truonghuuphuc / CVE-2024-39943-PocLinks
CVE-2024-39943 rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js).
☆20Updated 11 months ago
Alternatives and similar repositories for CVE-2024-39943-Poc
Users that are interested in CVE-2024-39943-Poc are comparing it to the libraries listed below
Sorting:
- ☆57Updated 10 months ago
- PAN-OS auth bypass + RCE☆45Updated 6 months ago
- ownCloud exploits for CVE-2023-49105☆37Updated last year
- ☆88Updated last year
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆23Updated 5 months ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆46Updated last year
- gRPC client for the Merlin Server☆22Updated last month
- Winsocket for Cobalt Strike.☆98Updated last year
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers☆54Updated 11 months ago
- Ivanti EPM AgentPortal RCE Vulnerability☆20Updated 8 months ago
- A Tool that aims to evade av with binary padding☆151Updated 11 months ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆46Updated 10 months ago
- Proof-of-concept exploit for CVE-2024-25153.☆42Updated last year
- Exploit for CVE-2024-27198 - TeamCity Server☆33Updated 5 months ago
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server☆38Updated 11 months ago
- CVE-2024-40711-exp☆42Updated 7 months ago
- Exploit for the CVE-2024-5806☆45Updated 11 months ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Updated 5 months ago
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆47Updated last year
- Dump Linux keyrings☆19Updated 10 months ago
- ☆39Updated 11 months ago
- A C# port from Invoke-GhostTask☆117Updated last year
- Homemade Aggressor scripts kit for Cobalt Strike☆66Updated 3 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆77Updated 2 years ago
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.☆38Updated last year
- ☆36Updated 6 months ago
- ☆56Updated 6 months ago
- ☆71Updated last year
- Exploit for CVE-2024-29847☆18Updated 8 months ago