discord-zeroclick-exploit
Discord client zero-click RCE (by 0x44F)
Drupalgeddon2
Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002) (by dreadlocked)
discord-zeroclick-exploit | Drupalgeddon2 | |
---|---|---|
1 | 2 | |
32 | 562 | |
- | - | |
3.9 | 0.0 | |
over 2 years ago | over 3 years ago | |
Ruby | Ruby | |
- | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
discord-zeroclick-exploit
Posts with mentions or reviews of discord-zeroclick-exploit.
We have used some of these posts to build our list of alternatives
and similar projects.
-
Is https://archuser.de safe?
This isn't true. This past year alone has revealed several zero-click RCEs, especially in iOS. Discord had a notable zero-click exploit in 2021 that involved images. Microsoft Teams had a similar bug, where one GIF can give you control over someones account.
Drupalgeddon2
Posts with mentions or reviews of Drupalgeddon2.
We have used some of these posts to build our list of alternatives
and similar projects.
-
Automating SQL injection for the exam
Looking at https://github.com/dreadlocked/Drupalgeddon2 : this is an exploit for a particular CVE. Although it is is quite expansive in automating how the exploit should be executed depending on the Drupal version, I do not believe this classifies as automated exploitation as it deals with one particular CVE.
-
drupalgeddon2 is it allowed on the exam?
I am referring to this:https://github.com/dreadlocked/Drupalgeddon2
What are some alternatives?
When comparing discord-zeroclick-exploit and Drupalgeddon2 you can also consider the following projects:
discord-bugs-exploits - A Collection of Various Discord Bugs, Exploits, Un-Documented Parts of the Discord API, and Other Discord Related Miscellaneous Stuff.
docker-compose-drupal - Drupal 8 Docker Compose dev stack.
one_gadget - The best tool for finding one gadget RCE in libc.so.6
Discord-Cache-Exploit-POC - Exploit Discord's cache system to remote upload payloads on Discord users machines [Moved to: https://github.com/ecriminal/Exploit-Discord-Cache-System-PoC]
discord-strava - Connect Strava to Discord.
cve - Gather and update all available and newest CVEs with their PoC.
discordrb - Discord API for Ruby