ZephrFish / CVE-2024-4577-PHP-RCE
PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template
☆26Updated 9 months ago
Alternatives and similar repositories for CVE-2024-4577-PHP-RCE:
Users that are interested in CVE-2024-4577-PHP-RCE are comparing it to the libraries listed below
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year
- WooCommerce Payments: Unauthorized Admin Access Exploit☆38Updated last year
- ☆48Updated 9 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆39Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 6 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆60Updated 5 months ago
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆81Updated last year
- Dompdf RCE PoC Exploit - CVE-2022-28368☆17Updated last year
- Formatify is a Burp Suite extension that instantly converts HTTP requests into multiple formats like cURL, Python, PowerShell, and more—s…☆21Updated 2 weeks ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆80Updated 3 years ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integ…☆65Updated last week
- Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7☆34Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- CVE-2023-4634☆45Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- CVE-2024-28955 Exploitation PoC☆34Updated 8 months ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆26Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆26Updated last week
- External recon toolkit☆46Updated 3 months ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆82Updated last year
- Google maps api key checker for pentesting purpose☆27Updated 2 years ago
- Wolfy AV Bypasser☆28Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆48Updated 3 months ago
- Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)☆75Updated 9 months ago
- CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection☆21Updated 11 months ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆82Updated last year