unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
ewilded/CVE-2023-38041-POC
Ivanti Pulse Secure Client Connect Local Privilege Escalation CVE-2023-38041 Proof of Concept
Create: 2024-02-25 08:09:17 +0000 UTC Push: 2024-02-25 08:09:41 +0000 UTC |
imhunterand/CVE-2020-3452
Exploitation Scanner CVE-2020-3452 to enumerate the standard files accessible in the Path Traversal of CISCO ASA/FTD .?
Create: 2024-02-25 04:12:59 +0000 UTC Push: 2024-02-25 04:13:45 +0000 UTC |
rxerium/CVE-2023-22515
Passive version detection method for CVE-2023-22515 using Nuclei scanner
Create: 2024-02-24 16:04:35 +0000 UTC Push: 2024-02-24 16:04:35 +0000 UTC |
ewilded/CVE-2024-25376-POC
Create: 2024-02-24 09:30:45 +0000 UTC Push: 2024-02-24 09:31:35 +0000 UTC |
ayrustogaru/cve-2023-39320
Create: 2024-02-24 08:23:42 +0000 UTC Push: 2024-02-24 08:23:42 +0000 UTC |
HussainFathy/CVE-2024-1709
A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability
Create: 2024-02-23 17:26:28 +0000 UTC Push: 2024-02-23 17:26:28 +0000 UTC |
thetrueartist/ABO.CMS-Login-SQLi-CVE-2024-25227
Create: 2024-02-23 16:46:54 +0000 UTC Push: 2024-03-13 19:43:44 +0000 UTC |
RandomRobbieBF/CVE-2020-36730
CMP - Coming Soon & Maintenance < 3.8.2 - Improper Access Controls on AJAX Calls (Subscriber+)
Create: 2024-02-23 15:29:41 +0000 UTC Push: 2024-02-23 15:29:42 +0000 UTC |
Twroza2/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Create: 2024-02-23 12:34:04 +0000 UTC Push: 2024-02-23 12:36:00 +0000 UTC |
Twroza2/Hta-Exploit-Builder-Slient-Builder-Exploit-Database-Cve-2023-Malware
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Create: 2024-02-23 12:34:04 +0000 UTC Push: 2024-02-23 12:35:19 +0000 UTC |
Twroza2/Slient-Url-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Create: 2024-02-23 12:34:03 +0000 UTC Push: 2024-02-23 12:36:06 +0000 UTC |
Twroza2/Slient-PDF-FUD-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Create: 2024-02-23 12:34:03 +0000 UTC Push: 2024-02-23 12:35:53 +0000 UTC |
ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırılan bu güvenlik açığı, yerel NTLM bilgilerinin potansiyel sızıntısı ve uzaktan kod çalıştırma olasılığı dahil olmak üzere geniş kapsamlı etkilere sahiptir.
Create: 2024-02-23 12:13:11 +0000 UTC Push: 2024-02-23 12:13:11 +0000 UTC |
sharpicx/CVE-2024-1651-PoC
Python script to automate generic gadget chain from CVE-2024-1651. There's missed length and nullbytes URL Encoding.
Create: 2024-02-23 11:04:24 +0000 UTC Push: 2024-02-23 11:04:24 +0000 UTC |
shellfeel/CVE-2024-22243-CVE-2024-22234
env of CVE-2024-22243&CVE-2024-22234
Create: 2024-02-23 10:09:51 +0000 UTC Push: 2024-02-23 10:10:35 +0000 UTC |
hungdnvp/POC-CVE-2020-0796
Create: 2024-02-23 08:41:29 +0000 UTC Push: 2024-02-23 08:41:30 +0000 UTC |
nahid0x1/CVE-2020-0096-strandhogg-exploit-p0c
Android Application Task Hijacking Aka Strandhogg Attack Exploit
Create: 2024-02-22 20:55:46 +0000 UTC Push: 2024-02-22 20:55:47 +0000 UTC |
RandomRobbieBF/CVE-2023-51409
AI Engine: ChatGPT Chatbot <= 1.9.98 - Unauthenticated Arbitrary File Upload via rest_upload
Create: 2024-02-22 16:26:57 +0000 UTC Push: 2024-02-22 16:26:58 +0000 UTC |
K3ysTr0K3R/CVE-2022-33891-EXPLOIT
Create: 2024-02-22 15:05:00 +0000 UTC Push: 2024-02-22 15:05:00 +0000 UTC |
Tornad0007/CVE-2024-25600
This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands.
Create: 2024-02-22 10:53:45 +0000 UTC Push: 2024-02-22 10:53:45 +0000 UTC |
Previous
383
384
385
386
387
388
389
390
Next