CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
☆33Apr 15, 2025Updated last year
Alternatives and similar repositories for Exploit-CVE-2025-24799
Users that are interested in Exploit-CVE-2025-24799 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Aug 15, 2025Updated 8 months ago
- WordPress File Upload RCE Exploit☆17Sep 1, 2025Updated 7 months ago
- ☆21Jan 3, 2025Updated last year
- Implementation of Max Kellermann's exploit for CVE-2022-0847☆12Mar 8, 2022Updated 4 years ago
- ☆42Mar 12, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 9 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆62Apr 13, 2025Updated last year
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- Web File Manager☆11Aug 21, 2025Updated 7 months ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- ☆16Aug 25, 2025Updated 7 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Simple PoC in PowerShell for CVE-2023-23397☆39Mar 16, 2023Updated 3 years ago
- ☆18Jan 9, 2025Updated last year
- PAN-OS auth bypass + RCE☆46Nov 19, 2024Updated last year
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆36Jan 11, 2026Updated 3 months ago
- An efficient Python script to obfuscate code by renaming identifiers.☆12Jun 29, 2023Updated 2 years ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- Kernel Information Disclosure☆34Jan 13, 2026Updated 3 months ago
- A PHP wrapper template to execute PowerShell payloads☆11Apr 2, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Mar 24, 2026Updated 3 weeks ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Apr 30, 2025Updated 11 months ago
- SPAM filter rules for Stalwart Mail Server☆16Updated this week
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆45Updated this week
- ☆17Jan 4, 2025Updated last year
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Jul 10, 2025Updated 9 months ago
- fully Undetectable payload generator for metasploit☆11Feb 1, 2023Updated 3 years ago
- Lightweight reflection scanner☆20Aug 31, 2025Updated 7 months ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated last month
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. Implementation of ligolo-ng into sliver☆29Feb 27, 2025Updated last year
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆29Dec 21, 2025Updated 3 months ago
- 一个窃取谷歌浏览器保存的密码的示例程序,不会被杀毒软件识别,提示大家对数据安全的注意!(A sample program that steals passwords saved in Google Chrome without being detected by antiv…☆10Jul 20, 2023Updated 2 years ago
- ☆11Apr 18, 2022Updated 3 years ago
- WH RAT V2 2022☆25Jan 19, 2024Updated 2 years ago
- Burp Suite/antsword - Interactive shell (HTTP hijack + POST + AES-256-CBC/BASE64)☆29Dec 8, 2025Updated 4 months ago
- PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability☆23Jul 5, 2025Updated 9 months ago