BlueStacks privilege escalation through VM backdooring
☆21Jul 16, 2024Updated last year
Alternatives and similar repositories for CVE-2024-33352
Users that are interested in CVE-2024-33352 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- ☆37Jan 4, 2026Updated 2 months ago
- CVE-2024-25641 - RCE Automated Exploit - Cacti 1.2.26☆10Aug 28, 2024Updated last year
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Aug 15, 2024Updated last year
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Jul 10, 2025Updated 8 months ago
- Pyload RCE with js2py sandbox escape☆17Oct 26, 2024Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 11 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆95Feb 12, 2025Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Aug 19, 2024Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆138Jul 23, 2024Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆27Aug 20, 2024Updated last year
- Flash Force is a parallelism-based multiprocess hash cracking tool written in Python. Achieve GOD SPEED while cracking the hash with full…☆24Jun 19, 2025Updated 9 months ago
- PDF dropper Red Team Scenairos☆229Jul 31, 2024Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆77Jul 31, 2024Updated last year
- Chrome(CVE-2024-2887)RCE-POC☆14Aug 25, 2024Updated last year
- HideMePlease is a new generation tool to hide phising web links into legitimate web links with original domains (eg: facebook.com, instag…☆30Jun 3, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against know…☆19Aug 8, 2024Updated last year
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆41Jan 23, 2026Updated 2 months ago
- Will attempt to retrieve DB details for FastAdmin instances☆69Aug 20, 2024Updated last year
- Proof-of-concept exploit for CVE-2024-25153.☆42Mar 13, 2024Updated 2 years ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆19Jun 17, 2024Updated last year
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- ☆16Aug 18, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆32Jun 6, 2024Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- ☆158Jul 10, 2024Updated last year
- Go Shellcode Loader to be Integrated in Exploration C2☆27Feb 7, 2025Updated last year