Exploit for PlaySMS 1.4 authenticated RCE
☆14Nov 6, 2018Updated 7 years ago
Alternatives and similar repositories for CVE-2017-9101
Users that are interested in CVE-2017-9101 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- CVE-2019-16113 - bludit >= 3.9.2 RCE authenticate☆13Jun 5, 2020Updated 5 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Changes for Visual Studio 2013☆120Jun 22, 2015Updated 10 years ago
- Useful scripts for pen testing. Require modification to run☆13Oct 17, 2020Updated 5 years ago
- iis6 exploit 2017 CVE-2017-7269☆92Feb 4, 2023Updated 3 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- ☆11May 27, 2021Updated 4 years ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- ☆13Sep 12, 2018Updated 7 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue☆12Dec 31, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Proof of Concept code of the Shoplift code☆41Oct 4, 2021Updated 4 years ago
- EyesOfNetwork 5.1 to 5.3 exploits☆13Mar 5, 2020Updated 6 years ago
- Preparation for OSWE☆47Apr 19, 2020Updated 6 years ago
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Dec 12, 2018Updated 7 years ago
- Python tool to bruteforce openssl ciphers against a wordilst☆31Jul 20, 2018Updated 7 years ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆18Nov 27, 2017Updated 8 years ago
- ☆15Aug 31, 2021Updated 4 years ago
- Script to create MITRE ATT&CK Navigator layers from the annotated detection rules in Elastic Security (Kibana).☆20Jul 1, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated 2 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Proof of Concept's provided by Source Incite☆37Aug 10, 2017Updated 8 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 6 years ago
- A solution to create obfuscated download cradles for PowerShell.☆16Aug 1, 2022Updated 3 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Certificate based authentication example using Docker and NGINX☆10Jan 28, 2021Updated 5 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- Find infected ms17-010 machines☆14May 26, 2017Updated 8 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 3 years ago
- AtExec SMB remote execution command (using SCHTASKS)☆12May 24, 2021Updated 4 years ago
- Python3 compatible linuxprivchecker☆23Jan 21, 2019Updated 7 years ago