该系列是从 2014 年到 2022 年的历史漏洞
☆18Apr 3, 2023Updated 3 years ago
Alternatives and similar repositories for wordpress-exploits
Users that are interested in wordpress-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- shiro反序列化利用综合利用,包含(回显执行命令/注入内存马)原版中NoCC的问题 https://github.com/j1anFen/shiro_attack☆12May 1, 2022Updated 4 years ago
- This script make any windows compatible with RDP connection☆22Jul 28, 2025Updated 9 months ago
- [✅Py 3.x]渗透测试插件化并发框架 / Open-sourced remote vulnerability PoC/EXP framework,现已兼容 Python3☆10Jul 9, 2024Updated last year
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- F5 BIG-IP unauthenticated remote code execution (RCE) and authentication bypass vulnerability!☆11Oct 30, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The standard implementation of EventBus for Java and Spring.☆10Apr 1, 2023Updated 3 years ago
- ☆16Jul 25, 2023Updated 2 years ago
- PoC☆12Apr 7, 2025Updated last year
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- This repository contains complete source code for setting up the environment and exploit code for the vulnerability.☆19Mar 23, 2023Updated 3 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- 单页mysql注入环境自带数据仅需填账号密码无需其他复杂配置开箱即用。 自定义过滤/拦截规则进行bypass等测试,支持报错/联合/延时/布尔/时间/堆叠 的数值或字符注入☆16Dec 2, 2022Updated 3 years ago
- ☆38Dec 14, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 一款Google信息收集插件,包含域名,map,js等文件提取☆24Apr 5, 2025Updated last year
- Trace functions in EcmaScript Modules☆13Dec 4, 2025Updated 5 months ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Jun 30, 2022Updated 3 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- CVE-2023-6875 PoC☆25Jan 15, 2024Updated 2 years ago
- Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12☆13Aug 12, 2024Updated last year
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- programmatic control of the mouse☆16Jun 28, 2023Updated 2 years ago
- Fuzz every path with goky☆14Jan 4, 2024Updated 2 years ago
- ☆12Feb 20, 2016Updated 10 years ago
- ☆13Apr 14, 2024Updated 2 years ago
- Directory Traversal Scanner 是一个高性能的目录遍历漏洞扫描工具,专门用于检测和验证 Web 应用程序中的路径遍历漏洞。通过异步并发扫描和智能 WAF 绕过技术,帮助安全研究人员快速发现潜在的安全隐患。Directory Traversal Sca…☆36Mar 28, 2025Updated last year
- ☆11Aug 31, 2023Updated 2 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆19Mar 11, 2023Updated 3 years ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 6 years ago
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated 2 years ago
- Porting ce's monodatacollector to android/ios.☆13Oct 7, 2022Updated 3 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- SPIP BigUp Plugin Unauthenticated RCE☆16Sep 7, 2024Updated last year
- My own tools for developing kernel modules☆15Sep 23, 2025Updated 7 months ago