p0dalirius / Joomla-1.6-1.7-2.5-Privilege-Escalation-Vulnerability
A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability
☆12Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for Joomla-1.6-1.7-2.5-Privilege-Escalation-Vulnerability
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆22Updated 7 months ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆15Updated 10 months ago
- Multithreaded spraying of a password on all accounts of a domain.☆17Updated 4 months ago
- Extract the windows major and minor build numbers from an ISO file, and automatically sort the iso files.☆11Updated last month
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆16Updated 8 months ago
- ☆18Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 3 months ago
- A simple website to act as a store for havoc modules and extensions☆22Updated 5 months ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆13Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆23Updated 2 years ago
- Collection of scripts that I created to make my life easier.☆10Updated 3 years ago
- A collection of http fuzzing python scripts to fuzz HTTP servers for bugs.☆14Updated last year
- A Python script to parse Fortinet products serial numbers, and detect the associated model and revision.☆13Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- Right-To-Left Override POC☆34Updated 2 years ago
- A Python script to find tenant id an region from a list of domain names.☆12Updated last year
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆13Updated last year
- 「🚪」The hidden hookless backdoor☆10Updated 2 years ago
- ☆12Updated 2 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆13Updated 9 months ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆40Updated 2 years ago
- CVE-2022-30780 - lighttpd remote denial of service☆16Updated 7 months ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Updated 8 months ago
- My nim learning experiments☆11Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated 11 months ago