MuhammadWaseem29 / CVE-2025-29927-POCLinks
Authorization Bypass in Next.js Middleware
☆17Updated 3 months ago
Alternatives and similar repositories for CVE-2025-29927-POC
Users that are interested in CVE-2025-29927-POC are comparing it to the libraries listed below
Sorting:
- ☆70Updated last month
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆72Updated 5 months ago
- Grep subdomains from web pages.☆42Updated 5 months ago
- ☆48Updated last year
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆17Updated 6 months ago
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆63Updated 11 months ago
- A passive way to find backups/ sensitive information.☆85Updated last week
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆66Updated 3 weeks ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Updated last year
- Host Header Vulnerability Scanner Automated Tool☆23Updated 2 months ago
- ☆118Updated last year
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆37Updated 2 years ago
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆13Updated last month
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- A basic tool to check for XSS vulnerabilities. It takes a list of URLs and checks if the parameter values appear in the response.☆28Updated 11 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆93Updated 2 weeks ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆60Updated 4 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆158Updated 2 months ago
- Automated Subdomain Enumeration and Scanning Tool☆114Updated last year
- Bypass Reset Password Code Lead to Account Takeover☆25Updated 10 months ago
- Web Crawler for Identifying Entry Points☆11Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆41Updated 3 months ago
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆98Updated 10 months ago
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆54Updated 5 months ago
- ☆67Updated 4 months ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆31Updated 11 months ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆39Updated 8 months ago
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆12Updated 2 weeks ago
- ☆29Updated 2 months ago