Hacker5preme / ExploitsLinks
The whole collection of Exploits developed by me (Hacker5preme)
☆103Updated 3 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- Huge Collection of Wordpress Exploits and CVES☆123Updated 3 years ago
- An XSS Exploitation Tool☆331Updated this week
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- Collection of Exploit, CVES(Unauthenticated) and Wordpress Scanners☆106Updated 3 years ago
- Bypass WAF SQL Injection SQLMAP☆195Updated 3 years ago
- several list of simple and obfuscate PHP shell☆188Updated 3 years ago
- RCE exploit for dompdf☆182Updated 3 years ago
- WpCrack is an audit and brute force tool used to remotely test WordPress blogging software☆107Updated 2 years ago
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆110Updated last year
- Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773☆112Updated 3 years ago
- this repository is a docker containing some "XSS vulnerability" challenges and bypass examples.☆118Updated 3 years ago
- CVE Collection of jQuery UI XSS Payloads☆120Updated 2 years ago
- An automation tool to install the most popular tools for bug bounty or pentesting.☆123Updated 2 months ago
- Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7☆35Updated 2 years ago
- Tool to create XSS PDF files☆66Updated last year
- ☆180Updated last year
- A Burp Suite extension for identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violati…☆390Updated last week
- All Type of Payloads☆137Updated last year
- A Complete SSRF (Server Side Request Forgery) Scanner.☆41Updated last week
- jsubfinder searches webpages for javascript & analyzes them for hidden subdomains and secrets (wip).☆276Updated 10 months ago
- Collect XSS vulnerable parameters from entire domain.☆155Updated 3 years ago
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆92Updated 2 years ago
- PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2☆48Updated last year
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆128Updated 2 years ago
- Herramientas y utilidades de pentesting, ethical hacking y seguridad ofensiva.☆39Updated 6 months ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆253Updated last year
- Apache Tomcat exploit and Pentesting guide for penetration tester☆63Updated 3 years ago
- A tool designed to automate various techniques in order to bypass HTTP 401 and 403 response codes and gain access to unauthorized areas i…☆192Updated last year
- PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017☆124Updated 2 years ago
- A more useful CSRF PoC generator on Burp Suite☆87Updated 3 years ago