farisv / Moodle-CVE-2019-3810View external linksLinks
Moodle (< 3.6.2, < 3.5.4, < 3.4.7, < 3.1.16) XSS PoC for Privilege Escalation (Student to Admin)
☆17Apr 29, 2021Updated 4 years ago
Alternatives and similar repositories for Moodle-CVE-2019-3810
Users that are interested in Moodle-CVE-2019-3810 are comparing it to the libraries listed below
Sorting:
- POC CVE-2019-0708 with python script!☆14Jun 24, 2019Updated 6 years ago
- CVE-2019-0708 Exploit Tool☆18Jul 18, 2019Updated 6 years ago
- ☆12Aug 20, 2021Updated 4 years ago
- A simple malware that tries to explain the logic of computer viruses with Python.☆9Jun 14, 2022Updated 3 years ago
- ☆10Mar 7, 2023Updated 2 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- 个人网站☆14Updated this week
- Latest FUD GMail phishing webpage generator☆30Jun 27, 2020Updated 5 years ago
- Bxi crack version☆10Jul 7, 2022Updated 3 years ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- ☆11Jun 28, 2022Updated 3 years ago
- A python toolkit that I created to help me solve cryptography CTF challenges.☆10Jun 24, 2022Updated 3 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 7 months ago
- Anrodi Trojanı Başka Bir Programla Birleştir☆10Oct 30, 2016Updated 9 years ago
- Make custom phishing page with Black-Water you just need to put required in create folder.☆36Apr 27, 2020Updated 5 years ago
- 基 于docsify的博客,主要记录一些工作中的经验和总结。地址:https://wudidehuangtiandi.github.io/mydoc/☆11Mar 3, 2025Updated 11 months ago
- Browse, set, and submit your RMP works here!☆12Updated this week
- The 9esim mini tool is a external (or we called extension) LPA on a board, which based on ESP32S3.☆13Dec 19, 2024Updated last year
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Verilog bit slicing for python☆10May 13, 2021Updated 4 years ago
- ☆10Nov 16, 2020Updated 5 years ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 7 months ago
- This is a collection of stealers for educational purposes☆21Aug 13, 2025Updated 6 months ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆46Oct 3, 2021Updated 4 years ago
- Leech Tools (Free Version) provides fraud tools such us Credit Card Generator, Bank Identification Number Lookup and Credit Card Validity…☆11May 9, 2019Updated 6 years ago
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 8 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Jun 6, 2023Updated 2 years ago
- Various python scripts for reinforcement learning algorithms.☆10Aug 7, 2018Updated 7 years ago
- A SETI / technosignature search code to find intelligent life beyond Earth☆13Dec 15, 2025Updated 2 months ago
- Configurations to implement Wazuh☆12Nov 28, 2022Updated 3 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆19Updated this week
- ☆13May 22, 2020Updated 5 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- Simple demo ilustrating the use of LSTM neural network to predict daily changes in the Ethereum cryptocurrency☆10Jan 23, 2018Updated 8 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- A tool to locate people using social engineering.☆11Mar 13, 2022Updated 3 years ago