adhikara13 / CVE-2024-3273View external linksLinks
Exploit for CVE-2024-3273, supports single and multiple hosts
☆13Apr 7, 2024Updated last year
Alternatives and similar repositories for CVE-2024-3273
Users that are interested in CVE-2024-3273 are comparing it to the libraries listed below
Sorting:
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Aug 7, 2024Updated last year
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Feb 5, 2024Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆41Oct 18, 2023Updated 2 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 9 months ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated last year
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- CVE-2024-34102: Unauthenticated Magento XXE☆14Jan 12, 2025Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- This document contains a list of tools and platforms that allow for GEOINT analysis focused on Colombia.☆18Oct 8, 2024Updated last year
- Advanced test for proxy & waf☆13Updated this week
- GiveWP PHP Object Injection exploit☆12Oct 1, 2024Updated last year
- ☆15May 3, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Bypass Reset Password Code Lead to Account Takeover☆26Sep 16, 2024Updated last year
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆17Aug 30, 2023Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Mar 7, 2024Updated last year
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- Url scrapper or extractor from alienvault☆38Mar 1, 2025Updated 11 months ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆40Nov 23, 2023Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Mar 3, 2022Updated 3 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Unauthenticated Command Injection In Progress Kemp LoadMaster☆18Aug 26, 2025Updated 5 months ago