CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
☆33Apr 15, 2025Updated 10 months ago
Alternatives and similar repositories for Exploit-CVE-2025-24799
Users that are interested in Exploit-CVE-2025-24799 are comparing it to the libraries listed below
Sorting:
- ☆18Aug 15, 2025Updated 6 months ago
- WordPress File Upload RCE Exploit☆17Sep 1, 2025Updated 6 months ago
- ☆21Jan 3, 2025Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 8 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆35Jan 18, 2026Updated last month
- ☆41Mar 12, 2025Updated 11 months ago
- ☆11Apr 18, 2022Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- SPAM filter rules for Stalwart Mail Server☆14Dec 16, 2025Updated 2 months ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- Lightweight reflection scanner☆20Aug 31, 2025Updated 6 months ago
- Go实现用于Windows系统的进程隐藏工具,通过DLL注入技术将指定进程从任务管理器中隐藏☆25Jan 22, 2026Updated last month
- ☆16Aug 25, 2025Updated 6 months ago
- Implementation of Max Kellermann's exploit for CVE-2022-0847☆12Mar 8, 2022Updated 3 years ago
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆34Sep 22, 2025Updated 5 months ago
- An efficient Python script to obfuscate code by renaming identifiers.☆12Jun 29, 2023Updated 2 years ago
- Enterprise SOC Lab with automated threat detection, SOAR orchestration, and incident response☆28Jan 21, 2026Updated last month
- PAN-OS auth bypass + RCE☆47Nov 19, 2024Updated last year
- PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability☆23Jul 5, 2025Updated 8 months ago
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆30Jan 11, 2026Updated last month
- Solutions from @PortSwigger labs☆13Apr 11, 2024Updated last year
- Web Vulnerability Scanner.☆13Mar 30, 2022Updated 3 years ago
- Web File Manager☆11Aug 21, 2025Updated 6 months ago
- A script that ingests a file with IP addresses and outputs SSL Cert names to get domains that are associated with that IP.☆17Feb 23, 2022Updated 4 years ago
- JeecgBoot综合漏洞利用工具版本更新☆17Feb 18, 2025Updated last year
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated last year
- ☆11Dec 22, 2023Updated 2 years ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated 2 weeks ago
- fully Undetectable payload generator for metasploit☆11Feb 1, 2023Updated 3 years ago
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆152Nov 28, 2025Updated 3 months ago
- ☆125Sep 5, 2024Updated last year
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆30Dec 18, 2025Updated 2 months ago
- Updated Malware Crawler to populate repositories☆10Jul 6, 2015Updated 10 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- A fully functional (and unblockable!!) web-based operating system with a desktop environment including THREE differently working proxy br…☆62Feb 26, 2026Updated last week
- Massive scanner to detect exposed .env files across multiple targets.☆13Jan 10, 2026Updated last month