CVE-2025-49844 (RediShell)
☆326Oct 7, 2025Updated 4 months ago
Alternatives and similar repositories for redis_exploit
Users that are interested in redis_exploit are comparing it to the libraries listed below
Sorting:
- ☆41Mar 12, 2025Updated 11 months ago
- ☆53Mar 25, 2025Updated 11 months ago
- CVE-2025-49844 – Redis Lua Parser Use-After-Free☆64Oct 7, 2025Updated 4 months ago
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆49Jan 16, 2025Updated last year
- NodeJS File Write to RCE on a read-only filesystem using a ROP chain in libuv☆38Oct 13, 2024Updated last year
- 7z exploit POC versions prior to 25.01☆33Aug 11, 2025Updated 6 months ago
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆52Jan 11, 2025Updated last year
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆39Jan 31, 2026Updated last month
- CVE-2022-37042 Zimbra Auth Bypass leads to RCE☆30Dec 9, 2022Updated 3 years ago
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 5 months ago
- ☆16Aug 25, 2025Updated 6 months ago
- Extract entire function source code based on giving line number using Javaparser☆21Jul 15, 2025Updated 7 months ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- WordPress File Upload RCE Exploit☆17Sep 1, 2025Updated 6 months ago
- PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability☆23Jul 5, 2025Updated 7 months ago
- JSPHorse Project Backup☆27Jan 17, 2022Updated 4 years ago
- record some AD security and Red Team contents☆14Dec 10, 2019Updated 6 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆17Jan 23, 2025Updated last year
- this is a bot that will get the correct answers right at least 90% of the time on edgenuity. edgenuity is a common site used for middle s…☆14Jun 28, 2021Updated 4 years ago
- Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs.☆19Jun 23, 2024Updated last year
- GeoServer Remote Code Execution☆86Apr 6, 2025Updated 10 months ago
- Kernel Information Disclosure☆32Jan 13, 2026Updated last month
- Centralized docs of ProjectDiscovery☆22Updated this week
- Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.☆13Apr 5, 2025Updated 10 months ago
- Proof of concept & details for CVE-2025-21298☆195Jan 20, 2025Updated last year
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆61Aug 21, 2024Updated last year
- Slides from Off-By-One Conferences☆32Sep 9, 2024Updated last year
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- ☆16Mar 26, 2023Updated 2 years ago
- ☆85May 15, 2025Updated 9 months ago
- rwwwshell: Getting a reverse shell with Mr. Robot ;)☆36Jul 16, 2020Updated 5 years ago
- PoC☆130Feb 11, 2026Updated 2 weeks ago
- Breaking git with a carriage return and cloning RCE☆50Jul 8, 2025Updated 7 months ago
- A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within clu…☆104May 20, 2025Updated 9 months ago
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆505Sep 30, 2024Updated last year
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆516Jan 2, 2025Updated last year
- Linux Process Injection via Seccomp Notifier☆83Dec 9, 2025Updated 2 months ago