该系列是从 2014 年到 2022 年的历史漏洞
☆18Apr 3, 2023Updated 3 years ago
Alternatives and similar repositories for wordpress-exploits
Users that are interested in wordpress-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- shiro反序列化利用综合利用,包含(回显执行命令/注入内存马)原版中NoCC的问题 https://github.com/j1anFen/shiro_attack☆12May 1, 2022Updated 3 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- F5 BIG-IP unauthenticated remote code execution (RCE) and authentication bypass vulnerability!☆11Oct 30, 2023Updated 2 years ago
- PoC☆12Apr 7, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Search and download APKs from the command line☆12Apr 29, 2021Updated 4 years ago
- This repository contains complete source code for setting up the environment and exploit code for the vulnerability.☆19Mar 23, 2023Updated 3 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- 单页mysql注入环境自带数据仅需填账号密码无需其他复杂配置开箱即用。 自定义过滤/拦截规则进行bypass等测试,支持报错/联合/延时/布尔/时间/堆叠 的数值或字符注入☆16Dec 2, 2022Updated 3 years ago
- ☆38Dec 14, 2024Updated last year
- 一款Google信息收集插件,包含域名,map,js等文件提取☆24Apr 5, 2025Updated last year
- MASS CVE-2021-41773☆29Nov 14, 2023Updated 2 years ago
- Trace functions in EcmaScript Modules☆13Dec 4, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Jun 30, 2022Updated 3 years ago
- A tool to extract all the urls and paths found in the content of a page (js sources included)☆22Aug 8, 2025Updated 8 months ago
- A Twitter monitoring tool powered by DeepSeek API and steel-browser, featuring AI translation/analysis, automatic screenshots, and multi-…☆12Jan 29, 2025Updated last year
- Subdomain enumeration tool, asynchronous dns packets, use pcap to scan 1600,000 subdomains in 1 second修复内存溢出等bug☆15Nov 25, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- llvm with customised obfuscation optimisations☆15Sep 25, 2024Updated last year
- CVE-2023-6875 PoC☆25Jan 15, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12☆13Aug 12, 2024Updated last year
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- programmatic control of the mouse☆16Jun 28, 2023Updated 2 years ago
- Fuzz every path with goky☆15Jan 4, 2024Updated 2 years ago
- ☆12Feb 20, 2016Updated 10 years ago
- ☆13Apr 14, 2024Updated 2 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated last month
- Directory Traversal Scanner 是一个高性能的目录遍历漏洞扫描工具,专门用于检测和验证 Web 应用程序中的路径遍历漏洞。通过异步并发扫描和智能 WAF 绕过技术,帮助安全研究人员快速发现潜在的安全隐患。Directory Traversal Sca…☆36Mar 28, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆11Aug 31, 2023Updated 2 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆19Mar 11, 2023Updated 3 years ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 5 years ago
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated 2 years ago
- Porting ce's monodatacollector to android/ios.☆13Oct 7, 2022Updated 3 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago