ZephrFish / CVE-2024-4577-PHP-RCELinks
PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template
☆28Updated last month
Alternatives and similar repositories for CVE-2024-4577-PHP-RCE
Users that are interested in CVE-2024-4577-PHP-RCE are comparing it to the libraries listed below
Sorting:
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆70Updated 2 years ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆76Updated this week
- WooCommerce Payments: Unauthorized Admin Access Exploit☆42Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆59Updated 3 months ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- CVE-2023-4634☆46Updated 2 years ago
- Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773☆112Updated 3 years ago
- an exploit of Server-side request forgery (SSRF)☆50Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose☆17Updated 2 years ago
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆84Updated 2 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆62Updated 10 months ago
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Updated 2 years ago
- A script for automatize boolean-based blind SQL injections (MVP).☆54Updated 3 years ago
- ☆47Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure☆96Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆91Updated 2 years ago
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- 🦁 Python project to identify and scan for vulnerabilities related to the Joomla CMS project. It scans for common misconfigurations and p…☆171Updated last year
- Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)☆48Updated last year
- Huge Collection of Wordpress Exploits and CVES☆124Updated 3 years ago
- Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )☆61Updated last year
- Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution☆78Updated last year
- CVE-2023-22515: Confluence Broken Access Control Exploit☆146Updated 2 months ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆93Updated 2 years ago