theart42 / cves
CVE's we discovered along the way
☆16Updated 2 years ago
Related projects: ⓘ
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆69Updated 2 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆41Updated 2 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆12Updated 5 years ago
- Simple AV Evasion for PE Files☆40Updated 2 years ago
- offensive notes & resources☆39Updated 2 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆26Updated 5 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated last month
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆14Updated 4 years ago
- A python approach to interacting with web shells.☆27Updated 3 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆19Updated 3 years ago
- Materials from different CTFs for later reuse☆22Updated last year
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 3 years ago
- ☆20Updated 3 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆20Updated 3 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆54Updated last year
- ☆28Updated this week
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆13Updated last year
- Linux Persistence Toolkit☆44Updated last year
- User enumeration and password spraying tool for testing Azure AD☆67Updated 2 years ago
- A tool to tunnel TCP traffic over WinRM☆17Updated 3 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆29Updated 2 years ago
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆20Updated 2 years ago
- Generate image payloads in JS to bypass filters☆39Updated 3 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆39Updated 2 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 3 years ago
- A mirror of several precompiled standalone red-teaming tools.☆18Updated last year
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆43Updated 3 weeks ago
- Repository of NASM programs for calling ntdll.dll functions☆9Updated 3 years ago
- ☆31Updated this week