This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.
☆49Jul 4, 2024Updated last year
Alternatives and similar repositories for CVE-2024-6387
Users that are interested in CVE-2024-6387 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit)☆99Jul 5, 2024Updated last year
- Proof of concept python script for regreSSHion exploit.☆10Oct 19, 2024Updated last year
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆176Aug 22, 2024Updated last year
- fscan结果优化,更新DC域筛选☆10Nov 21, 2023Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆19May 23, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Werkzeug password cracker☆19Nov 14, 2024Updated last year
- ☆12Dec 7, 2022Updated 3 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 4 years ago
- CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH☆518Jun 2, 2025Updated 10 months ago
- A post-exploitation tool to decrypt SolarPutty's sessions files☆37Dec 8, 2022Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Jan 17, 2024Updated 2 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- An unofficial mirror of the curl library with support for static linking on Windows.☆15Nov 9, 2025Updated 5 months ago
- A simple password cracker written in Go, designed to search for a specific hashed password in a wordlist.☆13Feb 23, 2024Updated 2 years ago
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- A Copenheimer replica for scanning Minecraft servers on the internet, but probably better.☆10May 23, 2024Updated last year
- Private keys that have become public ...☆21Jun 8, 2022Updated 3 years ago
- Custom Search Experience☆11Aug 4, 2017Updated 8 years ago
- bchecks for burpsuite☆14Oct 9, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.☆35Jul 4, 2024Updated last year
- This tool is intended for bounty hunters, the script installs and launches the best set of tools for expanding the attack surface, for W…☆12Apr 22, 2024Updated last year
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆14Mar 16, 2022Updated 4 years ago
- Compact Sub-Ghz Jammer for Flipper Zero☆16Apr 11, 2025Updated last year
- PowerShell scripts for installing applications or updates via GPO.☆12Sep 24, 2015Updated 10 years ago
- A tool to exploit imagetragick vulnerability to gain remote code execution☆20Dec 20, 2017Updated 8 years ago
- Contains examples and documentation on how to setup your remote development environment from your Windows host to a Jetson device☆14Oct 5, 2019Updated 6 years ago
- ☆12Jul 14, 2025Updated 9 months ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆67Nov 14, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆66Jan 22, 2026Updated 2 months ago
- Create your bootloader with Go.☆12May 28, 2019Updated 6 years ago
- Collection of videos of Raids on Cybercriminals☆22Mar 19, 2025Updated last year
- ☆23Mar 17, 2024Updated 2 years ago
- Public minecraft server scanner using masscan and dramatiq☆17Sep 5, 2023Updated 2 years ago
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆126Jul 25, 2024Updated last year
- World's fastest and most advanced password recovery utility☆19Feb 16, 2025Updated last year