There are no reviews yet. Be the first to send feedback to the community and the maintainers!
CVE-2020-15906
Writeup of CVE-2020-15906CVE-2020-11107
This is a writeup for CVE-2020-11107 reported by Maximilian BarzAuto_LFI
A simple Script which tests for LFI (Local File Inclusion) via CurlSuidsploit
A Tool which can exploit 137 files from GTFO-Bins automaticllyAuto_wpscan
A little bash script to automaticlly enumerate wordpress Users and Wordpress VulnerabillitiesSilcrypt
A Simple python Ransomwarehelios
An Rce Exploit through Maillog poisioning + a local file inclusion for the symfonos machine on vulnhubSecCloud
Sick-Os-1.2-Remote-Root-Exploit
https://www.youtube.com/watch?v=bpbSdgK0SfEZabbix-AutoExploiter
Zabbix 2.2 < 3.0.3 - API JSON-RPC Remote Code Execution Exploit Tool which allows to add a new SuperAdmin User via the zabbix API and theire default creds. Including a Tool to execute a low PrivShellDC-5-boot2root-exploit
roots after it boots :DAuto_Steg
A simple Bash program which bruteorces JPG-Files with SteghideInstagrambot-ID-Converter
Program which converts converts Usernames to its IDs, also including an Instagrambot which automaticly follows and unfollows per Instagram IDs ..... Credits to linux_choiceWeatherstation-Projekt
Silk
Linux Rootkit for Post-Exploitationairgeddon_fritzbox_et_captive_portal_plugin
A captive portal plugin to phish Fritz!Box network credentialskioptrix-2-Boot2Root-Exploit
Does what its name saysCompile-C-to-Wasm-
Compile C to Wasm and display an Image in the BrowserCVE-2020-29254
TikiWiki 21.2 allows to edit templates without the use of a CSRF protection.SharpWinAPI
Custom C# Implementations for WinAPI FunctionsCVE-2021-24884
If an authenticated user who is able to edit Wordpress PHP code in any kind, clicks a malicious link, PHP code can be edited through XSS in Formidable Forms 4.09.04.remote-bufferoverflow-exploit-template
The first one is a simple Remote bufferoverflow Exploit Template. The Second one is a remote return 2 LiBC(through SSH) Exploit Templatepgadmin4-decryptor
decrypts pgadmin4 user hashesLove Open Source and this site? Check out how you can help us