{"id":31074039,"url":"https://github.com/dr4xp/unserialize-exploit","last_synced_at":"2025-09-16T02:03:08.307Z","repository":{"id":314316920,"uuid":"1055054875","full_name":"dr4xp/unserialize-exploit","owner":"dr4xp","description":"For StuxCTF on TryHackMe...","archived":false,"fork":false,"pushed_at":"2025-09-11T18:11:01.000Z","size":188,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":0,"default_branch":"exploit","last_synced_at":"2025-09-11T20:33:30.953Z","etag":null,"topics":["bash","ctf","ctfs","ethical-hacking","ethical-hacking-tools","hack","hacking","hacking-tools","hacks","hackthebox","linux","php-exploit","stuxctf","tools","tryhackme","unserialize","unserialize-exploit"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/dr4xp.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2025-09-11T17:44:28.000Z","updated_at":"2025-09-11T18:11:43.000Z","dependencies_parsed_at":"2025-09-11T20:37:39.257Z","dependency_job_id":"3849e009-0723-46bc-9bb5-5d4047034584","html_url":"https://github.com/dr4xp/unserialize-exploit","commit_stats":null,"previous_names":["dr4xp/unserialize-exploit"],"tags_count":null,"template":false,"template_full_name":null,"purl":"pkg:github/dr4xp/unserialize-exploit","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/dr4xp%2Funserialize-exploit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/dr4xp%2Funserialize-exploit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/dr4xp%2Funserialize-exploit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/dr4xp%2Funserialize-exploit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/dr4xp","download_url":"https://codeload.github.com/dr4xp/unserialize-exploit/tar.gz/refs/heads/exploit","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/dr4xp%2Funserialize-exploit/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":275348511,"owners_count":25448626,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-09-16T02:00:10.229Z","response_time":65,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["bash","ctf","ctfs","ethical-hacking","ethical-hacking-tools","hack","hacking","hacking-tools","hacks","hackthebox","linux","php-exploit","stuxctf","tools","tryhackme","unserialize","unserialize-exploit"],"created_at":"2025-09-16T02:02:05.328Z","updated_at":"2025-09-16T02:03:08.295Z","avatar_url":"https://github.com/dr4xp.png","language":"Python","readme":"\u003ch1\u003eRemote Code Execution By \n\n  [unserialized function](https://notsosecure.com/remote-code-execution-php-unserialize) Vulnerabilty. \u003c/h1\u003e\n\u003ch2\u003eIf You Want To Know How The Payload Generated, \n\n[ClickM3](./Payload.md)\u003c/h2\u003e\n\n\n\u003ch3\u003eThis Exploit Work Fine With Python3, And Make Sure You Installed The Packages.\u003c/h3\u003e\n\n\u003ch4\u003eWill Make It So Easy To Hack Machine,\u003c/h4\u003e\n\n\u003cdiv align=\"center\"\u003e\u003ch1\u003e\u003ci\u003eGOOD LUCK!\u003c/h1\u003e\u003c/i\u003e\n\u003cimg style=\"max-width:400px;\" src=\"https://previews.jumpshare.com/thumb/815bc01b796dd6f1733c957c5af1949352d271522284802f93603e28e80494ad83d84cdfb5cd46ef8619d6f7eb340e2ab1ade605c3c7eb0d34fa40f4b87113fba07dd5ac884a4843fa78d24a714154d2\"\u003e\n\u003c/div\u003e\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdr4xp%2Funserialize-exploit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fdr4xp%2Funserialize-exploit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdr4xp%2Funserialize-exploit/lists"}