pentestfunctions / CVE-2024-48990-PoC-Testing
Testing POC for use cases
β14Updated 5 months ago
Alternatives and similar repositories for CVE-2024-48990-PoC-Testing:
Users that are interested in CVE-2024-48990-PoC-Testing are comparing it to the libraries listed below
- π€ The Modern Port Scanner π€β18Updated 3 years ago
- Social Engineering Browser Update Attack.β57Updated last year
- Simple HTTP listener for security testingβ15Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It providesβ¦β13Updated 11 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate dataβ55Updated last year
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)β11Updated 7 months ago
- β15Updated 9 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ45Updated 4 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.β38Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefuβ¦β16Updated 11 months ago
- PHP CGI Argument Injection (CVE-2024-4577) RCEβ20Updated 8 months ago
- Ready to go Phishing Platformβ39Updated 6 months ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBoxβ20Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP β¦β35Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β16Updated 9 months ago
- Enumeration & fingerprint toolβ24Updated last year
- π A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ π©βπ»β18Updated 5 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitationβ38Updated 2 years ago
- γπ§±γTest a list of payloads and see if you can bypass itβ59Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple wayβ38Updated last year
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fireβ¦β14Updated 2 months ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.β39Updated last year
- Ded Security Framework is a tool aimed at security professionalsβ35Updated 11 months ago
- xdebug 2.5.5 RCE exploitβ30Updated 3 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and moreβ41Updated 5 months ago
- Basic script to generate reverse shell payloads, generally most used in ctf.β29Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving conβ¦β129Updated 9 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host usingβ¦β17Updated 11 months ago
- Windows priviledge escalation scriptβ13Updated 2 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero anβ¦β29Updated last year