K3ysTr0K3R / CVE-2024-25600-EXPLOITLinks
A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)
☆46Updated last year
Alternatives and similar repositories for CVE-2024-25600-EXPLOIT
Users that are interested in CVE-2024-25600-EXPLOIT are comparing it to the libraries listed below
Sorting:
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆127Updated last year
- Unauthenticated Remote Code Execution – Bricks <= 1.9.6☆173Updated last year
- ☆124Updated last month
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆73Updated 11 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆105Updated last year
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆158Updated 10 months ago
- ☆75Updated 3 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆109Updated 2 years ago
- CVE-2022-25765 pdfkit <0.8.6 command injection.☆14Updated 2 years ago
- Bypass 403 pages☆117Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 9 months ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29Updated 2 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆66Updated last year
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆34Updated 2 years ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆24Updated last year
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆67Updated last year
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆152Updated last year
- Bookmarklet to find endpoints easily with one click☆67Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆153Updated 4 months ago
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆20Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆27Updated last month
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆56Updated last year
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆165Updated 6 months ago
- Exploiting the xmlrpc.php☆61Updated last year
- Tool to create XSS PDF files☆62Updated last year
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆80Updated 2 years ago