B1GJ / elementor-pro-exploit
PoC for Broken Access Control vulnerability in WordPress Elementor Pro Plugin. This vulnerability has been fixed in version 3.11.7.
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for elementor-pro-exploit
- WooCommerce Payments: Unauthorized Admin Access Exploit☆39Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆107Updated 3 months ago
- web application security tool☆3Updated 2 weeks ago
- Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )☆62Updated 5 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆38Updated last month
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆81Updated 10 months ago
- an exploit of Server-side request forgery (SSRF)☆46Updated 3 months ago
- ☆143Updated last year
- CVE-2024-28955 Exploitation PoC☆34Updated 4 months ago
- ☆120Updated 3 months ago
- Embed a payload inside a PNG file☆201Updated 2 weeks ago
- Huge Collection of Wordpress Exploits and CVES☆120Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆62Updated 5 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆60Updated 10 months ago
- ProxyChecker Made in NodeJS☆37Updated 2 years ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆35Updated 10 months ago
- Simple Powershell Http shell With WEB UI☆66Updated 2 weeks ago
- POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692☆30Updated this week
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆64Updated 3 weeks ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆47Updated 7 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated 8 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆71Updated 4 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 3 weeks ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆102Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆85Updated 2 months ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆55Updated 4 months ago
- Auto exploitation tool for CVE-2024-24401.☆31Updated 2 months ago
- Persistent Powershell backdoor tool { 😈}☆109Updated 3 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆59Updated last month