BlueStacks privilege escalation through VM backdooring
☆21Jul 16, 2024Updated last year
Alternatives and similar repositories for CVE-2024-33352
Users that are interested in CVE-2024-33352 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆14May 15, 2024Updated last year
- ☆37Jan 4, 2026Updated 3 months ago
- CVE-2024-25641 - RCE Automated Exploit - Cacti 1.2.26☆10Aug 28, 2024Updated last year
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Aug 15, 2024Updated last year
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Jul 10, 2025Updated 9 months ago
- ☆18Jun 25, 2024Updated last year
- Pyload RCE with js2py sandbox escape☆18Oct 26, 2024Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆95Feb 12, 2025Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Aug 19, 2024Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆138Jul 23, 2024Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆27Aug 20, 2024Updated last year
- Phase 2 of zatca☆11Sep 18, 2024Updated last year
- Flash Force is a parallelism-based multiprocess hash cracking tool written in Python. Achieve GOD SPEED while cracking the hash with full…☆24Jun 19, 2025Updated 10 months ago
- PDF dropper Red Team Scenairos☆230Jul 31, 2024Updated last year
- For V8CTF M123☆17Aug 25, 2024Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆77Jul 31, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Chrome(CVE-2024-2887)RCE-POC☆14Aug 25, 2024Updated last year
- HideMePlease is a new generation tool to hide phising web links into legitimate web links with original domains (eg: facebook.com, instag…☆31Jun 3, 2024Updated last year
- The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against know…☆19Aug 8, 2024Updated last year
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- Will attempt to retrieve DB details for FastAdmin instances☆69Aug 20, 2024Updated last year
- Proof-of-concept exploit for CVE-2024-25153.☆42Mar 13, 2024Updated 2 years ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Jun 17, 2024Updated last year
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆16Aug 18, 2024Updated last year
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- A MBR Fuzzer☆31Apr 3, 2024Updated 2 years ago
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆32Jun 6, 2024Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Go Shellcode Loader to be Integrated in Exploration C2☆27Feb 7, 2025Updated last year