ZephrFish / CVE-2024-4577-PHP-RCE
PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template
☆26Updated 10 months ago
Alternatives and similar repositories for CVE-2024-4577-PHP-RCE:
Users that are interested in CVE-2024-4577-PHP-RCE are comparing it to the libraries listed below
- WooCommerce Payments: Unauthorized Admin Access Exploit☆38Updated last year
- CVE-2023-4634☆45Updated last year
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integ…☆66Updated last month
- Dompdf RCE PoC Exploit - CVE-2022-28368☆17Updated last year
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Updated last year
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 7 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆26Updated last year
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆20Updated 8 months ago
- External recon toolkit☆48Updated 3 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection☆21Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Exploits targeting vBulletin.☆76Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Updated 2 months ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆44Updated last year
- CVE-2024-28955 Exploitation PoC☆34Updated 9 months ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated 11 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆68Updated last year
- 「🔎」CORS vulnerability scanner☆10Updated 4 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆51Updated 3 months ago
- MStore API <= 3.9.2 - Authentication Bypass☆6Updated last year
- Just another script for automatize boolean-based blind SQL injections. (Demo)☆54Updated 2 years ago
- simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose☆16Updated 2 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆60Updated 4 months ago
- ProxyChecker Made in NodeJS☆36Updated 3 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆59Updated 2 years ago