unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
thetrueartist/ABO.CMS-Login-SQLi-CVE-2024-25227
Create: 2024-02-23 16:46:54 +0000 UTC Push: 2024-03-13 19:43:44 +0000 UTC |
RandomRobbieBF/CVE-2020-36730
CMP - Coming Soon & Maintenance < 3.8.2 - Improper Access Controls on AJAX Calls (Subscriber+)
Create: 2024-02-23 15:29:41 +0000 UTC Push: 2024-02-23 15:29:42 +0000 UTC |
Twroza2/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Create: 2024-02-23 12:34:04 +0000 UTC Push: 2024-02-23 12:36:00 +0000 UTC |
Twroza2/Hta-Exploit-Builder-Slient-Builder-Exploit-Database-Cve-2023-Malware
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Create: 2024-02-23 12:34:04 +0000 UTC Push: 2024-02-23 12:35:19 +0000 UTC |
Twroza2/Slient-Url-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Create: 2024-02-23 12:34:03 +0000 UTC Push: 2024-02-23 12:36:06 +0000 UTC |
Twroza2/Slient-PDF-FUD-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Create: 2024-02-23 12:34:03 +0000 UTC Push: 2024-02-23 12:35:53 +0000 UTC |
ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırılan bu güvenlik açığı, yerel NTLM bilgilerinin potansiyel sızıntısı ve uzaktan kod çalıştırma olasılığı dahil olmak üzere geniş kapsamlı etkilere sahiptir.
Create: 2024-02-23 12:13:11 +0000 UTC Push: 2024-02-23 12:13:11 +0000 UTC |
sharpicx/CVE-2024-1651-PoC
Python script to automate generic gadget chain from CVE-2024-1651. There's missed length and nullbytes URL Encoding.
Create: 2024-02-23 11:04:24 +0000 UTC Push: 2024-02-23 11:04:24 +0000 UTC |
shellfeel/CVE-2024-22243-CVE-2024-22234
env of CVE-2024-22243&CVE-2024-22234
Create: 2024-02-23 10:09:51 +0000 UTC Push: 2024-02-23 10:10:35 +0000 UTC |
hungdnvp/POC-CVE-2020-0796
Create: 2024-02-23 08:41:29 +0000 UTC Push: 2024-02-23 08:41:30 +0000 UTC |
nahid0x1/CVE-2020-0096-strandhogg-exploit-p0c
Android Application Task Hijacking Aka Strandhogg Attack Exploit
Create: 2024-02-22 20:55:46 +0000 UTC Push: 2024-02-22 20:55:47 +0000 UTC |
RandomRobbieBF/CVE-2023-51409
AI Engine: ChatGPT Chatbot <= 1.9.98 - Unauthenticated Arbitrary File Upload via rest_upload
Create: 2024-02-22 16:26:57 +0000 UTC Push: 2024-02-22 16:26:58 +0000 UTC |
K3ysTr0K3R/CVE-2022-33891-EXPLOIT
Create: 2024-02-22 15:05:00 +0000 UTC Push: 2024-02-22 15:05:00 +0000 UTC |
Tornad0007/CVE-2024-25600
This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands.
Create: 2024-02-22 10:53:45 +0000 UTC Push: 2024-02-22 10:53:45 +0000 UTC |
Tornad0007/CVE-2024-25600-Bricks-Builder-plugin-for-WordPress
This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands.
Create: 2024-02-22 10:53:45 +0000 UTC Push: 2024-02-22 10:54:26 +0000 UTC |
ek3nk4r/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Create: 2024-02-22 10:51:50 +0000 UTC Push: 2024-02-22 10:48:57 +0000 UTC |
ek3nk4r/Hta-Exploit-Builder-Slient-Builder-Exploit-Database-Cve-2023-Malware
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Create: 2024-02-22 10:51:40 +0000 UTC Push: 2024-02-22 10:48:01 +0000 UTC |
ek3nk4r/Slient-Url-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Create: 2024-02-22 10:51:25 +0000 UTC Push: 2024-02-22 10:42:08 +0000 UTC |
ek3nk4r/Slient-PDF-FUD-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Create: 2024-02-22 10:46:42 +0000 UTC Push: 2024-02-22 10:45:35 +0000 UTC |
pwndorei/CVE-2024-22532
Create: 2024-02-22 10:44:38 +0000 UTC Push: 2024-02-22 10:45:13 +0000 UTC |
Previous
175
176
177
178
179
180
181
182
Next