Chocapikk / CVE-2024-8504Links
VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)
☆41Updated last year
Alternatives and similar repositories for CVE-2024-8504
Users that are interested in CVE-2024-8504 are comparing it to the libraries listed below
Sorting:
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated 11 months ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆56Updated last year
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- ☆48Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆27Updated last month
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆138Updated 8 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆40Updated 2 years ago
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆104Updated 11 months ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆27Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆121Updated 4 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆66Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.☆125Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- Will attempt to retrieve DB details for FastAdmin instances☆67Updated last year
- POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692☆41Updated 5 months ago
- A fast subdomain takeover tool☆84Updated last year
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆49Updated 3 months ago
- Grep subdomains from web pages.☆44Updated 7 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆149Updated 3 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Updated 11 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated last month
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 9 months ago
- Auto exploitation tool for CVE-2024-24401.☆35Updated last year
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Updated last year
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆67Updated last year
- ☆74Updated 5 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆65Updated 11 months ago
- CVE-2024-3400-RCE☆90Updated last year