ambionics / wrapwrapLinks
Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.
☆225Updated 10 months ago
Alternatives and similar repositories for wrapwrap
Users that are interested in wrapwrap are comparing it to the libraries listed below
Sorting:
- A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.☆319Updated last year
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆134Updated 5 years ago
- A (small) web exploit framework☆94Updated 3 weeks ago
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆271Updated 2 years ago
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆101Updated 2 months ago
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆283Updated last year
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆483Updated 11 months ago
- A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read☆217Updated 5 months ago
- ☆36Updated last year
- GameOver(lay) Ubuntu Privilege Escalation☆128Updated last year
- A collection of Server-Side Prototype Pollution gadgets and exploits☆204Updated 6 months ago
- CVE-2024-4367 & CVE-2024-34342 Proof of Concept☆171Updated last year
- ☆23Updated 3 years ago
- JMX enumeration and attacking tool.☆457Updated 2 months ago
- Enumerate / Dump Docker Registry☆180Updated last year
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆128Updated last year
- Burp Extensions Api☆179Updated 3 weeks ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆94Updated 6 years ago
- CVE-2023-33733 reportlab RCE☆120Updated last year
- Scalpel is a Burp extension for intercepting and rewriting HTTP traffic, either on the fly or in the Repeater using Python 3 scripts.☆65Updated last year
- Things help you get started with Java Vulnerability☆72Updated 2 years ago
- Files + Writeups for DownUnderCTF 2022 Challenges☆250Updated 2 years ago
- Deriving RSA public keys from message-signature pairs☆338Updated last year
- PP-finder Help you find gadget for prototype pollution exploitation☆177Updated last year
- Vulnerabilities Exploitation On Ubuntu 22.04☆46Updated 2 years ago
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆139Updated last year
- POC for CVE-2021-41091☆65Updated 2 years ago
- Exploit for the vulnerability CVE-2024-43044 in Jenkins☆181Updated 10 months ago
- A webshell plugin and interactive shell for pentesting a Joomla website.☆55Updated 3 years ago
- CVE-2024-32002 RCE PoC☆108Updated last year