soltanali0 / CVE-2025-53770-ExploitLinks
SharePoint WebPart Injection Exploit Tool
☆300Updated 3 months ago
Alternatives and similar repositories for CVE-2025-53770-Exploit
Users that are interested in CVE-2025-53770-Exploit are comparing it to the libraries listed below
Sorting:
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆196Updated last year
- ☆157Updated last year
- Zimbra - Remote Command Execution (CVE-2024-45519)☆135Updated 7 months ago
- ☆72Updated 9 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆118Updated 4 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆145Updated 10 months ago
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆106Updated last year
- FortiWeb CVE-2025-25257 exploit☆62Updated 4 months ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆92Updated last year
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆234Updated 2 years ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆217Updated 7 months ago
- ☆137Updated last year
- CVE-2024-3400 Palo Alto OS Command Injection☆161Updated last year
- ☆90Updated 4 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- ☆253Updated 4 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆259Updated last year
- ☆59Updated 6 months ago
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆146Updated 7 months ago
- 🔥📜 Forbidden collection of Red Team sorcery 📜🔥☆212Updated last month
- CVE-2025-5777 (CitrixBleed 2) - Critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices☆43Updated 4 months ago
- ☆68Updated 9 months ago
- POC exploit for CVE-2024-49138☆263Updated 9 months ago
- Different methods to get current username without using whoami☆181Updated last year
- Proof of concept & details for CVE-2025-21298☆191Updated 9 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated last year
- ☆165Updated 2 years ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆345Updated 2 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆147Updated 8 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆65Updated last year