K3ysTr0K3R / CVE-2024-25600-EXPLOITLinks
A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)
☆49Updated last year
Alternatives and similar repositories for CVE-2024-25600-EXPLOIT
Users that are interested in CVE-2024-25600-EXPLOIT are comparing it to the libraries listed below
Sorting:
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Updated last year
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆110Updated last year
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆161Updated 11 months ago
- Unauthenticated Remote Code Execution – Bricks <= 1.9.6☆175Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- Tool to create XSS PDF files☆63Updated last year
- Helios: Automated XSS Testing☆156Updated last year
- ☆123Updated 2 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆110Updated 2 years ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆58Updated last year
- CVE-2022-25765 pdfkit <0.8.6 command injection.☆15Updated 2 years ago
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆175Updated 8 months ago
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful …☆82Updated 5 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆131Updated last year
- ☆79Updated 5 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 11 months ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆165Updated 5 months ago
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆35Updated 2 years ago
- Bypass 403 pages☆123Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆66Updated last year
- Bookmarklet to find endpoints easily with one click☆68Updated last year
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆127Updated 2 years ago
- Exploiting the xmlrpc.php☆67Updated 2 years ago
- PHP 8.1.0-dev Backdoor System Shell Script☆95Updated 4 years ago
- Rezon - Automated Bug Hunting Recon Tool☆20Updated last month
- ☆48Updated last year
- Automation tool to testing and confirm the xss vulnerability.☆301Updated 4 months ago