j4k0m / CVE-2021-24499Links
Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.
☆17Updated 3 years ago
Alternatives and similar repositories for CVE-2021-24499
Users that are interested in CVE-2021-24499 are comparing it to the libraries listed below
Sorting:
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆20Updated 3 years ago
- ☆14Updated last year
- Tool to get NT system shell .☆24Updated 3 years ago
- Tool to get NT system shell .☆11Updated 3 years ago
- a reliable C based exploit and writeup for CVE-2021-3560.☆38Updated 4 years ago
- CVE-2022-29464 Exploit☆1Updated last year
- DPX - the Doge Packer for eXecutables☆29Updated 3 years ago
- GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit☆35Updated 4 months ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆50Updated 4 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆20Updated 2 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- Beacon Object Files.☆35Updated last year
- CVE-2023-38831 winrar exploit generator and get reverse shell☆11Updated last year
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 3 years ago
- Caeser Cipher your shellcode!☆21Updated 3 years ago
- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆150Updated 3 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 4 years ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆20Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 3 years ago
- a collection of elf file infectors☆27Updated 3 years ago
- Small POC for process ghosting☆39Updated 3 years ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆50Updated 3 years ago
- TightVNC Vulnerability.☆16Updated 3 years ago
- Terminate the eventlog thread to disable the windows eventlog☆20Updated 5 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated last year
- not an exploit or a poc☆17Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Updated 4 years ago
- CVE-2022-24112:Apache APISIX apisix/batch-requests RCE☆44Updated 3 years ago