xchg2pwn / ExploitDevelopmentLinks
Exploits for some windows binaries :)
☆53Updated 2 months ago
Alternatives and similar repositories for ExploitDevelopment
Users that are interested in ExploitDevelopment are comparing it to the libraries listed below
Sorting:
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆91Updated 2 years ago
- Exploits for some linux binaries :)☆37Updated 2 months ago
- Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager rol…☆20Updated 4 years ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆67Updated last year
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆30Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Updated 3 years ago
- POC for CVE-2021-41091☆65Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆61Updated 3 months ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆135Updated 2 years ago
- This repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach i…☆89Updated 4 years ago
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆20Updated 4 years ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- CVE-2023-2255 Libre Office☆63Updated 2 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated 2 years ago
- MOVEit CVE-2023-34362☆139Updated 2 years ago
- CVE-2024-3400 Palo Alto OS Command Injection☆161Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆44Updated 2 years ago
- post/windows/manage/enable_rdp Metaploit module in Command prompt module☆36Updated 6 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆105Updated 3 weeks ago
- 「 🚪」Linux Backdoor based on ICMP protocol☆63Updated last year
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆26Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
- Exploit to dump ipmi hashes☆37Updated 2 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆129Updated 2 years ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7☆144Updated 3 years ago
- CVE-2023-33733 reportlab RCE☆119Updated 2 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29Updated 7 years ago