unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
rvizx/CVE-2023-40028
CVE-2023-40028 PoC Exploit
Create: 2024-12-28 21:17:08 +0000 UTC Push: 2024-12-28 21:17:09 +0000 UTC |
Nxploited/CVE-2024-9234
Create: 2024-12-28 11:00:02 +0000 UTC Push: 2024-12-28 11:00:03 +0000 UTC |
inb1ts/CVE-2024-11616
PoC for exploiting Netskope Endpoint DLP double-fetch for crash
Create: 2024-12-28 10:48:23 +0000 UTC Push: 2024-12-28 10:48:40 +0000 UTC |
murdok1982/Exploit-PoC-para-CVE-2024-30085
Exploit en Python diseñado para aprovechar la vulnerabilidad de elevación de privilegios CVE-2024-30085
Create: 2024-12-28 10:03:26 +0000 UTC Push: 2024-12-28 10:03:48 +0000 UTC |
TuanCui22/CVE-2020-1472-Zerologon-impacket-2024
updated packages and libraries to demo CVE-2020-1472 ZeroLogon in 2024.
Create: 2024-12-28 01:58:26 +0000 UTC Push: 2024-12-28 01:58:26 +0000 UTC |
TuanCui22/CVE-2020-1472-Zerologon-and-Impacket-2024
updated packages and libraries to demo CVE-2020-1472 ZeroLogon in 2024.
Create: 2024-12-28 01:58:26 +0000 UTC Push: 2024-12-28 02:12:17 +0000 UTC |
TuanCui22/ZerologonWithImpacket-CVE2020-1472
This project combines the Zerologon vulnerability exploit (CVE-2020-1472) with Impacket tools for streamlined exploitation and post-exploitation activities. It allows penetration testers to assess and demonstrate the impact of this critical vulnerability in a controlled and authorized environment.
Create: 2024-12-28 01:58:26 +0000 UTC Push: 2024-12-28 02:12:17 +0000 UTC |
0dayan0n/RCE_CVE-2024-7954-
The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. (CRITICAL)
Create: 2024-12-28 01:05:05 +0000 UTC Push: 2024-12-28 01:05:05 +0000 UTC |
danielduan2002/CVE-2021-26690
Create: 2024-12-27 19:41:05 +0000 UTC Push: 2024-12-27 19:41:05 +0000 UTC |
Victorique-123/CVE-2023-38829-NETIS-WF2409E_Report
Create: 2024-12-27 18:09:13 +0000 UTC Push: 2024-12-27 18:09:13 +0000 UTC |
Nxploited/CVE-2024-9933
Create: 2024-12-27 11:03:42 +0000 UTC Push: 2024-12-27 11:03:42 +0000 UTC |
w0r1i0g1ht/CVE-2024-45440
Drupal CVE-2024-45440
Create: 2024-12-26 13:35:42 +0000 UTC Push: 2024-12-26 13:35:42 +0000 UTC |
yoohhuu/Rocket-Chat-3.12.1-PoC-CVE-2021-22911-
Create: 2024-12-26 10:27:51 +0000 UTC Push: 2024-12-26 10:27:52 +0000 UTC |
yaseenibnakhtar/Malware-Analysis-CVE-2017-11882
Malware Analysis CVE-2017-11882
Create: 2024-12-26 06:23:27 +0000 UTC Push: 2024-12-26 06:23:27 +0000 UTC |
AleksaZatezalo/CVE-2020-14882-HoaxShell
Create: 2024-12-26 04:45:46 +0000 UTC Push: 2024-12-26 04:45:46 +0000 UTC |
AleksaZatezalo/CVE-2020-14882
Create: 2024-12-26 04:45:46 +0000 UTC Push: 2024-12-27 03:02:44 +0000 UTC |
Nxploited/CVE-2024-9935
Create: 2024-12-25 22:59:07 +0000 UTC Push: 2024-12-25 22:59:08 +0000 UTC |
bigb0x/CVE-2024-50379
Testing the latset Apache Tomcat CVE-2024-50379 Vuln
Create: 2024-12-25 21:50:16 +0000 UTC Push: 2024-12-25 21:50:17 +0000 UTC |
dragonked2/CVE-2024-50379-POC
This repository contains a Python script designed to exploit CVE-2024-50379, a vulnerability that allows attackers to upload a JSP shell to a vulnerable server and execute arbitrary commands remotely. This exploit is particularly useful when the /uploads directory is either unprotected or not present on the target server.
Create: 2024-12-25 18:42:29 +0000 UTC Push: 2024-12-25 18:42:29 +0000 UTC |
McTavishSue/CVE-2024-11281
Missing Authorization (CWE-862)
Create: 2024-12-25 18:38:46 +0000 UTC Push: 2024-12-25 18:38:47 +0000 UTC |
Previous
-20
-19
-18
-17
-16
-15
-14
-13
Next