CVE-2025-49844 (RediShell)
☆327Oct 7, 2025Updated 5 months ago
Alternatives and similar repositories for redis_exploit
Users that are interested in redis_exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-49844 – Redis Lua Parser Use-After-Free☆65Oct 7, 2025Updated 5 months ago
- ☆41Mar 12, 2025Updated last year
- ☆53Mar 25, 2025Updated last year
- 7z exploit POC versions prior to 25.01☆33Aug 11, 2025Updated 7 months ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆42Jan 31, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆50Jan 16, 2025Updated last year
- Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.☆13Apr 5, 2025Updated 11 months ago
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆53Jan 11, 2025Updated last year
- PoC☆135Feb 11, 2026Updated last month
- WordPress File Upload RCE Exploit☆17Sep 1, 2025Updated 6 months ago
- Burp Suite/antsword - Interactive shell (HTTP hijack + POST + AES-256-CBC/BASE64)☆29Dec 8, 2025Updated 3 months ago
- NodeJS File Write to RCE on a read-only filesystem using a ROP chain in libuv☆38Oct 13, 2024Updated last year
- A powerful Redis exploitation tool that leverages CVE-2025-4984☆65Oct 10, 2025Updated 5 months ago
- GeoServer Remote Code Execution☆86Apr 6, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability☆23Jul 5, 2025Updated 8 months ago
- ☆86May 15, 2025Updated 10 months ago
- Proof of concept & details for CVE-2025-21298☆197Jan 20, 2025Updated last year
- Slides from Off-By-One Conferences☆34Sep 9, 2024Updated last year
- Unauthenticated Command Injection In Progress Kemp LoadMaster☆19Aug 26, 2025Updated 6 months ago
- Java JDK 8-18 CodeQL databases☆17Jun 2, 2024Updated last year
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆60Aug 21, 2024Updated last year
- CVE-2022-37042 Zimbra Auth Bypass leads to RCE☆30Dec 9, 2022Updated 3 years ago
- ☆103Dec 17, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆30Nov 25, 2025Updated 4 months ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆17Jan 23, 2025Updated last year
- ☆11Apr 19, 2025Updated 11 months ago
- PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivan…☆72Apr 25, 2025Updated 11 months ago
- Nuclei templates for drupal vulns... far from perfect☆19Jan 9, 2025Updated last year
- PoC & Exploit for CVE-2025-32023 / PlaidCTF 2025 "Zerodeo"☆210Jul 6, 2025Updated 8 months ago
- A Chrome DevTools extension to inspect and manipulate WebAssembly memory at runtime. Read, view, and copy memory values to assist in reve…☆34May 27, 2025Updated 9 months ago
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated last year
- Extract entire function source code based on giving line number using Javaparser☆21Jul 15, 2025Updated 8 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆504Sep 30, 2024Updated last year
- 海康威视ivms-8700综合安防平台0day poc☆24May 23, 2023Updated 2 years ago
- Breaking git with a carriage return and cloning RCE☆50Jul 8, 2025Updated 8 months ago
- Exploitation of CVE-2025-29969☆57Feb 20, 2026Updated last month
- record some AD security and Red Team contents☆14Dec 10, 2019Updated 6 years ago
- CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection☆33Apr 15, 2025Updated 11 months ago
- SMTP Heist (SMTP Cracker) - Advanced Built with PyQt6 UI - Report to Telegram☆37Oct 7, 2025Updated 5 months ago