Skip to content
View 0dayNinja's full-sized avatar

Block or report 0dayNinja

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0dayNinja/README.md

Hey there 👋



Pinned Loading

  1. Windows-x64-Processes-Injector Windows-x64-Processes-Injector Public

    0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)

    Assembly 50 18

  2. CVE-2021-24155.rb CVE-2021-24155.rb Public

    WordPress Backup Guard Authenticated Remote Code Execution Exploit

    Ruby 10 7

  3. Linux-x86-Reverse-Shell Linux-x86-Reverse-Shell Public

    Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)

    Assembly 13 5

  4. Linux-x86-Bind-Shellcode Linux-x86-Bind-Shellcode Public

    Linux/x86 - Bind (User Specified Port) Shell (/bin/sh) Shellcode (102 bytes)

    Assembly 9 5

  5. CVE-2021-3560 CVE-2021-3560 Public

    Polkit D-Bus Authentication Bypass Exploit

    Ruby 9 7

  6. egghunter_shellcode egghunter_shellcode Public

    Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode

    C 13 2