xchg2pwn / ExploitDevelopment
Exploits for some windows binaries :)
☆46Updated 2 months ago
Alternatives and similar repositories for ExploitDevelopment:
Users that are interested in ExploitDevelopment are comparing it to the libraries listed below
- Exploits for some linux binaries :)☆36Updated 2 months ago
- Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager rol…☆20Updated 3 years ago
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆13Updated 4 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆48Updated 3 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 5 months ago
- Exploit to dump ipmi hashes☆32Updated last year
- Blog personal sobre resolución de CTF's, artículos y demás cosas locas en ciberseguridad :)☆16Updated last month
- Malicious Macro Generator for LibreOffice/OpenOffice☆25Updated 2 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated 2 months ago
- POC for CVE-2021-41091☆65Updated last year
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆51Updated last year
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆85Updated last year
- Simple HTTP listener for security testing☆113Updated 4 months ago
- post/windows/manage/enable_rdp Metaploit module in Command prompt module☆28Updated 5 years ago
- Automatic reverse/bind shell generator cheat sheet.☆35Updated 2 years ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆12Updated last year
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆35Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆72Updated 6 months ago
- This is poc of CVE-2022-46169 authentication bypass and remote code execution☆16Updated last year
- CVE-2023-2255 Libre Office☆57Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆82Updated last year
- A solution to create obfuscated reverse shells for PowerShell.☆76Updated 2 years ago
- A tool for mapping cypher databases☆15Updated last year
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- Get a reverse shell using PostgreSQL☆17Updated 7 months ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆30Updated last year
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆109Updated last year
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Updated 2 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆63Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 5 months ago