SambaCry exploit and vulnerable container (CVE-2017-7494)
☆381Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for exploit-CVE-2017-7494
Users that are interested in exploit-CVE-2017-7494 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆259Mar 9, 2021Updated 5 years ago
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆181Jul 26, 2017Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆119Nov 6, 2024Updated last year
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Nov 19, 2017Updated 8 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆396Oct 11, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆312Sep 10, 2018Updated 7 years ago
- MS17-010☆2,251Jun 20, 2023Updated 2 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 5 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- Vulnerability Labs for security analysis☆1,168Mar 10, 2021Updated 5 years ago
- Spectre exploit☆54Jan 9, 2018Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆94Sep 19, 2017Updated 8 years ago
- MS17-010 exploits, payloads, and scanners☆97Apr 29, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆662Sep 20, 2022Updated 3 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,926Sep 7, 2020Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Running CVE-2017-8759 exploit sample.☆255Jan 23, 2020Updated 6 years ago
- PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container☆407Feb 27, 2023Updated 3 years ago
- CVE-2017-7269 回显PoC ,用于远程漏洞检测..☆89Oct 27, 2018Updated 7 years ago
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆369Apr 14, 2022Updated 4 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆110Aug 21, 2018Updated 7 years ago
- CVE-2017-13089☆56Nov 15, 2017Updated 8 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆201Nov 30, 2017Updated 8 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- MS17-010 multithreading scanner written in python.☆75May 20, 2017Updated 9 years ago
- ntlm relay attack to Exchange Web Services☆333Jan 15, 2018Updated 8 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆17Feb 5, 2018Updated 8 years ago
- for mass exploiting☆613Jul 14, 2022Updated 3 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,124Feb 10, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Exploit primitives for PowerShell☆435Mar 25, 2018Updated 8 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,200May 11, 2023Updated 3 years ago
- Proof of concept for CVE-2019-0708☆1,183Mar 16, 2026Updated 2 months ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,498Aug 1, 2023Updated 2 years ago
- ODAT: Oracle Database Attacking Tool☆1,762Mar 31, 2026Updated last month
- Meterpreter Paranoid Mode - SSL/TLS connections☆290May 14, 2019Updated 7 years ago
- ☆13Feb 25, 2014Updated 12 years ago