nhakobyan685 / CVE-2023-25136
OpenSSH 9.1 vulnerability mass scan and exploit
☆8Updated last year
Related projects ⓘ
Alternatives and complementary repositories for CVE-2023-25136
- Generate Undetectable Metasploit Payload in a simple way☆36Updated 10 months ago
- CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover☆27Updated 3 months ago
- Mass Exploit for CVE 2022-29464 on Carbon☆18Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆20Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆101Updated last year
- xdebug 2.5.5 RCE exploit☆29Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 5 months ago
- Gmail/GSuite account enumeration tool☆47Updated 8 months ago
- backdoor exploit for vsftpd 2.3.4 on python☆15Updated last year
- Perform With Mass Exploiter In Joomla 4.2.8.☆35Updated last year
- Mass Exploit - CVE-2023-38388 < Unauthenticated < Arbitrary File Upload☆20Updated last year
- an exploit of Server-side request forgery (SSRF)☆45Updated 3 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆32Updated last year
- Social Engineering Browser Update Attack.☆54Updated 11 months ago
- MStore API <= 3.9.2 - Authentication Bypass☆7Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆20Updated last year
- ProxyChecker Made in NodeJS☆36Updated 2 years ago
- i will upload all the books that helped me in learning in this repo☆20Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 5 months ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆44Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆19Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆90Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆67Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated last year
- Mass bruteforce authentication of network protocols☆44Updated 11 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- Simple Powershell Http shell With WEB UI☆66Updated 2 weeks ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year