ambionics / magento-exploitsLinks
Exploits for Magento 2.3.0 and lower
☆145Updated 6 years ago
Alternatives and similar repositories for magento-exploits
Users that are interested in magento-exploits are comparing it to the libraries listed below
Sorting:
- Scan a Magento site for information☆445Updated 5 years ago
- Proof of Concept code of the Shoplift code☆39Updated 3 years ago
- Find known vulnerabilities in WordPress plugins and themes using Burp Suite proxy. WPScan like plugin for Burp.☆181Updated 5 years ago
- Sample vulnerable code and its exploit code☆191Updated 4 years ago
- A Burp Extension designed to identify argument injection vulnerabilities.☆121Updated 6 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- 💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002☆353Updated 6 years ago
- A simple framework for sending test payloads for known web CVEs.☆133Updated 4 years ago
- Exploits for various CVEs☆210Updated 5 years ago
- Magento shoplift exploit is vulnerability which was discovered by CheckPoint team (http://blog.checkpoint.com/2015/04/20/analyzing-magent…☆13Updated 9 years ago
- PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)☆40Updated 6 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆123Updated 6 years ago
- CVE-2018-6389 Exploit In WordPress DoS☆81Updated 7 years ago
- NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities☆107Updated 5 months ago
- Toolset for detecting reflected xss in websites☆115Updated 6 years ago
- HTTP.ninja☆151Updated last year
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- Search Exploitable Software on Linux☆230Updated 2 years ago
- POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.☆112Updated 2 years ago
- Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect☆132Updated 3 years ago
- Local File Inclusion Exploitation Tool (mirror)☆128Updated 8 years ago
- ☆207Updated 4 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromjpeg()☆150Updated 10 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆125Updated 6 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆261Updated 3 years ago
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆98Updated 6 years ago
- subdomain bruteforce list☆101Updated 9 months ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any yea…☆80Updated 7 years ago
- CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13☆63Updated 5 years ago