Jasmin ransomware web panel path traversal PoC
☆21Apr 9, 2024Updated last year
Alternatives and similar repositories for CVE-2024-30851-jasmin-ransomware-path-traversal-poc
Users that are interested in CVE-2024-30851-jasmin-ransomware-path-traversal-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CHAOS RAT web panel path RCE PoC☆30Apr 15, 2024Updated last year
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- ☆16May 29, 2024Updated last year
- ☆33May 27, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆21Jan 8, 2026Updated 2 months ago
- ☆11Dec 9, 2025Updated 3 months ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 10 months ago
- ☆38Apr 1, 2024Updated last year
- Java Chains 插件编写 demo☆15Mar 5, 2025Updated last year
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆95Feb 12, 2025Updated last year
- AES-encrypted TCP/IP swiss army knife.☆11Nov 6, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆26Jul 13, 2024Updated last year
- c3p0 new gadget☆28Apr 1, 2025Updated 11 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆146Apr 2, 2024Updated last year
- ÜberDig - dig on steroids☆16Mar 19, 2026Updated last week
- ☆42Jun 23, 2024Updated last year
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Stores Azure DC IP addresses☆13Nov 15, 2024Updated last year
- CRLF Detection based on @BlackFan 's work See link below☆17Mar 14, 2024Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆10Jun 5, 2023Updated 2 years ago
- ☆14Feb 12, 2026Updated last month
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- A Docker lab integrating Splunk SIEM with Ollama LLM via MCP for AI security operations. Features Promptfoo OWASP evaluation, TA-ollama a…☆28Mar 8, 2026Updated 3 weeks ago
- World's First Haiku Ransomware/Malware☆16Dec 22, 2024Updated last year
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- ☆19Jan 21, 2026Updated 2 months ago
- Multi Level Marketing - Refer & Earn System App. Built For Educational purposes only.☆14Jan 1, 2023Updated 3 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- Введение в разработку вредоносных программ☆11Oct 15, 2023Updated 2 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.☆17Sep 8, 2024Updated last year
- A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)☆28Mar 16, 2024Updated 2 years ago
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.☆42Apr 25, 2024Updated last year