Stuub / CVE-2024-31848-PoCLinks
PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal
☆17Updated last year
Alternatives and similar repositories for CVE-2024-31848-PoC
Users that are interested in CVE-2024-31848-PoC are comparing it to the libraries listed below
Sorting:
- This repository presents a proof-of-concept of CVE-2024-23897☆16Updated last year
- Nuclei template to detect Apache servers vulnerable to CVE-2024-38473☆29Updated 10 months ago
- A BurpSuite extension for vulnerability Scanning☆27Updated last year
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆21Updated last year
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Updated 11 months ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Updated last year
- Global Protec Palo Alto File Write Exploit☆9Updated last year
- Template Nuclei SSTI☆30Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆38Updated 2 years ago
- Find subdomains by searching public certificate records☆16Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆27Updated 7 months ago
- ☆10Updated 2 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated 9 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- Burp extension used to snip any header from all the requests.☆23Updated last year
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- Unauthenticated Path Traversal in Nexus Repository 3☆2Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- ☆11Updated 5 months ago
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆12Updated 7 months ago
- List of custom Nuclei templates☆15Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 11 months ago
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆29Updated last year
- CVE-2023-1671-POC, based on dnslog platform☆17Updated 2 years ago
- ☆15Updated 2 years ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆21Updated 4 months ago