• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

  1. protectaccount

    Udemy Ethical Hacking: Build Ransomware with Control Center POC

    Welcome to “Ethical Hacking: Build Ransomware with Control Center POC” – a comprehensive course designed to equip you with the skills and knowledge needed to create and manage advanced ransomware within an ethical framework. This is a Proof of Concept (POC) course, designed to provide you with...
  2. Sebasmend

    CVE-2025-21692 * Linux kernel version 6.6.75 * WriteUp POC exploit #linux #exploit

    https://github.com/volticks/CVE-2025-21692-poc CVE-2025-21692 * Linux kernel version 6.6.75 * WriteUp POC exploit #linux #exploit
  3. Sebasmend

    CVE-2025-24813 * Tomcat RCE - POC exploit

    https://github.com/brs6412/CVE-2025-24813 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  4. Sebasmend

    CVE-2025-59934: Critical Flaw in Formbricks Allows Unauthorized * Password Resets via Forged JWT Tokens * POC

    https://github.com/formbricks/formbricks/security/advisories/GHSA-7229-q9pv-j6p4 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. Sebasmend

    CVE-2025-56383 - Notepad++ v8.8.3 (DLL hijacking vuln) POC exploit

    https://github.com/zer0t0/CVE-2025-56383-Proof-of-Concept *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  6. Sebasmend

    Dirty Pageflags: Revisiting PTE Exploitation in Linux * writeUp + POC exploit

    https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326 [RESPONDER] explotación de PTE en Linux * Explotación de writeUp + POC [RESPONDER]
Top Bottom