A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)
-
Updated
Mar 16, 2024 - Python
A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)
rMETAshell takes a shell command and an image, video or text file as input. It then injects the command into the file using metadata comments. After injection, it generates a one-liner execution method for retrieving and executing the injected command from a remote location.
An online judge for evaluating DSA problem just like Leetcode. [This Online Judge is Implemented in the AlgoCode Project. Click below to learn more.]
A Remote Code Execution python script to exploit RiteCMS 2.0
A Service of Algocode - A leetcode like project to consume messages from Code-Manager Service and responsible for Executing User Codes in Secure Docker Environment, and Publish result to the Result Queue.
A Service of Algocode - A leetcode like project to handle all the code submission and consume result from Remote Code Execution Engine Service
Add a description, image, and links to the remote-code-execution-rce topic page so that developers can more easily learn about it.
To associate your repository with the remote-code-execution-rce topic, visit your repo's landing page and select "manage topics."