wetw0rk / Exploit-Development
CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002
☆66Updated 3 months ago
Alternatives and similar repositories for Exploit-Development:
Users that are interested in Exploit-Development are comparing it to the libraries listed below
- sploit☆68Updated 5 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32Updated 6 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆83Updated 6 years ago
- Used for the osce exam preparation☆74Updated 9 years ago
- Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container☆47Updated last year
- Custom THP Dropper☆26Updated 7 years ago
- CVE-2019-0604☆134Updated 6 years ago
- ☆63Updated 5 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Updated 4 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53Updated 5 years ago
- Jackson Rce For CVE-2019-12384☆99Updated 5 years ago
- guest→system(UAC手动提权)☆74Updated 5 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 4 years ago
- Script for pentest☆39Updated 4 years ago
- Full TTY reverse shell over SSH☆58Updated 4 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆145Updated 5 years ago
- CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13☆63Updated 5 years ago
- Python api for usage with cobalt strike's External C2 specification☆236Updated 2 years ago
- Some personal exploits/pocs☆54Updated 4 years ago
- with metasploit☆63Updated 5 years ago
- cve-2019-0604 SharePoint RCE exploit☆100Updated 5 years ago
- rce exploit , made to work with pocsuite3☆119Updated 5 years ago
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Updated 9 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Updated 11 years ago
- Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect☆132Updated 3 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆76Updated 7 years ago
- POC for Cobalt Strike external C2☆133Updated 3 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆126Updated 2 years ago