There are no reviews yet. Be the first to send feedback to the community and the maintainers!
shellphishSS
Phishing Tool for Instagram, Facebook, Twitter, Snapchat, Github, Yahoo, Protonmail, Google, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers PhisherCVE-2020-15906
Writeup of CVE-2020-15906CVE-2020-11107
This is a writeup for CVE-2020-11107 reported by Maximilian BarzAuto_LFI
A simple Script which tests for LFI (Local File Inclusion) via CurlSuidsploit
A Tool which can exploit 137 files from GTFO-Bins automaticllyAuto_wpscan
A little bash script to automaticlly enumerate wordpress Users and Wordpress VulnerabillitiesSilcrypt
A Simple python Ransomwarehelios
An Rce Exploit through Maillog poisioning + a local file inclusion for the symfonos machine on vulnhubSecCloud
Sick-Os-1.2-Remote-Root-Exploit
https://www.youtube.com/watch?v=bpbSdgK0SfEZabbix-AutoExploiter
Zabbix 2.2 < 3.0.3 - API JSON-RPC Remote Code Execution Exploit Tool which allows to add a new SuperAdmin User via the zabbix API and theire default creds. Including a Tool to execute a low PrivShellDC-5-boot2root-exploit
roots after it boots :DAuto_Steg
A simple Bash program which bruteorces JPG-Files with SteghideInstagrambot-ID-Converter
Program which converts converts Usernames to its IDs, also including an Instagrambot which automaticly follows and unfollows per Instagram IDs ..... Credits to linux_choiceWeatherstation-Projekt
Silk
Linux Rootkit for Post-Exploitationairgeddon_fritzbox_et_captive_portal_plugin
A captive portal plugin to phish Fritz!Box network credentialskioptrix-2-Boot2Root-Exploit
Does what its name saysCVE-2020-29254
TikiWiki 21.2 allows to edit templates without the use of a CSRF protection.SharpWinAPI
Custom C# Implementations for WinAPI FunctionsCVE-2021-24884
If an authenticated user who is able to edit Wordpress PHP code in any kind, clicks a malicious link, PHP code can be edited through XSS in Formidable Forms 4.09.04.remote-bufferoverflow-exploit-template
The first one is a simple Remote bufferoverflow Exploit Template. The Second one is a remote return 2 LiBC(through SSH) Exploit Templatepgadmin4-decryptor
decrypts pgadmin4 user hashesLove Open Source and this site? Check out how you can help us