An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.
☆17May 19, 2024Updated last year
Alternatives and similar repositories for CVE-2024-29269
Users that are interested in CVE-2024-29269 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Unauthenticated Command Injection In Progress Kemp LoadMaster☆19Aug 26, 2025Updated 8 months ago
- ☆16May 29, 2024Updated last year
- vidy007's dotfiles☆11Jan 21, 2025Updated last year
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- ☆12Jun 10, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆32Jun 1, 2024Updated last year
- SSRF 绕过 Payload☆15Nov 12, 2020Updated 5 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- ☆11Aug 18, 2021Updated 4 years ago
- Connect to a GitHub Action runner via SSH through an ngrok tunnel.☆15Dec 5, 2024Updated last year
- A Python based scanner uses shodan-internetdb to scan the IP.☆32Mar 6, 2022Updated 4 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- GeoServer Remote Code Execution☆87Apr 6, 2025Updated last year
- FileFetcher is a Python tool that extracts and filters URLs from archived Wayback Machine data based on file types like .pdf, .zip, .sql,…☆20Jan 16, 2025Updated last year
- Apache OfBiz Auth Bypass Scanner for CVE-2023-51467☆11Dec 31, 2023Updated 2 years ago
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.☆11Jul 6, 2018Updated 7 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- Scrippy is a browser extension that holds sql statements (think clip board) to aid devlopers in the testing of websites for basic code in…☆12Aug 21, 2022Updated 3 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- A simple multithreaded SSH credential tester.☆14Jun 6, 2025Updated 11 months ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆13May 10, 2022Updated 3 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆16May 21, 2022Updated 3 years ago
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆44Mar 3, 2022Updated 4 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated 2 years ago
- Simple XSS vulnerability checker tool very useful with xsschecker.☆27Nov 21, 2025Updated 5 months ago
- An amateur radio fox transmitter for fox hunting☆21Nov 24, 2025Updated 5 months ago
- A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)☆10Jul 12, 2024Updated last year
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated 3 months ago
- basic http request over tor using arti.☆24Jan 28, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Bash script to generate reverse shell payloads☆18Sep 9, 2023Updated 2 years ago
- Deliberately vulnerable PHP code examples for testing static analysis tools and security training, covering common vulnerabilities such a…☆12Updated this week
- Create a monster on Flow☆18Sep 26, 2024Updated last year
- Bruteratel☆15Oct 26, 2022Updated 3 years ago
- DNS utils module for bepass sdk, supporting doh, dot, dnscrypt and static hosts file like configuration☆16Jan 13, 2024Updated 2 years ago
- A collection of small programs using toxcore.☆17Feb 10, 2026Updated 2 months ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Sep 20, 2023Updated 2 years ago