Clawdbot/Moltbot/OpenClaw One-click RCE PoC 🦞 (CVE-2026-25253)
☆92Jan 27, 2026Updated 3 months ago
Alternatives and similar repositories for moltbot-1click-rce
Users that are interested in moltbot-1click-rce are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆35Jul 13, 2025Updated 9 months ago
- Claude Code plugin for Java JAR security audit — 基于 jar-analyzer 的 Claude Code 安全审计插件,构建数据库,AI 深入分析☆127Mar 20, 2026Updated last month
- OpenClaw 智能助手一键部署与全中文配置管理工具☆77Mar 9, 2026Updated last month
- 🌾 OpenClaw 星露谷物语主题包 - 一键安装四季像素风格主题☆40Feb 23, 2026Updated 2 months ago
- 手把手教你写IAST系列☆24Jan 12, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 在 X.com 的关注列表中高亮显示未回关的用户☆40Jan 26, 2026Updated 3 months ago
- ☆40Feb 27, 2026Updated 2 months ago
- Cloudflare Turnstile 绕过工具 | Cloudflare Bypass Tool based on SeleniumBase UC Mode | 支持 Mac/Windows/Linux☆359Jan 22, 2026Updated 3 months ago
- 用于若依和Jeecg数据库中密码的爆破☆23Jul 19, 2025Updated 9 months ago
- nativeRasp that can hook native methods☆23Apr 24, 2023Updated 3 years ago
- 0xJS is an AI-powered JavaScript Security Tool☆57Apr 16, 2026Updated 2 weeks ago
- poc for cve-2025-53772☆47Dec 10, 2025Updated 4 months ago
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- Leveraging LLM to generate Java deserialization chains☆79Mar 12, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- db2vec: High-performance Rust CLI to parse database dumps (.sql, .surql), generate vector embeddings via Ollama, TEI, Gemini, and load in…☆29May 18, 2025Updated 11 months ago
- 个人漏洞收集项目,包括复现环境、POC、EXP等☆31Mar 14, 2025Updated last year
- ☆10Jan 28, 2023Updated 3 years ago
- 极简实用的微信小程序反编译 Web 工具☆34Mar 30, 2026Updated last month
- Collection of templates from various resources☆45Updated this week
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- n8n workflows related to bug bounty☆48Oct 27, 2025Updated 6 months ago
- 递归式主动检测脆弱路径的工具☆17Mar 24, 2025Updated last year
- ☆60Feb 13, 2026Updated 2 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆46Oct 10, 2025Updated 6 months ago
- ☆13Sep 15, 2024Updated last year
- ☆28Sep 11, 2019Updated 6 years ago
- ☆57Nov 18, 2025Updated 5 months ago
- ☆41Aug 8, 2023Updated 2 years ago
- Proof of concept for Kerberos Armoring abuse.☆83Dec 12, 2025Updated 4 months ago
- ☆12Nov 15, 2017Updated 8 years ago
- Some V8 n-day exploits that I've written☆55Mar 1, 2026Updated 2 months ago
- Educational Linux privilege escalation script for CTFs/OSCP. Explains WHAT/WHY/HOW for every vulnerability found. Highlights critical fin…☆62Oct 12, 2025Updated 6 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Java 设计模式梳理☆36Jun 20, 2022Updated 3 years ago
- 一些Java RASP demo☆11Sep 26, 2019Updated 6 years ago
- hscan 网络资产收集与漏洞扫描探活 服务扫描(常规 & 非常规端口)、 poc探测( xray v2 & nuclei 格式) 、数据库等弱口令爆破 、内网常见漏洞利用☆97Jan 6, 2025Updated last year
- ☆15Aug 31, 2020Updated 5 years ago
- Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.☆16Dec 31, 2019Updated 6 years ago
- ☆11Apr 21, 2026Updated 2 weeks ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆114Jan 26, 2026Updated 3 months ago