m3ssap0 / wordpress-really-simple-security-authn-bypass-exploitLinks
Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924).
☆19Updated last year
Alternatives and similar repositories for wordpress-really-simple-security-authn-bypass-exploit
Users that are interested in wordpress-really-simple-security-authn-bypass-exploit are comparing it to the libraries listed below
Sorting:
- Different methods to get current username without using whoami☆185Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- CVE-2023-38831 PoC (Proof Of Concept)☆89Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated last year
- Awesome Privilege Escalation☆144Updated 3 years ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 11 months ago
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆151Updated 10 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 11 months ago
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆40Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150Updated last year
- SharePoint WebPart Injection Exploit Tool☆311Updated 2 months ago
- ☆137Updated 2 years ago
- ☆164Updated 11 months ago
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆298Updated 2 months ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Updated 2 years ago
- ☆96Updated last year
- Our Tips&Tricks☆128Updated 11 months ago
- ☆262Updated 7 months ago
- Convert your shellcode into an ASCII string☆127Updated 7 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆183Updated 2 years ago
- yet another AV killer tool using BYOVD☆300Updated 2 years ago
- Proof of concept & details for CVE-2025-21298☆195Updated last year
- Documents Exfiltration project for fun and educational purposes☆145Updated 2 years ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆149Updated 7 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆153Updated 11 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆153Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆91Updated 9 months ago