![]() ![]() Zero Day revshell exploit tool for Remote Code Execution vulnerability found in Telegram's bot api broadcast_msg api call. Signal RCE vulnerability found in contact exchange API : researchkendra91/signal-zeroday-exploit create time: : darthvander20/discord-zero-day-exploit create time: Zero day exploit that abuses a remote code execution vulnerability in Discord send_emoji API call. No description : zPrototype/CVE-2023-29808 create time: : darthvander20/whatsapp-zero-day-exploit create time: Zero day exploit that abuses the send_reaction api call to obtain a reverse shell on the targets device. No description : asepsaepdin/CVE-2021-1732 create time: ĭownload Monitor =1.2.22 : MarkStrendin/CVE-2022-46169 create time: Search vulnerable FortiOS devices via Shodan (CVE-2023-27997) : TechinsightsPro/ShodanFortiOS create time: Python script that generates pfs payloads to exploit CVE-2022-4510 : Kalagious/BadPfs create time: Automatic monitor github cve using Github Actions ¶ ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |