Millhouse Remote code execution exploit
-
Updated
May 12, 2023 - PHP
Millhouse Remote code execution exploit
an rce Vulnerability finder or affirmator
Scanning via nmap and performing a RCE (Remote Code Execution) attack on the SMB port using Metasploit. Using netstat to detect the attack. Using Wireshark to analyze the malicious payload. Deploying and configuring Suricata (IDS/IPS) to alert when the attack happens again
Python3 shellshock exploit, for ethical hacking/pentesting purposes only. Use it at your own risk. I'm not responisble if you use it with illegal purposes.
npm PoC packages
This is a script written in Python that allows the exploitation of the Zoneminder's security flaw described in CVE 2023-26035.
Automatic Shell Uploader Used phpunit() Remote Code Executions (RCE)
A PoC exploit for CVE-2024-29269 - Telesquare TLR-2005KSH Remote Code Execution (RCE)
Issabel PBX 4.0.0 Remote Code Execution (Authenticated) - CVE-2024-0986
This module implements a shell to exploit a RCE in umbraco CMS.
A PoC exploit for CVE-2024-3273 - D-Link Remote Code Execution RCE
This is a exploitation for CodiMD.
LFI / RCE Unauthenticated - Apache 2.4.49 & 2.4.50
Metabase Pre-auth RCE (CVE-2023-38646)
Ivanti Connect Secure & Ivanti Policy Secure allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. (RCE Exploits)
A PoC exploit for CVE-2014-6271 - Shellshock
Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using different approaches.
Add a description, image, and links to the rce-exploit topic page so that developers can more easily learn about it.
To associate your repository with the rce-exploit topic, visit your repo's landing page and select "manage topics."