dhn / exploitsLinks
Some personal exploits/pocs
☆55Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆75Updated 2 months ago
- with metasploit☆63Updated 5 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆57Updated 5 years ago
- ☆63Updated 6 years ago
- Some of my public exploits☆51Updated 5 years ago
- rce exploit , made to work with pocsuite3☆122Updated 6 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Updated 4 years ago
- sploit☆67Updated 5 years ago
- ☆103Updated 5 years ago
- Gogs CVEs☆79Updated 5 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- ☆50Updated 5 years ago
- Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container☆48Updated last year
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Updated 6 years ago
- a parser + crawler for .DS_Store files exposed publically☆54Updated 2 years ago
- This is a writeup for CVE-2020-11107 reported by Maximilian Barz☆32Updated 5 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Updated 6 years ago
- Full TTY reverse shell over SSH☆59Updated 5 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 6 years ago
- ☆44Updated 5 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆90Updated 5 years ago
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Updated 10 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53Updated 6 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- eternalrelayx☆36Updated 6 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆29Updated 4 years ago
- guest→system(UAC手动提权)☆74Updated 5 years ago
- ☆36Updated 7 years ago