Proof of Concept demonstrating Remote Code Execution through insecure deserialization in Roundcube (CVE-2025-49113).
☆89Jun 6, 2025Updated 10 months ago
Alternatives and similar repositories for CVE-2025-49113-exploit
Users that are interested in CVE-2025-49113-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆32Mar 27, 2025Updated last year
- C#快速添加删除mssql用户小工具☆21Aug 30, 2025Updated 7 months ago
- ☆13Mar 23, 2024Updated 2 years ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- ☆98Jun 6, 2025Updated 10 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- ☆36Jan 23, 2025Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 9 months ago
- Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.☆13Apr 5, 2025Updated last year
- Extract NFS files from wireshark capture (pcap)☆27Aug 5, 2024Updated last year
- Zabbix CVE-2024-42327 PoC☆47Jan 3, 2025Updated last year
- Proof of Concept for CVE-2025-24367☆35Dec 8, 2025Updated 4 months ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- Dump processes over WMI with MSFT_MTProcess☆85Feb 13, 2026Updated 2 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆17May 27, 2023Updated 2 years ago
- Hikivision Infomation Leak Vuln With Redis GetShell☆18Nov 12, 2024Updated last year
- Windows Privilege Escalation☆24Jun 7, 2022Updated 3 years ago
- PoC collection☆13Oct 1, 2020Updated 5 years ago
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 7 months ago
- CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0☆31Jul 16, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- suo5的二开改进,一款高性能,代码标准的 HTTP 代理隧道工具☆77Sep 5, 2025Updated 7 months ago
- Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection☆41May 28, 2024Updated last year
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- ☆22Jan 15, 2025Updated last year
- ☆138Jan 16, 2025Updated last year
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆135Aug 20, 2018Updated 7 years ago
- ModbusPal - a Java MODBUS simulator☆19Jul 9, 2025Updated 9 months ago
- libdt is part of the "Huorong eXtendible Stream Scan Engine" project copyright by Huorong Borui (Beijing) Technology Co., Ltd.☆14Aug 17, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆25Mar 1, 2025Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- CVE-2023-22515☆52Nov 10, 2023Updated 2 years ago
- eval() Exploit POC for Searchor 2.4.2 and lower☆11Apr 10, 2023Updated 3 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆92Dec 27, 2023Updated 2 years ago
- Remote administration toolkit for windows, based on Hidden VNC: file manager, keystroke logger, powershell☆41Nov 23, 2025Updated 4 months ago
- A curated list of hardware-oriented CTF challenges.☆58Jan 23, 2026Updated 2 months ago