AiGPT started from the concept of CVE‑2024‑27956 , the WP Automatic CSV injection — but has been completely rebuilt into a multi‑vector, unauthenticated WordPress exploitation engine. It now chains 13 real‑world CVEs to create an administrator account or drop a web shell directly, then automatically injects a reverse shell into the active theme
☆122May 9, 2026Updated last week
Alternatives and similar repositories for AiGPT-WordPress-Exploitation-Framework
Users that are interested in AiGPT-WordPress-Exploitation-Framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This code implements an Advanced Prompt Hacking Tester, which allows users to test the responses of an AI system by generating various ty…☆13Apr 14, 2024Updated 2 years ago
- retrieve comprehensive information about a website, including its title, last modified date, DNS information, subdomains, firewall names,…☆16Mar 24, 2024Updated 2 years ago
- functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forger…☆93Apr 21, 2024Updated 2 years ago
- CVE-2024-6387 with auto ip scanner and auto expliot☆11Jul 4, 2024Updated last year
- my nuclei templates #new☆10Jun 24, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Nuclei template generator for WordPress plugins☆23Apr 22, 2024Updated 2 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- A command line tool to interact with Microsoft Graph API☆23May 27, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability☆16Jul 16, 2023Updated 2 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆78May 16, 2024Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Jul 14, 2023Updated 2 years ago
- Bunch of free OSINT tools which one are available on the internet.☆23Dec 23, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆22Jun 24, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated 2 years ago
- Simple script to bulk check if IPs match networks☆12Jan 11, 2022Updated 4 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypas…☆20May 4, 2025Updated last year
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆143Jun 27, 2023Updated 2 years ago
- 150 Fast prompts OpenAi☆23Dec 28, 2023Updated 2 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- My Priv8 Nuclei Templates☆342May 12, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated 2 years ago
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆30Nov 7, 2023Updated 2 years ago
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆43Jan 29, 2025Updated last year
- Learn everything you need to know about any academic figure☆16May 10, 2024Updated 2 years ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆79May 10, 2026Updated last week
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated 2 years ago
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆313Mar 31, 2024Updated 2 years ago
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆45Oct 26, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This repository contains links to all the 100 days tweets that I posted during the #100DaysOfHacking challenge.☆17Apr 11, 2022Updated 4 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Nov 5, 2025Updated 6 months ago
- ☆26Jun 5, 2024Updated last year
- This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.☆21Jul 7, 2024Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Phone number information lookup, validation, carrier name, geo and timezone infos, Verify phone number, validate format, checking carrie…☆15Nov 22, 2025Updated 5 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago