Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)
☆17May 27, 2023Updated 2 years ago
Alternatives and similar repositories for Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection
Users that are interested in Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection are comparing it to the libraries listed below
Sorting:
- This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.☆41Sep 11, 2023Updated 2 years ago
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆29Mar 27, 2025Updated 11 months ago
- LimeSurvey Authenticated RCE☆23Jul 16, 2023Updated 2 years ago
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 10 months ago
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆15Feb 25, 2021Updated 5 years ago
- Burp Extension to manipulate AES encrypted payloads☆13Feb 4, 2022Updated 4 years ago
- This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due…☆18Jan 24, 2024Updated 2 years ago
- Exploit for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE☆16Apr 17, 2023Updated 2 years ago
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆23Jan 13, 2022Updated 4 years ago
- RCE Exploit For Maltrail-v0.53☆54Oct 29, 2023Updated 2 years ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆24Mar 18, 2023Updated 2 years ago
- PHP 8.1.0-dev Backdoor System Shell Script☆94Jun 6, 2021Updated 4 years ago
- ImageMagick LFI PoC [CVE-2022-44268]☆52Nov 6, 2023Updated 2 years ago
- KeePass 2.X dumper (CVE-2023-32784)☆27Nov 4, 2023Updated 2 years ago
- Grafana RCE exploit (CVE-2024-9264)☆39Oct 21, 2024Updated last year
- Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)☆49Jul 14, 2025Updated 7 months ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- CVE-2023-0297: The Story of Finding Pre-auth RCE in pyLoad☆28Jan 14, 2023Updated 3 years ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29May 5, 2023Updated 2 years ago
- GameOver(lay) Ubuntu Privilege Escalation☆132Oct 9, 2023Updated 2 years ago
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆75Aug 24, 2025Updated 6 months ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- RCE PoC for Tensorflow using a malicious Lambda layer☆61Jul 30, 2025Updated 7 months ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated 2 months ago
- This repo is an API Restful to create a Starwars character. Here I use SQLModel as ORM and FAST API as web service framework. Also I pres…☆11Aug 1, 2022Updated 3 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 5 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Proof of Concept code of the Shoplift code☆41Oct 4, 2021Updated 4 years ago
- A google dork parser that bypasses captcha's automatically.☆17Jul 15, 2025Updated 7 months ago
- ☆11Feb 10, 2022Updated 4 years ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 7 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- ☆18Aug 15, 2025Updated 6 months ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago