hash3liZer / CVE-2019-9978View external linksLinks
CVE-2019-9978 - (PoC) RCE in Social WarFare Plugin (<=3.5.2)
☆22Jun 26, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2019-9978
Users that are interested in CVE-2019-9978 are comparing it to the libraries listed below
Sorting:
- ☆13Jul 24, 2022Updated 3 years ago
- The way to get your password which has restored in your localhost by chrome.☆25Apr 2, 2020Updated 5 years ago
- Simple script to download some missing tools in Kali☆33Nov 28, 2020Updated 5 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- Full Auto Exploit tool to SQL Injection: Admin Find -dork generation and grab from cx-Security and proxy cheaker and more :)☆29Feb 22, 2018Updated 7 years ago
- Sahabat ZK1☆11Oct 27, 2019Updated 6 years ago
- Crascan is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner.☆31Nov 4, 2018Updated 7 years ago
- Red Widow Spider Tools☆32Jan 2, 2022Updated 4 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- TWRP device tree for Galaxy S7 (Qualcomm)☆11Sep 9, 2016Updated 9 years ago
- Drivers for interfacing HackRF radios with REDHAWK☆11Jun 18, 2020Updated 5 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- Material design file manager for Android☆10Jul 4, 2018Updated 7 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Man in the middle attack demo☆11Jan 14, 2018Updated 8 years ago
- Provides a Learning Tools Interoperability (LTI) integration for creating WordPress blogs with appropriate user roles based on roles set …☆12Mar 17, 2025Updated 10 months ago
- SocksSharp provides support for Socks4/4a/5 proxy servers to HttpClient☆12Feb 3, 2021Updated 5 years ago
- 正在写的一个资产管理和扫描相结合的分布式扫描器☆39Jul 6, 2022Updated 3 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- A python driven yahoo username availability validation software developed by Tufayel with proxy support☆10Aug 5, 2023Updated 2 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- Code with Windows Hacker☆12Oct 14, 2022Updated 3 years ago
- A Persian Word2Vec Model trained by Wikipedia articles☆10Jan 5, 2018Updated 8 years ago
- Gscan二开版☆12Apr 11, 2024Updated last year
- A Haskell implementation of a C compiler☆12Jun 19, 2021Updated 4 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- windows内核安全与驱动开发代码☆12Apr 4, 2020Updated 5 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- Payload Maker ( Only For lazy people like me..!!! )☆11Jan 18, 2018Updated 8 years ago
- Nmap results are a semigroup☆14Jul 8, 2021Updated 4 years ago
- ☆11Jun 16, 2021Updated 4 years ago
- Recon tool for URLs discovery☆11Jun 19, 2024Updated last year
- [Android] Samsung Knox Standard activation helper library for Android☆11Jun 14, 2019Updated 6 years ago
- 🧩 Downloads crx files of Chrome extensions☆10Apr 7, 2018Updated 7 years ago