nhakobyan685 / CVE-2023-25136
OpenSSH 9.1 vulnerability mass scan and exploit
☆8Updated last year
Alternatives and similar repositories for CVE-2023-25136:
Users that are interested in CVE-2023-25136 are comparing it to the libraries listed below
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆104Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Gmail/GSuite account enumeration tool☆50Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- Create a malicious pip package (PoC)☆11Updated last year
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- backdoor exploit for vsftpd 2.3.4 on python☆15Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 10 months ago
- Simple Powershell Http shell With WEB UI☆70Updated 3 weeks ago
- ProxyChecker Made in NodeJS☆36Updated 3 years ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆53Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆34Updated last year
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated 2 years ago
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆89Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 2 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)☆24Updated last year
- Mass bruteforce authentication of common services with common credentials.☆47Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- CHAOS RAT web panel path RCE PoC☆28Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 7 months ago
- an exploit of Server-side request forgery (SSRF)☆50Updated 8 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- Fastest tool to find username and password brute forcing.☆73Updated last year