Grafana RCE exploit (CVE-2024-9264)
☆39Oct 21, 2024Updated last year
Alternatives and similar repositories for CVE-2024-9264-RCE-Exploit
Users that are interested in CVE-2024-9264-RCE-Exploit are comparing it to the libraries listed below
Sorting:
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆30Mar 27, 2025Updated 11 months ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Tao(道)一款用于java语言函数调用关系生成的工具,致力于提高java代码审计效率。☆11Jul 2, 2024Updated last year
- Read Navicat 12 Password☆19Jun 7, 2020Updated 5 years ago
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆17May 27, 2023Updated 2 years ago
- Impack-only implementation of WinRM protocol with support for NTLM and Kerberos auth☆124Oct 20, 2025Updated 5 months ago
- Proof of Concept for CVE-2025-31161 / CVE-2025-2825☆49Apr 8, 2025Updated 11 months ago
- powershell functions to work with LAPS☆50Sep 17, 2024Updated last year
- Hessian UTF-8 Overlong Encoding☆21Mar 9, 2024Updated 2 years ago
- javaGGC for generate commons.collections gadget chain☆12Nov 10, 2021Updated 4 years ago
- ☆13Jul 22, 2023Updated 2 years ago
- POC for netdata ndsudo vulnerability - CVE-2024-32019☆21Aug 3, 2025Updated 7 months ago
- Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)☆130Dec 16, 2024Updated last year
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.☆126Jul 12, 2024Updated last year
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆14Sep 17, 2025Updated 6 months ago
- CVE-2023-52251 There is a Remote Code Execution vulnerability provectus/kafka-ui.☆20Jan 23, 2024Updated 2 years ago
- Whether you're a seasoned expert or a beginner, Kali GPT helps streamline your workflow, making penetration testing more efficient and ac…☆20Updated this week
- Scanner for CVE-2023-46805 - Ivanti Connect Secure☆10Jul 23, 2024Updated last year
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆34Sep 21, 2024Updated last year
- A post-exploitation tool to decrypt SolarPutty's sessions files☆37Dec 8, 2022Updated 3 years ago
- Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)☆17Aug 2, 2024Updated last year
- ☆50Feb 28, 2026Updated 3 weeks ago
- ☆17Apr 7, 2022Updated 3 years ago
- Keycloak admin API allows low privilege users to use administrative functions☆28Oct 12, 2024Updated last year
- CVE-2017-7529_PoC☆19Jan 7, 2026Updated 2 months ago
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- 基于load data逻辑漏洞的Mysql蜜罐☆23Jul 14, 2025Updated 8 months ago
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆49Feb 28, 2026Updated 3 weeks ago
- RCE Exploit For Maltrail-v0.53☆56Oct 29, 2023Updated 2 years ago
- A proof of concept for CVE-2023–1326 in apport-cli 2.26.0☆21Dec 6, 2023Updated 2 years ago
- A tool for analyzing vulnerabilities in JWT tokens. Advanced JWT Vulnerability Scanner & Exploitation Toolkit☆43Nov 24, 2025Updated 3 months ago
- WonderCMS Authenticated RCE - CVE-2023-41425☆26Dec 30, 2024Updated last year
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 10 months ago
- IDOR bypass fuzz 权限绕过burp 插件 fuzz (shiro 等)☆27Sep 1, 2021Updated 4 years ago
- A tool for mapping cypher databases☆16Jan 20, 2026Updated 2 months ago
- CVE-2023-38646 Metabase RCE☆55Oct 11, 2023Updated 2 years ago
- Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773☆113Mar 12, 2022Updated 4 years ago