hakaioffsec / CVE-2025-49113-exploitView external linksLinks
Proof of Concept demonstrating Remote Code Execution through insecure deserialization in Roundcube (CVE-2025-49113).
☆91Jun 6, 2025Updated 8 months ago
Alternatives and similar repositories for CVE-2025-49113-exploit
Users that are interested in CVE-2025-49113-exploit are comparing it to the libraries listed below
Sorting:
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 9 months ago
- ☆13Mar 23, 2024Updated last year
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆28Mar 27, 2025Updated 10 months ago
- ☆97Jun 6, 2025Updated 8 months ago
- ☆33Jan 23, 2025Updated last year
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- Proof of Concept for CVE-2025-24367☆28Dec 8, 2025Updated 2 months ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 7 months ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Remote administration toolkit for windows, based on Hidden VNC: file manager, keystroke logger, powershell☆35Nov 23, 2025Updated 2 months ago
- Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.☆13Apr 5, 2025Updated 10 months ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- Hikivision Infomation Leak Vuln With Redis GetShell☆18Nov 12, 2024Updated last year
- ☆21Jan 15, 2025Updated last year
- ☆15Jul 13, 2024Updated last year
- C#快速添加删除mssql用户 小工具☆22Aug 30, 2025Updated 5 months ago
- Zabbix CVE-2024-42327 PoC☆45Jan 3, 2025Updated last year
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆63Jan 19, 2026Updated 3 weeks ago
- Linux Shared Library to Shellcode Loader☆59Updated this week
- Assembly-Export for IDA 9.0 Pro. Assemport exports all functions separately in an assembly file. This enables further processing by exter…☆30May 30, 2025Updated 8 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆31Jan 27, 2025Updated last year
- Dump processes over WMI with MSFT_MTProcess☆81Updated this week
- LimeSurvey Authenticated RCE☆23Jul 16, 2023Updated 2 years ago
- jshERP Exploit GUI☆23Aug 26, 2024Updated last year
- CVE-2024-35250 的 Beacon Object File (BOF) 实现。☆24Nov 28, 2024Updated last year
- CVE-2024-21006 exp☆18Jul 29, 2024Updated last year
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆17May 27, 2023Updated 2 years ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆30Oct 16, 2025Updated 3 months ago
- ☆27Dec 23, 2023Updated 2 years ago
- cobaltstrike 上线提醒☆37Feb 24, 2021Updated 4 years ago
- Beacon Object File (BOF) Template☆61Feb 6, 2026Updated last week
- A BOF/COFF loader implemented in Go and CGO.☆23Jan 16, 2024Updated 2 years ago
- 本工具不去主动的做端口扫描,通过聚合了三大资产测绘引擎接口语法,快速获取与目标有关的所有资产列表,并进行一键指纹识别(通用系统指纹、ICP归属等),筛出高价值及脆弱资产。☆31Mar 13, 2025Updated 11 months ago
- ☆262Jul 8, 2025Updated 7 months ago
- Abusing SSRF to deliver an authenticated command injection payload☆30Sep 1, 2025Updated 5 months ago
- Extract NFS files from wireshark capture (pcap)☆26Aug 5, 2024Updated last year
- 2025护网POC☆46Jul 31, 2025Updated 6 months ago