SorceryIE / cfor_exploitLinks
Exploit script for the CFOR vulnerability using Github's GraphQL API
☆22Updated last year
Alternatives and similar repositories for cfor_exploit
Users that are interested in cfor_exploit are comparing it to the libraries listed below
Sorting:
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆24Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated 2 years ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Updated 2 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆28Updated last year
- Android webviews and securiy☆23Updated 3 months ago
- ☆42Updated last month
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Updated 2 years ago
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated 2 months ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆20Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Updated last year
- The largest collection of wordlists in yaml for bug bounty tools☆37Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆25Updated 2 weeks ago
- Make better use of the embedded browser that comes by default with Burp☆44Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated last year
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Updated last year
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- Exploits Unauth Docker API☆43Updated 8 months ago
- Ffuf output browser☆40Updated 2 years ago
- Nuclei template to detect Apache servers vulnerable to CVE-2024-38473☆29Updated last year
- Reversing Citrix Gateway for XSS☆17Updated 2 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39Updated last year
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆114Updated last year
- Saves pages to Wayback machine☆13Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year