himori123 / -CVE-2023-30845Links
Explore CVE 2023-30845 automatically across multiple subdomains
☆16Updated last year
Alternatives and similar repositories for -CVE-2023-30845
Users that are interested in -CVE-2023-30845 are comparing it to the libraries listed below
Sorting:
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆64Updated 8 months ago
- ☆45Updated 2 years ago
- Repo for all my exploits/PoCs☆51Updated 3 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆38Updated last year
- APK Infrastructure Investigator☆63Updated 2 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆48Updated 2 years ago
- ☆34Updated 11 months ago
- 「🧱」Test a list of payloads and see if you can bypass it☆60Updated 3 years ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated last year
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Updated 5 months ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- Quicky serve files over http or https using flask.☆35Updated 6 months ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated last year
- External recon toolkit☆50Updated 7 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- aiohttp LFI (CVE-2024-23334)☆27Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆84Updated 5 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆29Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- Bruteforces Fortinet SSL VPNs☆57Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 5 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year