Skip to content
View 0dayNinja's full-sized avatar
Block or Report

Block or report 0dayNinja

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0dayNinja/README.md

Hey there 👋



Pinned

  1. Windows-x64-Processes-Injector Windows-x64-Processes-Injector Public

    0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)

    Assembly 46 18

  2. CVE-2021-24155.rb CVE-2021-24155.rb Public

    WordPress Backup Guard Authenticated Remote Code Execution Exploit

    Ruby 12 7

  3. Linux-x86-Reverse-Shell Linux-x86-Reverse-Shell Public

    Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)

    Assembly 14 5

  4. Linux-x86-Bind-Shellcode Linux-x86-Bind-Shellcode Public

    Linux/x86 - Bind (User Specified Port) Shell (/bin/sh) Shellcode (102 bytes)

    Assembly 10 5

  5. CVE-2021-3560 CVE-2021-3560 Public

    Polkit D-Bus Authentication Bypass Exploit

    Ruby 11 7

  6. egghunter_shellcode egghunter_shellcode Public

    Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode

    C 14 2