imjdl / CVE-2024-57727Links
CVE-2024-57727
☆15Updated 9 months ago
Alternatives and similar repositories for CVE-2024-57727
Users that are interested in CVE-2024-57727 are comparing it to the libraries listed below
Sorting:
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year
 - A couple of different scripts, made to automate attacks against NoSQL databases.☆66Updated last year
 - This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
 - SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆65Updated last year
 - PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29Updated 2 years ago
 - Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆43Updated 2 years ago
 - Script to retrieve the master password of a keepass database <= 2.53.1☆112Updated last year
 - his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆170Updated 7 months ago
 - A blind SQL injection brute forcer☆111Updated 6 months ago
 - MOVEit CVE-2023-34362☆138Updated 2 years ago
 - ☆46Updated 3 weeks ago
 - Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆85Updated 2 months ago
 - PowerShell Obfuscator☆213Updated 2 months ago
 - A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
 - ☆45Updated last year
 - CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆58Updated last year
 - CVE-2025-56383-Proof-of-Concept☆51Updated last month
 - Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
 - ☆29Updated 2 years ago
 - CVE-2023-2255 Libre Office☆62Updated 2 years ago
 - A webshell plugin and interactive shell for pentesting a WordPress website.☆96Updated 2 years ago
 - Used to get NTLMv2 Hashes from SMB☆21Updated last year
 - Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
 - This is the repository which is synced to the gitbook wiki at https://www.netexec.wiki/☆60Updated last month
 - ☆68Updated 9 months ago
 - Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆108Updated 5 months ago
 - Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
 - A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆107Updated 4 months ago
 - Creating a Malicious Macro using MS Word☆24Updated 3 years ago
 - Polymorphic Command & Control☆98Updated 7 months ago