There are 16 repositories under remote-code-execution topic.
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
CVE-2020-0796 Remote Code Execution POC
Redis 4.x/5.x RCE
Realtime Collaborate Editor with Embedded Compiler
The "bane" Python library stands out as a robust toolkit catering to a wide spectrum of cybersecurity and networking tasks. Its versatile range of functionalities covers various aspects, including bruteforce attacks, cryptographic methods, DDoS attacks, information gathering, botnet creation and management, and CMS vulnerability scanning and more..
Exploit for CVE-2019-9810 Firefox on Windows 64-bit.
Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against malicious threats. Let's delve into the tasks and functions that make Egyscan an indispensable tool in your security arsenal:
Local File Inclusion discovery and exploitation tool
Have you ever wondered how code execution on competitive programming websites like leetcode works? Code that runs code. Tried implementing that.
Simulating Log4j Remote Code Execution (RCE) vulnerability in a flask web server using python's logging library with custom formatter that simulates lookup substitution by executing remote exploit code.
PHP 8.1.0-dev Backdoor System Shell Script
CVE-2022-41852 Proof of Concept (unofficial)
Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution
🚪 Quick & dirty Wordpress Command Execution Shell
SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.
CVE-2023-22515
Juniper Firewalls CVE-2023-36845 - RCE
Connect Box CH7465LG (CVE-2019-13025)
Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)
Atlassian Confluence (CVE-2022-26134) - Unauthenticated Remote code execution (RCE)
A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)
CVE-2023-24489 PoC & Exploiter
CVE-2019–9193 - PostgreSQL 9.3-12.3 Authenticated Remote Code Execution
POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.
PoC for CVE-2021-45897
Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file which allows an unauthenticated user to execute arbitrary code via directory traversal
Blind RCE fuzzer
T-XPLOITER is a Perl program for detect and (even) exploit website(s). Why the name is T-XPLOITER ? T means Triple, XPLOITER means Exploiter. This program has 3 features and functions to detect and (even) exploit website(s), just check it out :).
LeetCode backend, scaleble nodjs backend which runs user submitted code in a containerized code execution envroment, implementaion of RabbitMq RPC, devops assignment of @hkirat