v1k1ngfr / exploits-rconfigView external linksLinks
Exploit codes for rconfig <= 3.9.4
☆12Mar 17, 2020Updated 5 years ago
Alternatives and similar repositories for exploits-rconfig
Users that are interested in exploits-rconfig are comparing it to the libraries listed below
Sorting:
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 10 months ago
- A simple reverse and as well a webshell that recognices the OS (Windows/Linux).☆16Nov 11, 2020Updated 5 years ago
- LimeSurvey Authenticated RCE☆23Jul 16, 2023Updated 2 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆37Jul 12, 2023Updated 2 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- driver manual mapper☆12Feb 22, 2020Updated 5 years ago
- POC for CVE-2020-13151☆38Aug 3, 2020Updated 5 years ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 5 months ago
- ☆11Nov 16, 2025Updated 3 months ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated last year
- Some tools☆10Dec 5, 2017Updated 8 years ago
- ExploitDB toolkit ExploitDB辅助工具☆11Jul 27, 2021Updated 4 years ago
- So you want to fix a raw .net file manually ? I got it!, Let's fix RVA and Sizes, Relocations, EP, IAT, Metadata Dir, Directory, BSJB, In…☆10Aug 8, 2022Updated 3 years ago
- ☆11Jan 8, 2022Updated 4 years ago
- 实用性的脚本: Python Shell Bat☆10Mar 12, 2025Updated 11 months ago
- 一键激活Windows的KMS bat激活脚本☆15May 13, 2019Updated 6 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- Something To Do Android Application Security Research☆10May 14, 2021Updated 4 years ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆15Feb 1, 2026Updated 2 weeks ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 8 years ago
- CTF writeups by ./Vespiary☆16Nov 12, 2023Updated 2 years ago
- 内含13种poc,数据包自动解析,扫描☆10Jan 8, 2020Updated 6 years ago
- CodeQL and Binary Ninja scripts to accompany the blog post☆11Feb 3, 2023Updated 3 years ago
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆39Apr 15, 2017Updated 8 years ago
- ☆12Aug 3, 2024Updated last year
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- A windows kernel-mode rootkit with remote control☆12Sep 17, 2022Updated 3 years ago
- ...Webshell☆16Jul 2, 2020Updated 5 years ago
- Nightshade is a Windows Memory Manipluation library specifically for injecting DLLs and Game Hacking☆13Dec 12, 2022Updated 3 years ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated last year
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- SIP protocol command line sniffer☆13Apr 16, 2020Updated 5 years ago
- 甲方企业安全建设开源之路☆10Oct 11, 2018Updated 7 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated 9 months ago
- CVE-2018-19320 LPE Exploit☆10Jun 19, 2023Updated 2 years ago