RandomRobbieBF / CVE-2023-32243
CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation
☆84Updated last year
Alternatives and similar repositories for CVE-2023-32243:
Users that are interested in CVE-2023-32243 are comparing it to the libraries listed below
- Huge Collection of Wordpress Exploits and CVES☆123Updated 2 years ago
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆92Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆87Updated last year
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆74Updated last year
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆90Updated 5 months ago
- CVE Collection of jQuery UI XSS Payloads☆118Updated 2 years ago
- simple recon tool to help you for searching vulnerability on web server☆72Updated 3 weeks ago
- Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei templ…☆95Updated last week
- Discord bot created to automate bug bounty recon, automated scans and information gathering via a discord server☆77Updated last year
- ☆70Updated 2 years ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆52Updated 3 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆42Updated 10 months ago
- Bypass 403☆123Updated 5 months ago
- ☆116Updated 11 months ago
- Tool to create XSS PDF files☆40Updated 7 months ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆61Updated 10 months ago
- Here Are Some Bug Bounty Resource From Twitter☆87Updated 8 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆147Updated last year
- Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it …☆59Updated 2 years ago
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆30Updated 7 months ago
- an exploit of Server-side request forgery (SSRF)☆48Updated 5 months ago
- A burp suite extension that enumerates infrastructure and application admin interfaces (OTG-CONFIG-005)☆118Updated 2 years ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆35Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆61Updated 8 months ago
- Apache Tomcat exploit and Pentesting guide for penetration tester☆56Updated 2 years ago
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆79Updated 3 weeks ago
- Check if domain has bug bounty program or not☆29Updated last year
- CRLF Bug scanner for WebPentesters and Bugbounty Hunters☆41Updated last year