an rce Vulnerability finder or affirmator
-
Updated
Aug 29, 2023 - Python
an rce Vulnerability finder or affirmator
Millhouse Remote code execution exploit
Scanning via nmap and performing a RCE (Remote Code Execution) attack on the SMB port using Metasploit. Using netstat to detect the attack. Using Wireshark to analyze the malicious payload. Deploying and configuring Suricata (IDS/IPS) to alert when the attack happens again
Python3 shellshock exploit, for ethical hacking/pentesting purposes only. Use it at your own risk. I'm not responisble if you use it with illegal purposes.
npm PoC packages
This is a script written in Python that allows the exploitation of the Zoneminder's security flaw described in CVE-2023-26035.
LFI / RCE Unauthenticated - Apache 2.4.49 & 2.4.50
Metabase Pre-auth RCE (CVE-2023-38646)
Geoserver SQL Injection Exploit
This is a exploitation for CodiMD.
This module implements a shell to exploit a RCE in umbraco CMS.
A PoC exploit for CVE-2024-3273 - D-Link Remote Code Execution RCE
Microsoft Windows 'HTTP.sys' - Remote Code Execution
A PoC exploit for CVE-2014-6271 - Shellshock
PoC of CVE-2024-33883, RCE vulnerability of ejs.
CVE-2022-31814
A Remote Code Execution python script to exploit RiteCMS 2.0
A PoC exploit for CVE-2020-13945 - Apache APISIX Remote Code Execution (RCE)
Add a description, image, and links to the rce-exploit topic page so that developers can more easily learn about it.
To associate your repository with the rce-exploit topic, visit your repo's landing page and select "manage topics."