nikn0laty / Exploit-for-Searchor-2.4.0-Arbitrary-CMD-InjectionLinks
Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)
☆18Updated 2 years ago
Alternatives and similar repositories for Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection
Users that are interested in Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection are comparing it to the libraries listed below
Sorting:
- KeePass 2.X dumper (CVE-2023-32784)☆21Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆14Updated 4 years ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆110Updated last year
- Squid Pivoting Open Port Scanner☆84Updated 9 months ago
- CVE-2023-2255 Libre Office☆61Updated 2 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆92Updated 2 years ago
- POC for CVE-2021-41091☆65Updated 2 years ago
- Exploit to dump ipmi hashes☆36Updated 2 years ago
- Openfire Console Authentication Bypass Vulnerability with RCE plugin☆54Updated last year
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆74Updated last year
- Joomla login bruteforce☆80Updated last year
- OSCP preperation and HackTheBox write ups.☆59Updated 2 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆61Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆63Updated 9 months ago
- ☆42Updated 11 months ago
- Simple HTTP listener for security testing☆116Updated 10 months ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆122Updated 3 weeks ago
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆162Updated 6 months ago
- A wordlist repository with human-curated and reviewed content.☆115Updated last year
- SSTI Payload Generator☆91Updated 3 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Updated last year
- PHP 8.1.0-dev Backdoor System Shell Script☆94Updated 4 years ago
- Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection☆40Updated last year
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆30Updated 2 years ago
- Aspx reverse shell☆114Updated 5 years ago
- A webshell plugin and interactive shell for pentesting a Joomla website.☆55Updated 3 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆127Updated 2 years ago
- Bruteforce Keepass databases (KDBX 4.x format)☆117Updated last year
- GameOver(lay) Ubuntu Privilege Escalation☆129Updated last year