dhn / exploitsLinks
Some personal exploits/pocs
☆55Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆66Updated 3 months ago
- ☆63Updated 5 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container☆47Updated last year
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆57Updated 5 years ago
- Full TTY reverse shell over SSH☆58Updated 4 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 4 years ago
- sploit☆68Updated 5 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆41Updated 4 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53Updated 6 years ago
- Apache Module Backdoor (PoC)☆48Updated 6 years ago
- with metasploit☆63Updated 5 years ago
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Updated 6 years ago
- a parser + crawler for .DS_Store files exposed publically☆55Updated 2 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- Some of my public exploits☆51Updated 4 years ago
- Burp Suite Attack Selector Plugin☆60Updated 7 years ago
- guest→system(UAC手动提权)☆74Updated 5 years ago
- ☆42Updated 5 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 5 years ago
- miscellaneous security research stuff☆37Updated 5 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Updated 2 years ago
- This is a writeup for CVE-2020-11107 reported by Maximilian Barz☆30Updated 5 years ago
- ☆36Updated 6 years ago
- Gogs CVEs☆78Updated 5 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆67Updated 5 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect☆132Updated 3 years ago
- YSOSERIAL Integration with burp suite☆41Updated 3 years ago
- Poc for CVE-2019-1253☆158Updated 3 years ago