ZephrFish / CVE-2024-4577-PHP-RCELinks
PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template
☆28Updated 2 weeks ago
Alternatives and similar repositories for CVE-2024-4577-PHP-RCE
Users that are interested in CVE-2024-4577-PHP-RCE are comparing it to the libraries listed below
Sorting:
- Huge Collection of Wordpress Exploits and CVES☆123Updated 3 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆69Updated last year
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆84Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773☆112Updated 3 years ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Updated 2 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆62Updated 10 months ago
- CVE-2023-4634☆46Updated 2 years ago
- an exploit of Server-side request forgery (SSRF)☆51Updated last year
- External recon toolkit☆53Updated 11 months ago
- wpfinger is a red-team WordPress scanning tool☆119Updated 2 years ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆42Updated 2 years ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆75Updated last week
- 🦁 Python project to identify and scan for vulnerabilities related to the Joomla CMS project. It scans for common misconfigurations and p…☆171Updated last year
- A purposely vulnerable application in order to demonstrate PHP payload smuggling techniques for PNG files.☆43Updated 3 years ago
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆115Updated last year
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆92Updated 2 years ago
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Updated 2 years ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36Updated 2 years ago
- simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose☆17Updated 2 years ago
- D3Ext's Forward Shell☆120Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆54Updated 2 months ago
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆116Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52Updated last year
- ☆74Updated last week
- CVE-2023-22515: Confluence Broken Access Control Exploit☆142Updated last month
- ☆48Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year