Chocapikk / CVE-2024-8504Links
VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)
☆41Updated last year
Alternatives and similar repositories for CVE-2024-8504
Users that are interested in CVE-2024-8504 are comparing it to the libraries listed below
Sorting:
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆73Updated 11 months ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆56Updated last year
- ☆48Updated last year
- WooCommerce Payments: Unauthorized Admin Access Exploit☆41Updated 2 years ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆140Updated 8 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆105Updated last year
- Will attempt to retrieve DB details for FastAdmin instances☆68Updated last year
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.☆126Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆66Updated last year
- POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692☆41Updated 6 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated 11 months ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆27Updated last month
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆73Updated 5 months ago
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester☆52Updated last month
- ☆53Updated 9 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆121Updated 4 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 9 months ago
- ☆86Updated 7 months ago
- A fast subdomain takeover tool☆84Updated last year
- ☆124Updated last month
- Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )☆62Updated last year
- JSNinja is a powerful tool designed for security researchers and developers looking to extract sensitive information and Urls from JavaSc…☆162Updated last month
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆46Updated 3 months ago
- an exploit of Server-side request forgery (SSRF)☆48Updated last year
- ProxyChecker Made in NodeJS☆38Updated 3 years ago
- ☆74Updated 6 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated 2 months ago