Ruulian / wconsole_extractorLinks
WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a python function that leaks a file content and you have your shell :)
☆61Updated 7 months ago
Alternatives and similar repositories for wconsole_extractor
Users that are interested in wconsole_extractor are comparing it to the libraries listed below
Sorting:
- Some tips for Bug Bounty using LibreOffice☆55Updated 11 months ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated last year
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated last year
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆51Updated last year
- PP-finder Help you find gadget for prototype pollution exploitation☆187Updated last year
- Official writeups for Business CTF 2024: The Vault Of Hope☆158Updated last year
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆162Updated last year
- This repository is a collection of JavaScript gadgets that can be used to bypass XSS mitigations such as Content Security Policy (CSP) an…☆126Updated 3 months ago
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆31Updated 8 months ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆103Updated 6 months ago
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆131Updated last month
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆139Updated 2 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Updated last year
- POC for CVE-2021-41091☆65Updated 2 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆102Updated 10 months ago
- ☆96Updated 6 months ago
- Enumerate / Dump Docker Registry☆181Updated last year
- A complete table of results of types comparison in multiple languages☆36Updated 3 years ago
- TUDO — A Vulnerable PHP Web App☆127Updated last month
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆63Updated 3 years ago
- ☆93Updated 10 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆67Updated last year
- Official writeups for University CTF 2023: Brains & Bytes☆105Updated last year
- ☆42Updated last year
- Fast exfiltration of text using only CSS and Ligatures☆89Updated 4 months ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆143Updated 3 weeks ago
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆181Updated 10 months ago
- ☆123Updated 2 years ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆165Updated last year
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆151Updated 10 months ago