Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)
β594Jan 8, 2021Updated 5 years ago
Alternatives and similar repositories for Drupalgeddon2
Users that are interested in Drupalgeddon2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- πProof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002β353Mar 29, 2019Updated 7 years ago
- Drupal enumeration & exploitation toolβ613Nov 4, 2020Updated 5 years ago
- CVE-2018-7600 Drupal RCEβ114Apr 18, 2018Updated 8 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.β205Feb 15, 2024Updated 2 years ago
- Test CVE-2018-0296 and extract usernamesβ106Dec 9, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Some scripts and exploitsβ149Jul 9, 2018Updated 7 years ago
- MS17-010β2,242Jun 20, 2023Updated 2 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scansβ584Sep 7, 2021Updated 4 years ago
- A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.β1,418Jan 19, 2024Updated 2 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Toolβ2,515Jan 21, 2020Updated 6 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)β498Dec 19, 2023Updated 2 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.β1,999Oct 10, 2018Updated 7 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)β684May 9, 2019Updated 6 years ago
- Active Directory ACL exploitation with BloodHoundβ761Nov 18, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Executionβ396Oct 11, 2017Updated 8 years ago
- Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!β298Jun 10, 2019Updated 6 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.β1,922Sep 7, 2020Updated 5 years ago
- Bypassing disabled exec functions in PHP (c) CRLFβ405Oct 2, 2020Updated 5 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several difβ¦β446Nov 30, 2023Updated 2 years ago
- A Java serializer in JavaScriptβ81May 21, 2018Updated 7 years ago
- ODAT: Oracle Database Attacking Toolβ1,756Mar 31, 2026Updated last month
- A collection of curated Java Deserialization Exploitsβ592May 16, 2021Updated 4 years ago
- Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)β37May 1, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Exploit for Drupal 7 <= 7.57 CVE-2018-7600β140Apr 26, 2018Updated 8 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts tβ¦β2,763Dec 18, 2021Updated 4 years ago
- SA-CORE-2018-004 POC #drupalgeddon3β41Apr 28, 2018Updated 8 years ago
- Micro$oft Windows Hacking Packβ525Mar 6, 2018Updated 8 years ago
- A PowerShell example of the Windows zero day priv escβ328Sep 12, 2018Updated 7 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)β363Jan 11, 2020Updated 6 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploitβ105Dec 3, 2018Updated 7 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This toolβ¦β1,124Feb 10, 2021Updated 5 years ago
- Privilege Escalation Project - Windows / Linux / Macβ2,600Oct 4, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CVE-2018-13379β254Aug 14, 2019Updated 6 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on thβ¦β4,193May 11, 2023Updated 2 years ago
- β1,494Dec 31, 2022Updated 3 years ago
- An exploit for Apache Struts CVE-2018-11776β302Aug 26, 2018Updated 7 years ago
- The cheat sheet about Java Deserialization vulnerabilitiesβ3,175May 26, 2023Updated 2 years ago
- Steal Net-NTLM Hash using Bad-PDFβ1,140Oct 20, 2025Updated 6 months ago
- Exploit written in Python for CVE-2018-15473 with threading and export formatsβ532Jul 12, 2024Updated last year