• Stars
    star
    7
  • Rank 2,294,772 (Top 46 %)
  • Language
    Python
  • Created 8 months ago
  • Updated 8 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

This repository contains an exploit for targeting Microsoft Outlook through Exchange Online, leveraging a vulnerability to execute arbitrary code via COM DLLs. The exploit utilizes a modified version of Ruler to send a malicious form as an email, triggering the execution upon user interaction within the Outlook thick client.

More Repositories

1

CVE-2023-36874

This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Windows Error Reporting (WER) component.
C++
76
star
2

CVE-2023-38545

This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.
Python
22
star
3

CVE-2023-30943

This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)
PHP
16
star
4

CVE-2024-6387

This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.
Python
15
star
5

CVE-2024-41107

This repository contains an PoC for the critical vulnerability identified as CVE-2024-41107 in Apache CloudStack
Python
9
star
6

CVE-2024-21762

The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.
Python
7
star
7

CVE-2024-21388

This Python script exploits a vulnerability (CVE-2024-21388) in Microsoft Edge, allowing silent installation of browser extensions with elevated privileges via a private API.
Python
6
star
8

CVE-2024-4439

The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439) in WordPress Core versions up to 6.5.1.
Python
5
star
9

CVE-2023-33242

CVE-2023-33242 PoC
C++
4
star
10

LogoFail-PoC

This is a hypothetical demonstration of the process involved in exploiting LogoFail, it theoretically includes the necessary steps.
Assembly
4
star
11

CVE-2023-36899

CVE-2023-36899 PoC
C++
4
star
12

ADB-IP-ROTATION

Use your mobile phone to gain a temporary IP address using ADB and data tethering.
Python
3
star
13

CVE-2023-42931

The exploit targets a critical privilege escalation vulnerability in macOS versions Monterey, Ventura, and Sonoma.
Python
3
star
14

CVE-2023-37979

CVE-2023-37979 PoC and Checker
Python
2
star
15

CVE-2023-49606

Critical use-after-free vulnerability discovered in Tinyproxy
C
2
star
16

CVE-2024-27130

This Python script is designed as a proof-of-concept (PoC) for the CVE-2024-27130 vulnerability in QNAP QTS
Python
1
star
17

PendoTMDBApp

themoviedb.org native android app
Java
1
star
18

CVE-2023-33246

CVE-2023-33246 POC
Python
1
star
19

CVE-2023-26469

CVE-2023-26469 REC PoC
Python
1
star