K3ysTr0K3R / CVE-2024-25600-EXPLOITLinks
A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)
☆43Updated last year
Alternatives and similar repositories for CVE-2024-25600-EXPLOIT
Users that are interested in CVE-2024-25600-EXPLOIT are comparing it to the libraries listed below
Sorting:
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆40Updated 10 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆64Updated 9 months ago
- Unauthenticated Remote Code Execution – Bricks <= 1.9.6☆168Updated last year
- ☆48Updated last year
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆57Updated last year
- ☆118Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆65Updated last year
- A couple of different scripts, made to automate attacks against NoSQL databases.☆65Updated last year
- PoC for SQL Injection in CVE-2024-27956☆86Updated last year
- Tool to create XSS PDF files☆58Updated last year
- Bypass 403 pages☆116Updated last year
- ☆70Updated 3 weeks ago
- Helios: Automated XSS Testing☆154Updated 11 months ago
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆97Updated 9 months ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆87Updated last year
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆32Updated 2 years ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- Host Header Vulnerability Scanner Automated Tool☆23Updated 2 months ago
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆63Updated 11 months ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆40Updated 3 months ago
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆66Updated 3 weeks ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆125Updated 10 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆144Updated last month
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆27Updated this week
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 11 months ago
- ZeusLeak is a browser extension that automatically detects leaked secrets and credentials in code while browsing.☆43Updated 4 months ago
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆98Updated 10 months ago
- Automation tool to testing and confirm the xss vulnerability.☆272Updated 3 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆122Updated 7 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆149Updated last year