sinsinology / CVE-2024-6670
☆34Updated 8 months ago
Alternatives and similar repositories for CVE-2024-6670:
Users that are interested in CVE-2024-6670 are comparing it to the libraries listed below
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 3 months ago
- Exploit for CVE-2024-5009☆13Updated 9 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 8 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 8 months ago
- A Moodle Scanner☆40Updated 5 months ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆37Updated 2 months ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 6 months ago
- RCE PoC for Empire C2 framework <5.9.3☆26Updated last year
- Cobalt Strike BOFS☆16Updated last year
- Proof of Concept Exploit for CVE-2024-9464☆45Updated 6 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- ☆56Updated 5 months ago
- Exploit for CVE-2024-4885☆17Updated 9 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated 7 months ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- Make an Linux Kernel rootkit visible again.☆51Updated 2 months ago
- ☆28Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated 11 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- ☆25Updated 5 months ago
- ☆37Updated 4 months ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆17Updated 10 months ago
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- ☆22Updated 11 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆57Updated 4 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 11 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆35Updated last year