Proof of Concept demonstrating Remote Code Execution through insecure deserialization in Roundcube (CVE-2025-49113).
☆89Jun 6, 2025Updated 9 months ago
Alternatives and similar repositories for CVE-2025-49113-exploit
Users that are interested in CVE-2025-49113-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 11 months ago
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆30Mar 27, 2025Updated last year
- C#快速添加删除mssql用户小工具☆21Aug 30, 2025Updated 6 months ago
- ☆13Mar 23, 2024Updated 2 years ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆97Jun 6, 2025Updated 9 months ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- ☆33Jan 23, 2025Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 9 months ago
- Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.☆13Apr 5, 2025Updated 11 months ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- Zabbix CVE-2024-42327 PoC☆46Jan 3, 2025Updated last year
- ☆24Apr 18, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Proof of Concept for CVE-2025-24367☆35Dec 8, 2025Updated 3 months ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- Dump processes over WMI with MSFT_MTProcess☆85Feb 13, 2026Updated last month
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆17May 27, 2023Updated 2 years ago
- Hikivision Infomation Leak Vuln With Redis GetShell☆18Nov 12, 2024Updated last year
- Windows Privilege Escalation☆23Jun 7, 2022Updated 3 years ago
- PoC collection☆13Oct 1, 2020Updated 5 years ago
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 6 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0☆31Jul 16, 2025Updated 8 months ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- suo5的二开改进,一款高性能,代码标准的 HTTP 代理隧道工具☆76Sep 5, 2025Updated 6 months ago
- Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection☆41May 28, 2024Updated last year
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- Registers Vectored Exception Handlers by directly manipulating internal LdrpVectorHandlerList structure instead of calling RtlAddVectored…☆36Jan 18, 2026Updated 2 months ago
- ☆22Jan 15, 2025Updated last year
- ☆139Jan 16, 2025Updated last year
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆131Aug 20, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Python based Office Macro Generator. Also does rudamentary obfuscation.☆12Jun 6, 2016Updated 9 years ago
- libdt is part of the "Huorong eXtendible Stream Scan Engine" project copyright by Huorong Borui (Beijing) Technology Co., Ltd.☆14Aug 17, 2015Updated 10 years ago
- ☆25Mar 1, 2025Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- CVE-2023-22515☆52Nov 10, 2023Updated 2 years ago
- eval() Exploit POC for Searchor 2.4.2 and lower☆11Apr 10, 2023Updated 2 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆92Dec 27, 2023Updated 2 years ago