xchg2pwn / BinaryExploitationLinks
Exploits for some linux binaries :)
☆36Updated 6 months ago
Alternatives and similar repositories for BinaryExploitation
Users that are interested in BinaryExploitation are comparing it to the libraries listed below
Sorting:
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- Exploits for some windows binaries :)☆47Updated 6 months ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- Basic script to generate reverse shell payloads, generally most used in ctf.☆28Updated last year
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆36Updated last year
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆18Updated 9 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆40Updated 2 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last month
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆83Updated 4 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year
- aiohttp LFI (CVE-2024-23334)☆27Updated last year
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆18Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆24Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated 11 months ago
- Automate converting webshells into reverse shells.☆69Updated 3 weeks ago
- Repo for all my exploits/PoCs☆51Updated 2 months ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Updated 7 months ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆58Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆66Updated 9 months ago
- ☆15Updated last year
- purplestorm writeup collection☆22Updated this week
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 10 months ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 2 years ago