chebuya / CVE-2024-30851-jasmin-ransomware-path-traversal-pocLinks
Jasmin ransomware web panel path traversal PoC
☆21Updated last year
Alternatives and similar repositories for CVE-2024-30851-jasmin-ransomware-path-traversal-poc
Users that are interested in CVE-2024-30851-jasmin-ransomware-path-traversal-poc are comparing it to the libraries listed below
Sorting:
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Repo for all my exploits/PoCs☆51Updated last month
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 10 months ago
- ☆59Updated 8 months ago
- ☆27Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated 2 months ago
- ☆73Updated last year
- ☆61Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated 9 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 5 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆28Updated last year
- ☆35Updated last year
- ☆35Updated 7 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- backdoor exploit for vsftpd 2.3.4 on python☆15Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated last year
- A Moodle Scanner☆42Updated 7 months ago
- ☆38Updated last week
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 3 months ago
- CVE-2023-7028☆59Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- ☆42Updated 8 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆58Updated 9 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago