational purposes only.☆14Jan 1, 2023Updated 3 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Введение в разработку вредоносных программ☆12Oct 15, 2023Updated 2 years ago
- ☆81Apr 23, 2024Updated last year
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.☆16Sep 8, 2024Updated last year
- 3" and 3.5" drone FPV frame compatible with Air Unit O3 and designed for Freestyle, Freeride and Cinematic. Many customizable options ava…☆24Sep 2, 2025Updated 7 months ago
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.☆42Apr 25, 2024Updated last year
- RAGGED EDGE BOX: Your Personal AI-Powered Document Search System☆16Aug 1, 2025Updated 8 months ago