• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

bypass

  1. 1

    Exploits Zabbix 4.4 Authentication Bypass

    Zabbix versions 4.4 and below authentication bypass demo proof of concept exploit. View the full article
  2. 1

    Exploits Zabbix 4.2 Authentication Bypass

    Zabbix version 4.2 suffers from an authentication bypass vulnerability. View the full article
  3. 1

    Exploits IcedTeaWeb Validation Bypass / Directory Traversal / Code Execution

    IcedTeaWeb suffers from multiple vulnerabilities including directory traversal and validation bypass issues that can lead to remote code execution. The affected versions are 1.7.2 and below, 1.8.2 and below. 1.6 is also vulnerable and not patched due to being EOL. Proof of concepts are provided...
  4. 1

    Exploits PHP 7.3 disable_functions Bypass

    PHP versions 7.0 through 7.3 disable_functions proof of concept exploit. View the full article
  5. 1

    Exploits PHP 7.x disable_functions Bypass

    PHP versions 7.1 up to 7.3 suffer from a disable_functions bypass vulnerability. View the full article
  6. 0x1

    UAC Bypass in Windows Store Binary

    Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe) Metasploit Module Hidden content Powershell Code Hidden content Code in C Hidden content    
  7. 1

    Exploits Microsoft Windows Internet Settings Security Feature Bypass

    Microsoft Windows suffers from an Internet Settings misconfiguration security feature bypass vulnerability. Versions affected include Windows 7 SP1, 8.0, 8.1 x86 and x64 with full patches up to July 2019. View the full article
  8. itsMe

    UAC Escaper | Bypass Widnows UAC + Source

    UAC Escaper v0.1 This is an old method to bypass UAC. I created this simple builder to make it easy to compile without the need for IDE. Just drop and drag your file to make it bypass UAC. Tested on win7 64bit SP1 + win10 64bit "latest version" Hidden content
  9. 1

    Exploits College-Management-System 1.2 Authentication Bypass

    College-Management-System version 1.2 suffers from an authentication bypass vulnerability. View the full article
  10. 1

    Exploits Ticket-Booking 1.4 Authentication Bypass

    Ticket-Booking version 1.4 suffers from an authentication bypass vulnerability. View the full article
  11. itsMe

    C# Three Tricks To Bypass AMSI Windows Defender

    Hidden content by Bashar Bachir
  12. 1

    Exploits eWON Flexy 13.0 Authentication Bypass

    eWON Flexy with firmware version 13.0 suffers from an authentication bypass vulnerability. View the full article
  13. 1

    Exploits October CMS Upload Protection Bypass Code Execution

    This Metasploit module exploits an Authenticated user with permission to upload and manage media contents can upload various files on the server. Application prevents the user from uploading PHP code by checking the file extension. It uses black-list based approach, as seen in...
  14. 1

    Exploits Microsoft Windows 10 UAC Protection Bypass Via Windows Store

    This Metasploit module exploits a flaw in the WSReset.exe Windows Store Reset Tool. The tool is run with the "autoElevate" property set to true, however it can be moved to a new Windows directory containing a space (C:\Windows \System32\) where, upon execution, it will load our payload dll...
  15. 1

    Exploits Windows 10 UAC Protection Bypass Via Windows Store (WSReset.exe) And Registry

    This Metasploit module exploits a flaw in the WSReset.exe file associated with the Windows Store. This binary has autoelevate privs, and it will run a binary file contained in a low-privilege registry location. By placing a link to the binary in the registry location, WSReset.exe will launch the...
  16. 1

    Exploits Sentrifugo 3.2 File Upload Restriction Bypass

    Sentrifugo version 3.2 suffers from a file upload restriction bypass vulnerability. View the full article
  17. 1

    Exploits Cisco UCS / IMC Supervisor Authentication Bypass / Command Injection

    Cisco UCS Director, Cisco Integrated Management Controller Supervisor and Cisco UCS Director Express for Big Data suffer from default password, authentication bypass, and command injection vulnerabilities. View the full article
  18. 1

    Exploits Microsoft Office365 / ProPlus 16.0.11901.20204 Code Execution / Protection Bypass

    Microsoft Office365 and ProPlus build 16.0.11901.20204 suffers from code execution and protection bypass vulnerabilities. View the full article
  19. 1

    Exploits D-Link DIR-600M Wireless N 150 Home Router Access Bypass

    A remote vulnerability was discovered on D-Link DIR-600M Wireless N 150 Home Router in multiple respective firmware versions. The vulnerability provides unauthenticated remote access to the router's WAN configuration page i.e. "wan.htm", which leads to disclosure of sensitive user information...
  20. dEEpEst

    ByPass Spymax on Google Play Protect

    Hidden content
Back
Top