https://github.com/dr4xp/unserialize-exploit
For StuxCTF on TryHackMe...
https://github.com/dr4xp/unserialize-exploit
bash ctf ctfs ethical-hacking ethical-hacking-tools hack hacking hacking-tools hacks hackthebox linux php-exploit stuxctf tools tryhackme unserialize unserialize-exploit
Last synced: 4 months ago
JSON representation
For StuxCTF on TryHackMe...
- Host: GitHub
- URL: https://github.com/dr4xp/unserialize-exploit
- Owner: dr4xp
- Created: 2025-09-11T17:44:28.000Z (4 months ago)
- Default Branch: exploit
- Last Pushed: 2025-09-11T18:11:01.000Z (4 months ago)
- Last Synced: 2025-09-11T20:33:30.953Z (4 months ago)
- Topics: bash, ctf, ctfs, ethical-hacking, ethical-hacking-tools, hack, hacking, hacking-tools, hacks, hackthebox, linux, php-exploit, stuxctf, tools, tryhackme, unserialize, unserialize-exploit
- Language: Python
- Homepage:
- Size: 184 KB
- Stars: 1
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
Remote Code Execution By
[unserialized function](https://notsosecure.com/remote-code-execution-php-unserialize) Vulnerabilty.
If You Want To Know How The Payload Generated,
[ClickM3](./Payload.md)
This Exploit Work Fine With Python3, And Make Sure You Installed The Packages.
Will Make It So Easy To Hack Machine,
GOOD LUCK!