K3ysTr0K3R / CVE-2024-25600-EXPLOITLinks
A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)
☆50Updated last year
Alternatives and similar repositories for CVE-2024-25600-EXPLOIT
Users that are interested in CVE-2024-25600-EXPLOIT are comparing it to the libraries listed below
Sorting:
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year
- A couple of different scripts, made to automate attacks against NoSQL databases.☆67Updated last year
- Unauthenticated Remote Code Execution – Bricks <= 1.9.6☆177Updated last year
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful …☆82Updated 5 months ago
- PHP 8.1.0-dev Backdoor System Shell Script☆95Updated 4 years ago
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆113Updated last year
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆139Updated last week
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆131Updated last year
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆179Updated 8 months ago
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆161Updated last year
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆300Updated last year
- JetBrains TeamCity Authentication Bypass CVE-2023-42793 Exploit☆45Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆110Updated 2 years ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆58Updated last year
- CVE-2022-25765 pdfkit <0.8.6 command injection.☆15Updated 2 years ago
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆18Updated 2 years ago
- several list of simple and obfuscate PHP shell☆188Updated 3 years ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- Helios: Automated XSS Testing☆157Updated last year
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆161Updated last year
- Tool to create XSS PDF files☆66Updated last year
- A wordlist repository with human-curated and reviewed content.☆120Updated 2 years ago
- ☆81Updated 5 months ago
- Exploiting the xmlrpc.php☆67Updated 2 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆128Updated 2 years ago
- Automation tool to testing and confirm the xss vulnerability.☆301Updated 4 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆341Updated last year
- ☆124Updated 3 months ago
- Openfire Console Authentication Bypass Vulnerability with RCE plugin☆55Updated last year
- An XSS Exploitation Tool☆331Updated this week