├── .github └── FUNDING.yml ├── HEVD-Exploits ├── 0x01 - Stack Overflow │ ├── Windows 10 (x64) │ │ ├── MiGetPteAddress.c │ │ ├── makefile │ │ ├── poc.c │ │ └── shellcode.asm │ ├── Windows 7 (x86) │ │ └── poc.py │ └── scripts │ │ ├── flip_bit.c │ │ └── get_cr4.c ├── 0x02 - Use After Free (NonpagedPool) │ ├── Windows 11 (x64) - NonPaged │ │ ├── makefile │ │ └── poc.c │ └── Windows 7 (x86) - NonPaged │ │ ├── makefile │ │ └── poc.c ├── 0x03 - Arbitrary Write (Write-What-Where) │ ├── Windows 11 (x64) │ │ ├── makefile │ │ └── poc.c │ └── Windows 7 (x86) │ │ ├── makefile │ │ └── poc.c ├── 0x04 - Type Confusion │ ├── Windows 11 (x64) │ │ ├── makefile │ │ └── poc.c │ └── Windows 7 (x86) │ │ ├── makefile │ │ ├── poc.c │ │ └── struct_size.c ├── 0x05 - Race Condition (Double Fetch) │ ├── Windows 11 (x64) │ │ ├── makefile │ │ └── poc.c │ └── Windows 7 (x86) │ │ ├── makefile │ │ └── poc.c └── 0x06 - Stack Overflow (GS) │ └── Windows 11 (x64) │ ├── makefile │ └── poc.c ├── LICENSE.md ├── Metasploit-Modules ├── erlang_cookie_rce.rb ├── pfsense_graph_injection_exec.rb └── syncbreeze_bof.rb ├── Personal-Exploits ├── DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE │ ├── README.md │ ├── images │ │ ├── admin-side.png │ │ ├── bruteforce.png │ │ ├── fssh.png │ │ ├── ftp-settings.png │ │ └── logged-in-shell.png │ ├── isilon-onefs-brute.py │ └── isilon-onefs-ftp-exploit.py ├── Nimsoft nimcontroller 7.80 - Unauthenticated RCE │ └── poc_release.c ├── README.md ├── SyncBreeze Enterprise v10.1.16 - Unauthenticated RCE │ ├── README.md │ ├── images │ │ └── w00t.png │ └── sploit-PoC.py ├── Sysdig Monitor - Kubernetes Post Exploitation │ ├── README.md │ └── sysdig_extract.py └── VXSearch v10.2.14 - Local Code Execution │ ├── README.md │ ├── images │ └── Proof.png │ └── vxSearchSploitWin7.py ├── Ported-Exploits ├── CVE-2003-0727.py ├── CVE-2006-6184.py ├── CVE-2017-18047.py ├── CVE-2019-1003000_CVE-2018-1999002_exploit_chain.py ├── allok-exploit.py ├── mysql_UDF_pwnage.py └── webdav_exploit.py └── README.md /.github/FUNDING.yml: -------------------------------------------------------------------------------- 1 | github: [wetw0rk] 2 | -------------------------------------------------------------------------------- /HEVD-Exploits/0x01 - Stack Overflow/Windows 10 (x64)/MiGetPteAddress.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x01 - Stack Overflow/Windows 10 (x64)/MiGetPteAddress.c -------------------------------------------------------------------------------- /HEVD-Exploits/0x01 - Stack Overflow/Windows 10 (x64)/makefile: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x01 - Stack Overflow/Windows 10 (x64)/makefile -------------------------------------------------------------------------------- /HEVD-Exploits/0x01 - Stack Overflow/Windows 10 (x64)/poc.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x01 - Stack Overflow/Windows 10 (x64)/poc.c -------------------------------------------------------------------------------- /HEVD-Exploits/0x01 - Stack Overflow/Windows 10 (x64)/shellcode.asm: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x01 - Stack Overflow/Windows 10 (x64)/shellcode.asm -------------------------------------------------------------------------------- /HEVD-Exploits/0x01 - Stack Overflow/Windows 7 (x86)/poc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x01 - Stack Overflow/Windows 7 (x86)/poc.py -------------------------------------------------------------------------------- /HEVD-Exploits/0x01 - Stack Overflow/scripts/flip_bit.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x01 - Stack Overflow/scripts/flip_bit.c -------------------------------------------------------------------------------- /HEVD-Exploits/0x01 - Stack Overflow/scripts/get_cr4.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x01 - Stack Overflow/scripts/get_cr4.c -------------------------------------------------------------------------------- /HEVD-Exploits/0x02 - Use After Free (NonpagedPool)/Windows 11 (x64) - NonPaged/makefile: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x02 - Use After Free (NonpagedPool)/Windows 11 (x64) - NonPaged/makefile -------------------------------------------------------------------------------- /HEVD-Exploits/0x02 - Use After Free (NonpagedPool)/Windows 11 (x64) - NonPaged/poc.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x02 - Use After Free (NonpagedPool)/Windows 11 (x64) - NonPaged/poc.c -------------------------------------------------------------------------------- /HEVD-Exploits/0x02 - Use After Free (NonpagedPool)/Windows 7 (x86) - NonPaged/makefile: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x02 - Use After Free (NonpagedPool)/Windows 7 (x86) - NonPaged/makefile -------------------------------------------------------------------------------- /HEVD-Exploits/0x02 - Use After Free (NonpagedPool)/Windows 7 (x86) - NonPaged/poc.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x02 - Use After Free (NonpagedPool)/Windows 7 (x86) - NonPaged/poc.c -------------------------------------------------------------------------------- /HEVD-Exploits/0x03 - Arbitrary Write (Write-What-Where)/Windows 11 (x64)/makefile: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x03 - Arbitrary Write (Write-What-Where)/Windows 11 (x64)/makefile -------------------------------------------------------------------------------- /HEVD-Exploits/0x03 - Arbitrary Write (Write-What-Where)/Windows 11 (x64)/poc.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x03 - Arbitrary Write (Write-What-Where)/Windows 11 (x64)/poc.c -------------------------------------------------------------------------------- /HEVD-Exploits/0x03 - Arbitrary Write (Write-What-Where)/Windows 7 (x86)/makefile: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x03 - Arbitrary Write (Write-What-Where)/Windows 7 (x86)/makefile -------------------------------------------------------------------------------- /HEVD-Exploits/0x03 - Arbitrary Write (Write-What-Where)/Windows 7 (x86)/poc.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x03 - Arbitrary Write (Write-What-Where)/Windows 7 (x86)/poc.c -------------------------------------------------------------------------------- /HEVD-Exploits/0x04 - Type Confusion/Windows 11 (x64)/makefile: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x04 - Type Confusion/Windows 11 (x64)/makefile -------------------------------------------------------------------------------- /HEVD-Exploits/0x04 - Type Confusion/Windows 11 (x64)/poc.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x04 - Type Confusion/Windows 11 (x64)/poc.c -------------------------------------------------------------------------------- /HEVD-Exploits/0x04 - Type Confusion/Windows 7 (x86)/makefile: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x04 - Type Confusion/Windows 7 (x86)/makefile -------------------------------------------------------------------------------- /HEVD-Exploits/0x04 - Type Confusion/Windows 7 (x86)/poc.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x04 - Type Confusion/Windows 7 (x86)/poc.c -------------------------------------------------------------------------------- /HEVD-Exploits/0x04 - Type Confusion/Windows 7 (x86)/struct_size.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x04 - Type Confusion/Windows 7 (x86)/struct_size.c -------------------------------------------------------------------------------- /HEVD-Exploits/0x05 - Race Condition (Double Fetch)/Windows 11 (x64)/makefile: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x05 - Race Condition (Double Fetch)/Windows 11 (x64)/makefile -------------------------------------------------------------------------------- /HEVD-Exploits/0x05 - Race Condition (Double Fetch)/Windows 11 (x64)/poc.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x05 - Race Condition (Double Fetch)/Windows 11 (x64)/poc.c -------------------------------------------------------------------------------- /HEVD-Exploits/0x05 - Race Condition (Double Fetch)/Windows 7 (x86)/makefile: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x05 - Race Condition (Double Fetch)/Windows 7 (x86)/makefile -------------------------------------------------------------------------------- /HEVD-Exploits/0x05 - Race Condition (Double Fetch)/Windows 7 (x86)/poc.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x05 - Race Condition (Double Fetch)/Windows 7 (x86)/poc.c -------------------------------------------------------------------------------- /HEVD-Exploits/0x06 - Stack Overflow (GS)/Windows 11 (x64)/makefile: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x06 - Stack Overflow (GS)/Windows 11 (x64)/makefile -------------------------------------------------------------------------------- /HEVD-Exploits/0x06 - Stack Overflow (GS)/Windows 11 (x64)/poc.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/HEVD-Exploits/0x06 - Stack Overflow (GS)/Windows 11 (x64)/poc.c -------------------------------------------------------------------------------- /LICENSE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/LICENSE.md -------------------------------------------------------------------------------- /Metasploit-Modules/erlang_cookie_rce.rb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Metasploit-Modules/erlang_cookie_rce.rb -------------------------------------------------------------------------------- /Metasploit-Modules/pfsense_graph_injection_exec.rb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Metasploit-Modules/pfsense_graph_injection_exec.rb -------------------------------------------------------------------------------- /Metasploit-Modules/syncbreeze_bof.rb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Metasploit-Modules/syncbreeze_bof.rb -------------------------------------------------------------------------------- /Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/README.md -------------------------------------------------------------------------------- /Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/images/admin-side.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/images/admin-side.png -------------------------------------------------------------------------------- /Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/images/bruteforce.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/images/bruteforce.png -------------------------------------------------------------------------------- /Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/images/fssh.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/images/fssh.png -------------------------------------------------------------------------------- /Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/images/ftp-settings.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/images/ftp-settings.png -------------------------------------------------------------------------------- /Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/images/logged-in-shell.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/images/logged-in-shell.png -------------------------------------------------------------------------------- /Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/isilon-onefs-brute.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/isilon-onefs-brute.py -------------------------------------------------------------------------------- /Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/isilon-onefs-ftp-exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/DELL EMC OneFS Storage Administration 8.1.2.0 - Authenticated RCE/isilon-onefs-ftp-exploit.py -------------------------------------------------------------------------------- /Personal-Exploits/Nimsoft nimcontroller 7.80 - Unauthenticated RCE/poc_release.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/Nimsoft nimcontroller 7.80 - Unauthenticated RCE/poc_release.c -------------------------------------------------------------------------------- /Personal-Exploits/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/README.md -------------------------------------------------------------------------------- /Personal-Exploits/SyncBreeze Enterprise v10.1.16 - Unauthenticated RCE/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/SyncBreeze Enterprise v10.1.16 - Unauthenticated RCE/README.md -------------------------------------------------------------------------------- /Personal-Exploits/SyncBreeze Enterprise v10.1.16 - Unauthenticated RCE/images/w00t.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/SyncBreeze Enterprise v10.1.16 - Unauthenticated RCE/images/w00t.png -------------------------------------------------------------------------------- /Personal-Exploits/SyncBreeze Enterprise v10.1.16 - Unauthenticated RCE/sploit-PoC.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/SyncBreeze Enterprise v10.1.16 - Unauthenticated RCE/sploit-PoC.py -------------------------------------------------------------------------------- /Personal-Exploits/Sysdig Monitor - Kubernetes Post Exploitation/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/Sysdig Monitor - Kubernetes Post Exploitation/README.md -------------------------------------------------------------------------------- /Personal-Exploits/Sysdig Monitor - Kubernetes Post Exploitation/sysdig_extract.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/Sysdig Monitor - Kubernetes Post Exploitation/sysdig_extract.py -------------------------------------------------------------------------------- /Personal-Exploits/VXSearch v10.2.14 - Local Code Execution/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/VXSearch v10.2.14 - Local Code Execution/README.md -------------------------------------------------------------------------------- /Personal-Exploits/VXSearch v10.2.14 - Local Code Execution/images/Proof.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/VXSearch v10.2.14 - Local Code Execution/images/Proof.png -------------------------------------------------------------------------------- /Personal-Exploits/VXSearch v10.2.14 - Local Code Execution/vxSearchSploitWin7.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Personal-Exploits/VXSearch v10.2.14 - Local Code Execution/vxSearchSploitWin7.py -------------------------------------------------------------------------------- /Ported-Exploits/CVE-2003-0727.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Ported-Exploits/CVE-2003-0727.py -------------------------------------------------------------------------------- /Ported-Exploits/CVE-2006-6184.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Ported-Exploits/CVE-2006-6184.py -------------------------------------------------------------------------------- /Ported-Exploits/CVE-2017-18047.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Ported-Exploits/CVE-2017-18047.py -------------------------------------------------------------------------------- /Ported-Exploits/CVE-2019-1003000_CVE-2018-1999002_exploit_chain.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Ported-Exploits/CVE-2019-1003000_CVE-2018-1999002_exploit_chain.py -------------------------------------------------------------------------------- /Ported-Exploits/allok-exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Ported-Exploits/allok-exploit.py -------------------------------------------------------------------------------- /Ported-Exploits/mysql_UDF_pwnage.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Ported-Exploits/mysql_UDF_pwnage.py -------------------------------------------------------------------------------- /Ported-Exploits/webdav_exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/Ported-Exploits/webdav_exploit.py -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wetw0rk/Exploit-Development/HEAD/README.md --------------------------------------------------------------------------------