September 5th, 2023 | ๐
iSpeech.org # Exploit Title: AdminLTE PiHole < 5.18 - Broken Access Control# Google Dork: inurl:admin/scripts/pi-hole/phpqueryads.php](https://vuldb.com/?exploit_googlehack.216554)# Date: 21.12.2022# Exploit Author: kv1to#
July 30th, 2021 | ๐
https://www.ispeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::LocalRank = GreatRanking # includes: is_root?include Msf::Post::Linux::Priv#
August 6th, 2020 | ๐
iSpeech #!/usr/bin/env python2 # Exploit Title: Pi-hole 4.3.2 - Remote Code Execution (Authenticated) # Date: 2020-08-04 # Exploit Author: Luis
August 5th, 2020 | ๐
Powered by iSpeech #!/usr/bin/env python2 # Exploit Title: Pi-hole 4.3.2 - Remote Code Execution (Authenticated) # Date: 2020-08-04# Exploit Author:
May 29th, 2020 | ๐
Text to Speech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = GoodRanking include Msf::Exploit::Remote::HttpClient
May 28th, 2020 | ๐
https://www.ispeech.org/text.to.speech # Exploit Title: Pi-hole 4.4.0 - Remote Code Execution (Authenticated) # Date: 2020-05-22 # Exploit Author: Photubias # Vendor
May 27th, 2020 | ๐
iSpeech # Exploit Title: Pi-hole 4.4.0 - Remote Code Execution (Authenticated)# Date: 2020-05-22# Exploit Author: Photubias# Vendor Advisory: 1] https://github.com/pi-hole/AdminLTE#
May 27th, 2020 | ๐
iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStager def
May 20th, 2020 | ๐
https://www.ispeech.org ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking
May 18th, 2020 | ๐
iSpeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::Remote::HttpServerinclude Msf::Exploit::EXEinclude
May 11th, 2020 | ๐
iSpeech.org #!/usr/bin/env python3 # Pi-hole < = 4.4 RCE# Author: Nick Frichette# Homepage: https://frichetten.com## Note: This exploit must be run
May 11th, 2020 | ๐
Convert Text to Speech #!/usr/bin/env python3 # Pi-hole < = 4.4 RCE# Author: Nick Frichette# Homepage: https://frichetten.com## Note: This exploit
May 11th, 2020 | ๐
Speech Synthesis #!/usr/bin/env python3 # Pi-hole < = 4.4 RCE # Author: Nick Frichette # Homepage: https://frichetten.com # # Note:
Gloss