This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.
☆22Mar 13, 2024Updated 2 years ago
Alternatives and similar repositories for CVE-2023-38545
Users that are interested in CVE-2023-38545 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Jan 31, 2023Updated 3 years ago
- Example payload for CVE-2022-21894☆15Sep 27, 2023Updated 2 years ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆17Mar 13, 2024Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- WonderCMS Authenticated RCE - CVE-2023-41425☆26Dec 30, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CVE-2023-42820☆56Apr 3, 2024Updated 2 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14May 8, 2018Updated 7 years ago
- NoBlindi is a command-line tool for exploiting blind NoSQL injection vulnerabilities to recover passwords in web applications.☆28Nov 12, 2023Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- ☆25Sep 27, 2023Updated 2 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆12Oct 27, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Oct 1, 2023Updated 2 years ago
- Webkit JavascriptCore Array unshift function had a race condition, it leads to RCE.☆44Dec 5, 2023Updated 2 years ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Sep 16, 2024Updated last year
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- ☆15Jun 23, 2024Updated last year
- ☆22Jul 15, 2023Updated 2 years ago
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆42Oct 19, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- CVE-2022-24990信息泄露+RCE 一条龙☆39Mar 29, 2022Updated 4 years ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 4 years ago
- ☆44Aug 8, 2022Updated 3 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆74Oct 28, 2023Updated 2 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆153Oct 12, 2023Updated 2 years ago
- ☆15Nov 3, 2023Updated 2 years ago
- Metabase Pre-auth RCE☆12Aug 3, 2023Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Sep 22, 2023Updated 2 years ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆76Mar 13, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆66Jun 25, 2025Updated 9 months ago
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Jul 11, 2023Updated 2 years ago
- CVEs for Integrated Dell Remote Access Controller (iDRAC)☆23Updated this week
- ☆56Aug 26, 2022Updated 3 years ago
- Case for CVE-2022-30778☆23Aug 23, 2022Updated 3 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Dec 6, 2022Updated 3 years ago
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago