Exploit codes for rconfig <= 3.9.4
☆11Mar 17, 2020Updated 6 years ago
Alternatives and similar repositories for exploits-rconfig
Users that are interested in exploits-rconfig are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 11 months ago
- A simple reverse and as well a webshell that recognices the OS (Windows/Linux).☆17Nov 11, 2020Updated 5 years ago
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆37Jul 12, 2023Updated 2 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- POC for CVE-2020-13151☆39Aug 3, 2020Updated 5 years ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated last month
- 参照xffhelper源码修改,结合了fakeip的功能,生成jar包,不再需要py支持☆14Jun 10, 2021Updated 4 years ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated 10 months ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- ☆11Nov 16, 2025Updated 4 months ago
- This reposity provides fun ChatGPT prompts and jailbreaks!☆25Apr 16, 2023Updated 2 years ago
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆39Apr 15, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- Simple veracrypt container cracker using wordlist☆17May 14, 2021Updated 4 years ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated last year
- CVE-2021-22005批量验证python脚本☆13Sep 25, 2021Updated 4 years ago
- 苹果官网滚动效果demo☆15Feb 19, 2021Updated 5 years ago
- RCE Exploit For Maltrail-v0.53☆56Oct 29, 2023Updated 2 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆62Nov 16, 2022Updated 3 years ago
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 3 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ".ashx" Web Shell☆16Aug 18, 2014Updated 11 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆30Mar 27, 2025Updated last year
- ☆20Nov 14, 2024Updated last year
- Windows Privilege Escalation☆23Jun 7, 2022Updated 3 years ago
- make large concurrent requests on tcp socket, can be used as pressure test☆22Apr 13, 2017Updated 8 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 7 months ago
- Static analysis tools for all programming languages☆13Jul 19, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆19Mar 11, 2023Updated 3 years ago
- “谛听”(discern)资产识别分析平台,一个简化版的物联网设备信息安全搜索引擎,IOT—Scanner的迭代优化版本。目前集成了主机发现、端口扫描、设备识别、漏洞匹配、poc验证等功能。☆17Feb 6, 2021Updated 5 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- ☆16May 22, 2015Updated 10 years ago
- Get a reverse shell using PostgreSQL☆21Aug 16, 2024Updated last year
- ☆12Jan 26, 2019Updated 7 years ago
- Hession-Deserialize-RCE 反序列化命令执行☆24Dec 27, 2019Updated 6 years ago