• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

execution

  1. dEEpEst

    Execution logging and tracing

    Execution logging and tracing  • Wireshark - A free and open-source packet analyzer  • tcpdump - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture  • mitmproxy - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a...
  2. itsMe

    Jektor Toolkit: Windows user-mode shellcode execution tool

    Jektor Toolkit v1.0 This utility focuses on shellcode injection techniques to demonstrate methods that malware may use to execute shellcode on a victim system      Dynamically resolves API functions to evade IAT inclusion      Includes usage of undocumented NT Windows API functions     ...
  3. itsMe

    WMIHACKER: Bypass anti-virus software lateral movement command execution test tool

    Bypass anti-virus software lateral movement command execution test tool(No need 445 Port) Introduction: The common WMIEXEC, PSEXEC tool execution command is to create a service or call Win32_Process.create, these methods have been intercepted by Anti-virus software 100%, so we created WMIHACKER...
  4. dEEpEst

    Trusty OS [Trusted Execution Environment for Android]

    Trusty is a secure Operating System (OS) that provides a Trusted Execution Environment (TEE) for Android. The Trusty OS runs on the same processor as the Android OS, but Trusty is isolated from the rest of the system by both hardware and software. Trusty and Android run parallel to each other...
  5. 1

    Exploits Apache Solr 8.2.0 Remote Code Execution

    Apache Solr version 8.2.0 suffers from a remote code execution vulnerability. View the full article
  6. 1

    Exploits Nostromo 1.9.6 Directory Traversal / Remote Command Execution

    This Metasploit module exploits a remote command execution vulnerability in Nostromo versions 1.9.6 and below. This issue is caused by a directory traversal in the function http_verify in nostromo nhttpd allowing an attacker to achieve remote code execution via a crafted HTTP request. View the...
  7. 1

    Exploits Ajenti 2.1.31 Remote Code Execution

    This Metasploit module exploits a command injection vulnerability in Ajenti versions 2.1.31 and below. By injecting a command into the username POST parameter to api/core/auth, a shell can be spawned. View the full article
  8. 1

    Exploits Microsoft Windows Server 2012 Group Policy Remote Code Execution

    Microsoft Windows Server 2012 suffers from a Group Policy remote code execution vulnerability. View the full article
  9. 1

    Exploits rConfig 3.9.2 Remote Code Execution

    rConfig version 3.9.2 suffers from a remote code execution vulnerability. View the full article
  10. 1

    Exploits PHP-FPM Remote Code Execution

    This is a newer method to exploit php-fpm to achieve remote code execution when certain nginx with php-fpm configurations exist. View the full article
  11. 1

    Exploits Rusty Joomla Unauthenticated Remote Code Execution

    This Metasploit module exploits a PHP object injection vulnerability in Joomla version 3.4.6. View the full article
  12. 1

    Exploits Trend Micro Anti-Threat Toolkit (ATTK) 1.62.0.1218 Remote Code Execution

    Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below suffer from a remote code execution vulnerability. View the full article
  13. 1

    Exploits Whatsapp 2.19.216 Remote Code Execution

    Whatsapp version 2.19.216 suffers from a remote code execution vulnerability. View the full article
  14. 1

    Exploits Podman / Varlink Remote Code Execution

    Remote exploit for Podman when configured with Varlink that allows for remote command execution, denial of service, directory traversal, and information disclosure vulnerabilities. View the full article
  15. 1

    Exploits ASUS RT-N10+ 2.0.3.4 CSRF / XSS / Command Execution

    ASUS RT-N10+ with firmware version 2.0.3.4 suffers from cross site request forgery and cross site scripting vulnerabilities that can assist with achieving command execution. View the full article
  16. 1

    Exploits Ajenti Remote Command Execution

    Ajenti suffers from a remote command execution vulnerability. View the full article
  17. 1

    Exploits vBulletin 5.5.4 Remote Code Execution

    vBulletin versions 5.5.4 and below suffers from an updateAvatar remote code execution vulnerability. View the full article
  18. 1

    Exploits IcedTeaWeb Validation Bypass / Directory Traversal / Code Execution

    IcedTeaWeb suffers from multiple vulnerabilities including directory traversal and validation bypass issues that can lead to remote code execution. The affected versions are 1.7.2 and below, 1.8.2 and below. 1.6 is also vulnerable and not patched due to being EOL. Proof of concepts are provided...
  19. 1

    Exploits IBM Bigfix Platform 9.5.9.62 Arbitary File Upload / Code Execution

    IBM Bigfix Platform version 9.5.9.62 suffers from an arbitrary file upload vulnerability as root that can achieve remote code execution. View the full article
  20. 1

    Exploits Joomla 3.4.6 Remote Code Execution

    Joomla versions 3.0.0 through 3.4.6 suffer from a remote code execution vulnerability in configuration.php. View the full article
Back
Top