ambionics / wrapwrapLinks
Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.
☆232Updated last year
Alternatives and similar repositories for wrapwrap
Users that are interested in wrapwrap are comparing it to the libraries listed below
Sorting:
- A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.☆325Updated last year
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆141Updated 6 years ago
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆276Updated 2 years ago
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆109Updated 7 months ago
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆283Updated last year
- A (small) web exploit framework☆97Updated last month
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆502Updated last year
- A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read☆217Updated 10 months ago
- CVE-2024-4367 & CVE-2024-34342 Proof of Concept☆186Updated last year
- ☆43Updated 2 years ago
- A collection of Server-Side Prototype Pollution gadgets and exploits☆221Updated 11 months ago
- GameOver(lay) Ubuntu Privilege Escalation☆131Updated 2 years ago
- JMX enumeration and attacking tool.☆490Updated 7 months ago
- Enumerate / Dump Docker Registry☆181Updated last year
- ☆24Updated 4 years ago
- CVE-2023-33733 reportlab RCE☆119Updated 2 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆129Updated 2 years ago
- CVE-2023-0386在ubuntu22.04上的提权☆413Updated 2 years ago
- Burp Extensions Api☆193Updated last month
- A script to automate privilege escalation with CVE-2023-22809 vulnerability☆159Updated 2 years ago
- Need any help bypassing CSP ?☆32Updated 5 years ago
- CVE-2024-32002 RCE PoC☆107Updated last year
- jolokia-exploitation-toolkit☆310Updated last year
- Scalpel is a Burp extension for intercepting and rewriting HTTP traffic, either on the fly or in the Repeater using Python 3 scripts.☆67Updated last year
- Vulnerabilities Exploitation On Ubuntu 22.04☆48Updated 2 years ago
- Deriving RSA public keys from message-signature pairs☆369Updated last year
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆142Updated last year
- Phar + JPG Polyglot generator and playground (CTF CODE)☆95Updated 7 years ago
- Exploit for the vulnerability CVE-2024-43044 in Jenkins☆184Updated last year
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆125Updated 2 years ago