1979139113 / 0day-today-exploitsLinks
☆51Updated 5 years ago
Alternatives and similar repositories for 0day-today-exploits
Users that are interested in 0day-today-exploits are comparing it to the libraries listed below
Sorting:
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆21Updated 11 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆47Updated 9 months ago
- This Tool bypass 403/401. This script contain all the possible techniques to do the bypass☆44Updated 10 months ago
- Insecure Android Application for testing Biometric bypasses☆12Updated 3 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆54Updated 2 years ago
- Scripts to set up your own Android 📱 app hacking lab☆86Updated last year
- || Activate Burp Suite Pro with Loader and Key-Generator ||☆34Updated 4 years ago
- Fast and customizable Firebase api and Project ID extractor .☆18Updated last year
- World's most Powerful and Advanced Cross Site Scripting Software☆28Updated 5 years ago
- [Custom || Automated] Curation & Collection of BugBounty Wordlists☆52Updated this week
- a curated list of shodan dorks for finding sensitive data in shodan.io☆30Updated last year
- 「💉」XSS Payload List☆37Updated 2 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆60Updated 3 years ago
- xdebug 2.5.5 RCE exploit☆31Updated 6 months ago
- simple recon tool to help you for searching vulnerability on web server☆74Updated 5 months ago
- Fastest tool to find username and password brute forcing.☆74Updated last year
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆70Updated last year
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated last week
- How to do recon on a web-application properly☆13Updated 3 years ago
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've…☆46Updated last month
- Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins☆84Updated 2 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆50Updated 6 months ago
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆33Updated last year
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆20Updated 2 years ago
- Fetch & Filter Known URLs☆15Updated 3 years ago
- ( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload☆10Updated 2 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆72Updated last year
- Rezon - Automated Bug Hunting Recon Tool☆20Updated last month
- Arkhota, a web brute forcer for Android.☆20Updated 2 years ago