wetw0rk / Exploit-Development
CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002
☆66Updated 2 months ago
Alternatives and similar repositories for Exploit-Development:
Users that are interested in Exploit-Development are comparing it to the libraries listed below
- Some exploits, which I’ve created during my OSCE preparation.☆82Updated 6 years ago
- Used for the osce exam preparation☆74Updated 9 years ago
- sploit☆68Updated 5 years ago
- Jackson Rce For CVE-2019-12384☆98Updated 5 years ago
- ☆63Updated 5 years ago
- with metasploit☆63Updated 4 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Updated 4 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32Updated 6 years ago
- CVE-2019-0604☆134Updated 6 years ago
- Full TTY reverse shell over SSH☆58Updated 4 years ago
- rce exploit , made to work with pocsuite3☆119Updated 5 years ago
- Custom THP Dropper☆26Updated 7 years ago
- Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container☆46Updated 11 months ago
- Poc for CVE-2019-1253☆155Updated 3 years ago
- CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13☆63Updated 5 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆174Updated 4 years ago
- cve-2019-0604 SharePoint RCE exploit☆100Updated 5 years ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆148Updated last year
- GodOfWar - Malicious Java WAR builder with built-in payloads☆122Updated 6 years ago
- Burp Suite Attack Selector Plugin☆61Updated 7 years ago
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Updated 9 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 4 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- ☆42Updated 6 years ago
- POC for Cobalt Strike external C2☆132Updated 3 years ago
- Script for pentest☆39Updated 4 years ago
- Python api for usage with cobalt strike's External C2 specification☆228Updated 2 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53Updated 5 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆126Updated 2 years ago